更多“单选题Which zone type can be specified in a policy?()A securityB functionalC userD system”相关问题
  • 第1题:

    A network vulnerability scanner is part of which critical element of network and system security?()

    A. host security

    B. perimeter security

    C. security monitoring

    D. policy management


    参考答案:C

  • 第2题:

    Which three statements are true about terms in a policy?()

    • A、The order of the terms in a policy is irrelevant
    • B、The action is specified in a then statement
    • C、Ters are optional in a policy
    • D、The match condition can be identified with a from statement
    • E、Every policy must contain at least one term

    正确答案:B,D,E

  • 第3题:

    Which command will allow you to display the configured QoS group and the ingress buffer allocated to each QoS group?()

    • A、 show interface priority-flow-control
    • B、 show interface queuing
    • C、 show queuing interface
    • D、 show policy-map system type queuing
    • E、 show policy-map interface ethernet  type queuing

    正确答案:C

  • 第4题:

    Which three statements are true about terms in a policy?()

    • A、The order of the terms in a policy is irrelevant.
    • B、The action is specified in a then statement.
    • C、Terms are optional in a policy.
    • D、The match condition can be identified with a from statement.
    • E、A from statement is mandatory in a term.

    正确答案:B,C,D

  • 第5题:

    Which zone type can be specified in a policy?()

    • A、security
    • B、functional
    • C、user
    • D、system

    正确答案:A

  • 第6题:

    Regarding zone types, which statement is true?()

    • A、You cannot assign an interface to a functional zone.
    • B、You can specifiy a functional zone in a security policy.
    • C、Security zones must have a scheduler applied.
    • D、You can use a security zone for traffic destined for the device itself.

    正确答案:D

  • 第7题:

    Which three statements are true regarding the data types in Oracle Database 10g/11g?()

    • A、Only one LONG column can be used per table 
    • B、A TIMESTAMP data type column stores only time values with fractional seconds 
    • C、The BLOB data type column is used to store binary data in an operating system file 
    • D、The minimum column width that can be specified for a VARCHAR2 data type column is one 
    • E、The value for a CHAR data type column is blank-padded to the maximum defined column width

    正确答案:A,D,E

  • 第8题:

    多选题
    Which three statements are true about terms in a policy?()
    A

    The order of the terms in a policy is irrelevant

    B

    The action is specified in a then statement

    C

    Ters are optional in a policy

    D

    The match condition can be identified with a from statement

    E

    Every policy must contain at least one term


    正确答案: C,D
    解析: 暂无解析

  • 第9题:

    多选题
    Which three statements are true about terms in a policy?()
    A

    The order of the terms in a policy is irrelevant.

    B

    The action is specified in a then statement.

    C

    Terms are optional in a policy.

    D

    The match condition can be identified with a from statement.

    E

    A from statement is mandatory in a term.


    正确答案: B,E
    解析: 暂无解析

  • 第10题:

    单选题
    A network vulnerability scanner is part of which critical element of network and system security?()
    A

     host security

    B

     perimeter security

    C

     security monitoring

    D

     policy management


    正确答案: A
    解析: 暂无解析

  • 第11题:

    单选题
    Which zone type can be specified in a policy?()
    A

    security

    B

    functional

    C

    user

    D

    system


    正确答案: D
    解析: 暂无解析

  • 第12题:

    单选题
    Which zone is a system-defined zone?()
    A

    null zone

    B

    trust zone

    C

    untrust zone

    D

    management zone


    正确答案: D
    解析: 暂无解析

  • 第13题:

    Which of the following is NOT a security feature relating to user accounts?()

    • A、Some commands can be password protected requiring logged in customers to re-enter their password.
    • B、A user account can be disabled automatically, after a specified number of invalid login attempts.
    • C、An account can have multiple valid passwords at the same time, any of which can be used to access the account.
    • D、The password policy feature can allow the system to require passwords to include a minimum number of numeric characters.
    • E、Logged in customers can be logged off of the system after a specified period of inactivity.

