security
functional
user
system
第1题:
A. host security
B. perimeter security
C. security monitoring
D. policy management
第2题:
Which three statements are true about terms in a policy?()
第3题:
Which command will allow you to display the configured QoS group and the ingress buffer allocated to each QoS group?()
第4题:
Which three statements are true about terms in a policy?()
第5题:
Which zone type can be specified in a policy?()
第6题:
Regarding zone types, which statement is true?()
第7题:
Which three statements are true regarding the data types in Oracle Database 10g/11g?()
第8题:
The order of the terms in a policy is irrelevant
The action is specified in a then statement
Ters are optional in a policy
The match condition can be identified with a from statement
Every policy must contain at least one term
第9题:
The order of the terms in a policy is irrelevant.
The action is specified in a then statement.
Terms are optional in a policy.
The match condition can be identified with a from statement.
A from statement is mandatory in a term.
第10题:
host security
perimeter security
security monitoring
policy management
第11题:
security
functional
user
system
第12题:
null zone
trust zone
untrust zone
management zone
第13题:
Which of the following is NOT a security feature relating to user accounts?()
第14题:
A network vulnerability scanner is part of which critical element of network and system security?()
第15题:
Users can define policy to control traffic flow between which two components?()
第16题:
Users can define policy to control traffic flow between which two components? ()(Choose two.)
第17题:
Which two statements are true regarding the system-default security policy [edit security policies default-policy]?()(Choose two.)
第18题:
Which two statements regarding the Policy Framework in Enterprise Manager (EM) are correct?()
第19题:
Some commands can be password protected requiring logged in customers to re-enter their password.
A user account can be disabled automatically, after a specified number of invalid login attempts.
An account can have multiple valid passwords at the same time, any of which can be used to access the account.
The password policy feature can allow the system to require passwords to include a minimum number of numeric characters.
Logged in customers can be logged off of the system after a specified period of inactivity.
第20题:
Only one LONG column can be used per table
A TIMESTAMP data type column stores only time values with fractional seconds
The BLOB data type column is used to store binary data in an operating system file
The minimum column width that can be specified for a VARCHAR2 data type column is one
The value for a CHAR data type column is blank-padded to the maximum defined column width
第21题:
It enables an attacker to perform an IP sweep of devices.
It enables a hacker to know which operating system the system is running.
It can overflow the session table to its limit, which can result in rejection of legitimate traffic.
It creates a ping of death and can cause the entire network to be infected with a virus.
第22题:
You cannot assign an interface to a functional zone.
You can specifiy a functional zone in a security policy.
Security zones must have a scheduler applied.
You can use a security zone for traffic destined for the device itself.
第23题:
transit zone
default zone
security zone
functional zone
第24题:
show interface priority-flow-control
show interface queuing
show queuing interface
show policy-map system type queuing
show policy-map interface ethernet