多选题A site administrator is configuring Resource-level access control.  Which of the following statements about Resource-level access control are true? Resource-level access control policies:()Aare optionalBare used to protect data beansCprovide coarse-gra

题目
多选题
A site administrator is configuring Resource-level access control.  Which of the following statements about Resource-level access control are true? Resource-level access control policies:()
A

are optional

B

are used to protect data beans

C

provide coarse-grained access control

D

never specify a relationship


相似考题
更多“多选题A site administrator is configuring Resource-level access control.  Which of the following statements about Resource-level access control are true? Resource-level access control policies:()Aare optionalBare used to protect data beansCprovide coarse-gra”相关问题
  • 第1题:

    Which of the following is true about Outbound Malware Scanning?() 

    • A、 It has its own policy table.
    • B、 It is configured as part of Access Policies.
    • C、 It is configured as part ofIronPort data Security.
    • D、 It only has global configuration.

    正确答案:B

  • 第2题:

    Which three statements are true about implementing wireless LANs in the network using Ciscodevices?()

    • A、Antenna power is a relative value reference to dBi
    • B、LWAPP allows encrypted communications between lightweight access points and WLANcontrollers.
    • C、Characteristics of antennas are directionality, gain, and polarization
    • D、Power over Ethernet (PoE) is only available when a WLAN controller is integrated into thenetwork
    • E、The WLAN solution Engine (WLSE) is used to control lightweight access points
    • F、One of the advantages of the lightweight WLAN solution is that the devices act indepently

    正确答案:A,B,C

  • 第3题:

    A site administrator is configuring Resource-level access control.  Which of the following statements about Resource-level access control are true? Resource-level access control policies:()

    • A、are optional
    • B、are used to protect data beans
    • C、provide coarse-grained access control
    • D、never specify a relationship

    正确答案:A,B

  • 第4题:

    The LWAPP (Lightweight Access Point Protocol) is in use within the Company wireless LAN.  Which statement is true about this protocol?()

    • A、 Real-time frame exchange is accomplished within the access point.
    • B、 The control traffic between the client and the access point is encapsulated with the LWAPP. 
    • C、 Authentication, security, and mobility are handled by the access point.
    • D、 Data traffic between the client and the access point is encapsulated with LWAPP.
    • E、 None of the other alternatives apply

    正确答案:A

  • 第5题:

    When configuring resource access policies in a Junos Pulse Access Control Service device, which entry is permitted when defining the specific resources?()

    • A、Hostname
    • B、fully qualified domain name
    • C、IP address
    • D、address book entry

    正确答案:C

  • 第6题:

    Which statements describe the capabilities of the DBMS_NETWORK_ACL_ADMIN package?()

    • A、It can be used to allow the access privilege settings for users but not roles.
    • B、It can be used to allow the access privilege settings for users as well as roles.
    • C、It can be used to control the time interval for which the access privilege is available to a user.
    • D、It can be used to selectively restrict the access for each user in a database to different host computers.
    • E、It can be used to selectively restrict a user's access to different applications in a specific host computer.

    正确答案:B,C,D

  • 第7题:

    多选题
    As the Company wireless administrator, you required to be knowledgeable about the wireless LAN  components.  Which two statements about these components are true? ()
    A

    In the autonomous access point solution, control is provided by the WLAN controller.

    B

    In the lightweight access point solution, WLAN management is provided by the WLAN Control  System (WCS).

    C

    In the autonomous access point solution, control is provided by the WDS (Wireless Domain  Services).

    D

    Cisco Aironet autonomous access points cannot be supported by the Cisco Unified Wireless  Network.

    E

    Ii the lightweight access point solution, WLAN management is provided by the WLAN Solution  Engine (WLSE).

    F

    Cisco Aironet lightweight access points cannot be supported by the Cisco Unified Wireless  Network.


    正确答案: B,C
    解析: 暂无解析

  • 第8题:

    单选题
    The LWAPP (Lightweight Access Point Protocol) is in use within the Company wireless LAN.  Which statement is true about this protocol?()
    A

     Real-time frame exchange is accomplished within the access point.

    B

     The control traffic between the client and the access point is encapsulated with the LWAPP. 