    正确答案:C

  • 第14题:

    A network vulnerability scanner is part of which critical element of network and system security?()

    • A、host security
    • B、perimeter security
    • C、security monitoring
    • D、policy management

    正确答案:C

  • 第15题:

    Users can define policy to control traffic flow between which two components?()

    • A、from a zone to the device itself
    • B、from a zone to the same zone
    • C、from a zone to a different zone
    • D、from one interface to another interface

    正确答案:B,C

  • 第16题:

    Users can define policy to control traffic flow between which two components? ()(Choose two.)

    • A、from a zone to the router itself
    • B、from a zone to the same zone
    • C、from a zone to a different zone
    • D、from one interface to another interface

    正确答案:B,C

  • 第17题:

    Which two statements are true regarding the system-default security policy [edit security policies default-policy]?()(Choose two.)

    • A、Traffic is permitted from the trust zone to the untrust zone.
    • B、Intrazone traffic in the trust zone is permitted.
    • C、All traffic through the device is denied.
    • D、The policy is matched only when no other matching policies are found.

    正确答案:C,D

  • 第18题:

    Which two statements regarding the Policy Framework in Enterprise Manager (EM) are correct?()

    • A、Policy violations are prioritized as High, Medium, or Informational by category 
    • B、Policies can be disabled completely, or flagged as ignored, for the specified target 
    • C、Policies can be flagged as ignored, but never completely disabled, for the specified target
    • D、Policy violations must be corrected, otherwise the database will shut down until corrective action occurs

    正确答案:A,B

  • 第19题:

    单选题
    Which of the following is NOT a security feature relating to user accounts?()
    A

    Some commands can be password protected requiring logged in customers to re-enter their password.

    B

    A user account can be disabled automatically, after a specified number of invalid login attempts.

    C

    An account can have multiple valid passwords at the same time, any of which can be used to access the account.

    D

    The password policy feature can allow the system to require passwords to include a minimum number of numeric characters.

    E

    Logged in customers can be logged off of the system after a specified period of inactivity.


    正确答案: A
    解析: 暂无解析

  • 第20题:

    多选题
    Which three statements are true regarding the data types in Oracle Database 10g/11g?()
    A

    Only one LONG column can be used per table

    B

    A TIMESTAMP data type column stores only time values with fractional seconds

    C

    The BLOB data type column is used to store binary data in an operating system file

    D

    The minimum column width that can be specified for a VARCHAR2 data type column is one

    E

    The value for a CHAR data type column is blank-padded to the maximum defined column width


    正确答案: C,E
    解析: 暂无解析

  • 第21题:

    单选题
    A system administrator detects thousands of open idle connections from the same source.Which problem can arise from this type of attack?()
    A

    It enables an attacker to perform an IP sweep of devices.

    B

    It enables a hacker to know which operating system the system is running.

    C

    It can overflow the session table to its limit, which can result in rejection of legitimate traffic.

    D

    It creates a ping of death and can cause the entire network to be infected with a virus.


    正确答案: D
    解析: 暂无解析

  • 第22题:

    单选题
    Regarding zone types, which statement is true?()
    A

    You cannot assign an interface to a functional zone.

    B

    You can specifiy a functional zone in a security policy.

    C

    Security zones must have a scheduler applied.

    D

    You can use a security zone for traffic destined for the device itself.


    正确答案: D
    解析: 暂无解析

  • 第23题:

    单选题
    Which type of zone is used by traffic transiting the device?()
    A

    transit zone

    B

    default zone

    C

    security zone

    D

    functional zone


    正确答案: C
    解析: 暂无解析

  • 第24题:

    单选题
    Which command will allow you to display the configured QoS group and the ingress buffer allocated to each QoS group?()
    A

     show interface priority-flow-control

    B

     show interface queuing

    C

     show queuing interface

    D

     show policy-map system type queuing

    E

     show policy-map interface ethernet  type queuing


    正确答案: B
    解析: 暂无解析