    C

     Authentication, security, and mobility are handled by the access point.

    D

     Data traffic between the client and the access point is encapsulated with LWAPP.

    E

     None of the other alternatives apply


    正确答案: C
    解析: 暂无解析

  • 第9题:

    多选题
    Which three types of policies must you configure to allow remote users transparent access to protected resources using IF-MAP Federation between a Junos Pulse Secure Access Service and a Junos Pulse Access Control Service?()
    A

    Session-Export policies on the Junos Pulse Secure Access Service

    B

    Session-Export policies on the Junos Pulse Access Control Service

    C

    Session-Import policies on the Junos Pulse Secure Access Service

    D

    Session-Import policies on the Junos Pulse Access Control Service

    E

    Resource access policies on the Junos Pulse Access Control Service


    正确答案: B,A
    解析: 暂无解析

  • 第10题:

    多选题
    You have three classes of users on your network: employee, contractor, and IT administrator. You configure the Junos Pulse Access Control Service to assign roles to each user class and require that a specific wireless SSID be preconfigured for the Odyssey Access Client based on the role. Which configuration method should you use to satisfy this scenario?()
    A

    Create a Settings Update file in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under User Roles > Agent > Odyssey Settings > Preconfigured Installer.

    B

    Configure a wired adapter and assign the required SSID under User Roles > Agent > Odyssey Settings.

    C

    Create a script in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under User Roles > Agent > Odyssey Settings > Preconfigured Installer.

    D

    Create a Preconfiguration file in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under User Roles > Agent > Odyssey Settings > Preconfigured Installer.


    正确答案: C,A
    解析: 暂无解析

  • 第11题:

    单选题
    Which statements about 802.1Q trunking in Secure Network Foundation Design Guide for Single Site Deployments are correct?()
    A

    The Cisco Control VLAN carries only Layer 2 control traffic

    B

    802.1Q trunking is used between the access switch and the router

    C

    There is no 802.1Q trunking used in these designs

    D

    When 802.1Q trunks are configured, they are also called Native VLANs

    E

    Trunking Ensures that traffic from only one VLAN is carried on that trunk


    正确答案: B
    解析: 暂无解析

  • 第12题:

    多选题
    A site administrator is configuring Command-level access control. Which of the following statements about Command-level access control are true? Command level access control policies: ()
    A

    are mandatory

    B

    specify action group ExecuteCommandActionGroup for Controller commands

    C

    specify action group ViewCommandActionGroup for View commands

    D

    specify resource group ControllerCommandResourceGroup for Controller commands

    E

    specify resource group ViewCommandResourceGroup for View commands


    正确答案: D,C
    解析: 暂无解析

  • 第13题:

    Which of the following objects contains control structures that are considered the bound form of SQL statements?()

    • A、UDT
    • B、Trigger
    • C、Package
    • D、Access plan

    正确答案:C

  • 第14题:

    A user cannot access files on /deps/it directory, the administrator verifies permissions are set rw-------for the directory.  Which of the following actions need to be performed to only grant read access to the user on the IT directory?()

    • A、 Set folder permissions to 760.
    • B、 Set folder permissions to 770.
    • C、 Set folder permissions to modify.
    • D、 Set folder permissions to full control.

    正确答案:A

  • 第15题:

    As the Company wireless administrator, you required to be knowledgeable about the wireless LAN  components.  Which two statements about these components are true? ()

    • A、 In the autonomous access point solution, control is provided by the WLAN controller.
    • B、 In the lightweight access point solution, WLAN management is provided by the WLAN Control  System (WCS).
    • C、 In the autonomous access point solution, control is provided by the WDS (Wireless Domain  Services).
    • D、 Cisco Aironet autonomous access points cannot be supported by the Cisco Unified Wireless  Network.
    • E、 Ii the lightweight access point solution, WLAN management is provided by the WLAN Solution  Engine (WLSE).
    • F、 Cisco Aironet lightweight access points cannot be supported by the Cisco Unified Wireless  Network.

    正确答案:B,C

  • 第16题:

    A site administrator is configuring Command-level access control. Which of the following statements about Command-level access control are true? Command level access control policies: ()

    • A、are mandatory
    • B、specify action group ExecuteCommandActionGroup for Controller commands
    • C、specify action group ViewCommandActionGroup for View commands
    • D、specify resource group ControllerCommandResourceGroup for Controller commands
    • E、specify resource group ViewCommandResourceGroup for View commands

    正确答案:A,B,E

  • 第17题:

    Which three types of policies must you configure to allow remote users transparent access to protected resources using IF-MAP Federation between a Junos Pulse Secure Access Service and a Junos Pulse Access Control Service?()

    • A、Session-Export policies on the Junos Pulse Secure Access Service
    • B、Session-Export policies on the Junos Pulse Access Control Service
    • C、Session-Import policies on the Junos Pulse Secure Access Service
    • D、Session-Import policies on the Junos Pulse Access Control Service
    • E、Resource access policies on the Junos Pulse Access Control Service

    正确答案:A,D,E

  • 第18题:

    多选题
    Which three statements are true about implementing wireless LANs in the network using Ciscodevices?()
    A

    Antenna power is a relative value reference to dBi

    B

    LWAPP allows encrypted communications between lightweight access points and WLANcontrollers.

    C

    Characteristics of antennas are directionality, gain, and polarization

    D

    Power over Ethernet (PoE) is only available when a WLAN controller is integrated into thenetwork

    E

    The WLAN solution Engine (WLSE) is used to control lightweight access points

    F

    One of the advantages of the lightweight WLAN solution is that the devices act indepently


    正确答案: E,B
    解析: 暂无解析

  • 第19题:

    单选题
    Which of the following is true about Outbound Malware Scanning?()
    A

     It has its own policy table.

    B

     It is configured as part of Access Policies.

    C

     It is configured as part ofIronPort data Security.

    D

     It only has global configuration.


    正确答案: B
    解析: 暂无解析

  • 第20题:

    多选题
    Which statements describe the capabilities of the DBMS_NETWORK_ACL_ADMIN package?()
    A

    It can be used to allow the access privilege settings for users but not roles.

    B

    It can be used to allow the access privilege settings for users as well as roles.

    C

    It can be used to control the time interval for which the access privilege is available to a user.

    D

    It can be used to selectively restrict the access for each user in a database to different host computers.

    E

    It can be used to selectively restrict a user's access to different applications in a specific host computer.


    正确答案: D,C
    解析: 暂无解析

  • 第21题:

    多选题
    Which three devices are used by the Cisco Wireless Control System (WCS) for wireless management?()
    A

    WLAN controllers

    B

    WLAN Solution Engine (WLSE)

    C

    Cisco Wireless Control System (WCS)

    D

    Cisco Wireless Location Appliance

    E

    lightweight access point (AP)

    F

    autonomous access point (AP)


    正确答案: A,D,E
    解析: 暂无解析

  • 第22题:

    多选题
    A customer has purchased a third-party switch to use for Layer 2 access with their Junos Pulse Access Controe Service. When configuring the switch on the Junos Pulse Access Control Service, the customer does not find a make/model entry for it . Which two actions should the customer take to make the switch work with the Junos Pulse Access Control Service?()
    A

    Add the switch to the Junos Pulse Access Control Service as a standard RADIUS.

    B

    Add the switch to the Junos Pulse Access Control Service using the Any make/model.

    C

    Add the switch as a firewall enforcer.

    D

    Obtain and configure the RADIUS dictionary for the switch and use that vendor listing for the make/model.


    正确答案: D,B
    解析: 暂无解析

  • 第23题:

    单选题
    A user cannot access files on /deps/it directory, the administrator verifies permissions are set rw-------for the directory.  Which of the following actions need to be performed to only grant read access to the user on the IT directory?()
    A

     Set folder permissions to 760.

    B

     Set folder permissions to 770.

    C

     Set folder permissions to modify.

    D

     Set folder permissions to full control.


    正确答案: D
    解析: 暂无解析

  • 第24题:

    多选题
    A site administrator is configuring Resource-level access control.  Which of the following statements about Resource-level access control are true? Resource-level access control policies:()
    A

    are optional

    B

    are used to protect data beans

    C

    provide coarse-grained access control

    D

    never specify a relationship


    正确答案: A,D
    解析: 暂无解析