单选题Where do you configure SCREEN options?()A zones on which an attack might arriveB zones you want to protect from attackC interfaces on which an attack might arriveD interfaces you want to protect from attack

题目
单选题
Where do you configure SCREEN options?()
A

zones on which an attack might arrive

B

zones you want to protect from attack

C

interfaces on which an attack might arrive

D

interfaces you want to protect from attack


相似考题
更多“单选题Where do you configure SCREEN options?()A zones on which an attack might arriveB zones you want to protect from attackC interfaces on which an attack might arriveD interfaces you want to protect from attack”相关问题
  • 第1题:

    You have a firewall filter applied in an inbound direction on a customer interface. You would like this filter to protect your network from a spoofed denial of service attack. Which action should be configured to accomplish your goal?()

    A. then reject

    B. then discard

    C. then next filter

    D. then silent-drop


    参考答案:B

  • 第2题:

    You will want two trees about ten feet apart, 选择

    You will want two trees about ten feet apart, from _____ to suspend your tent.

    (A) there                         (C) which

    (B) them                              (D) where

     


    选择D
    可改写为you will want two tress about ten feet apart, to suspend your tent from.
    只要有介词摆在空格之前,选项是which, them ,there ,where肯定是which
    介词+which+动词不定式,整体做定语

  • 第3题:

    You are the network consultant from passguide.com. Do you know what attacks are software based attacks that disable your computer and attack user by e-mail? ()

    • A、Executable
    • B、Trojan
    • C、Virus
    • D、Worm

    正确答案:C,D

  • 第4题:

    You want to allow all hosts on interface ge-0/0/0.0 to be able to ping the device’s ge-0/0/0.0 IP address.Where do you configure this functionality?()

    • A、[edit interfaces]
    • B、[edit security zones]
    • C、[edit system services]
    • D、[edit security interfaces]

    正确答案:B

  • 第5题:

    You want to create an out-of-band management zone and assign the ge-0/0/0.0 interface to that zone.From the [edit] hierarchy, which command do you use to configure this assignment?()

    • A、set security zones management interfaces ge-0/0/0.0
    • B、set zones functional-zone management interfaces ge-0/0/0.0
    • C、set security zones functional-zone management interfaces ge-0/0/0.0
    • D、set security zones functional-zone out-of-band interfaces ge-0/0/0.0

    正确答案:C

  • 第6题:

    Prior to applying SCREEN options to drop traffic, you want to determine how your configuration will affect traffic. Which mechanism would you configure to achieve this objective?()

    • A、the log option for the particular SCREEN option
    • B、the permit option for the particular SCREEN option
    • C、the SCREEN option, because it does not drop traffic by default
    • D、the alarm-without-drop option for the particular SCREEN option

    正确答案:D

  • 第7题:

    In which scenario will you use the Flashback Version Query feature?()

    • A、 when you want to restore a table that has been dropped from the Recycle Bin
    • B、 when you want to identify the transaction ID of the transaction that deleted some important records from a table
    • C、 when you want to recover the schema of a dropped user
    • D、when you want to restore a dropped tablespace

    正确答案:B

  • 第8题:

    单选题
    You have a firewall filter containing two terms applied in an inbound direction on a customer interface.You would like this filter to protect your network from a spoofed denial of service attack. Which match criterion should be configured ito identify unwanted packets?()
    A

    from source-port

    B

    from source-address

    C

    from destination-address

    D

    from destination-port


    正确答案: C
    解析: 暂无解析

  • 第9题:

    单选题
    You have a firewall filter applied in an inbound direction on a customer interface. You would like this filter to protect your network from a spoofed denial of service attack. Which action should be configured to accomplish your goal?()
    A

    then reject

    B

    then discard

    C

    then next filter

    D

    then silent-drop


    正确答案: A
    解析: 暂无解析

  • 第10题:

    单选题
    You want to create an out-of-band management zone and assign the ge-0/0/0.0 interface to that zone.From the [edit] hierarchy, which command do you use to configure this assignment?()
    A

    set security zones management interfaces ge-0/0/0.0

    B

    set zones functional-zone management interfaces ge-0/0/0.0

    C

    set security zones functional-zone management interfaces ge-0/0/0.0

    D

    set security zones functional-zone out-of-band interfaces ge-0/0/0.0


    正确答案: C
    解析: 暂无解析

  • 第11题:

    单选题
    You must configure a SCREEN option that would protect your device from a session table flood.Which configuration meets this requirement?()
    A

    A

    B

    B

    C

    C

    D

    D


    正确答案: B
    解析: 暂无解析

  • 第12题:

    单选题
    You want to allow all hosts on interface ge-0/0/0.0 to be able to ping the device’s ge-0/0/0.0 IP address.Where do you configure this functionality?()
    A

    [edit interfaces]

    B

    [edit security zones]

    C

    [edit system services]

    D

    [edit security interfaces]


    正确答案: A
    解析: 暂无解析

  • 第13题:

    You have a firewall filter containing two terms applied in an inbound direction on a customer interface.You would like this filter to protect your network from a spoofed denial of service attack. Which match criterion should be configured ito identify unwanted packets?()

    A. from source-port

    B. from source-address

    C. from destination-address

    D. from destination-port


    参考答案:B

  • 第14题:

    You have a firewall filter containing two terms applied in an inbound direction on a customer interface.You would like this filter to protect your network from a spoofed denial of service attack. Which match criterion should be configured ito identify unwanted packets?()

    • A、from source-port
    • B、from source-address
    • C、from destination-address
    • D、from destination-port

    正确答案:B

  • 第15题:

    You have a firewall filter applied in an inbound direction on a customer interface. You would like this filter to protect your network from a spoofed denial of service attack. Which action should be configured to accomplish your goal?()

    • A、then reject
    • B、then discard
    • C、then next filter
    • D、then silent-drop

    正确答案:B

  • 第16题:

    You have a firewall filter containing two terms applied in an inbound direction on a customer interface. You would like this filter to protect your network from a spoofed denial of service attack. What match criterion should be used in the first term of the filter?()

    • A、Source TCP port
    • B、Source IP address
    • C、Destination TCP port
    • D、Destination IP address

    正确答案:B

  • 第17题:

    Where do you configure SCREEN options?()

    • A、zones on which an attack might arrive
    • B、zones you want to protect from attack
    • C、interfaces on which an attack might arrive
    • D、interfaces you want to protect from attack

    正确答案:A

  • 第18题:

    In which case would you use a FULL OUTER JOIN?()

    • A、Both tables have NULL values.
    • B、You want all unmatched data from one table.
    • C、You want all matched data from both tables.
    • D、You want all unmatched data from both tables.
    • E、One of the tables has more data than the other.
    • F、You want all matched and unmatched data from only one table.

    正确答案:D

  • 第19题:

    You are the administrator of a network supporting Windows 2000 Professional computers. You want to configure Tom’s computer to run the Magnifier each time he logs on to his computer. Which two interfaces can you use?()

    • A、Utility Manager
    • B、Accessibility Wizard
    • C、Accessibility Options icon in Control Panel
    • D、Users and Passwords icon in Control Panel

    正确答案:A,B

  • 第20题:

    单选题
    You have a firewall filter containing two terms applied in an inbound direction on a customer interface. You would like this filter to protect your network from a spoofed denial of service attack. What match criterion should be used in the first term of the filter?()
    A

    Source TCP port

    B

    Source IP address

    C

    Destination TCP port

    D

    Destination IP address


    正确答案: C
    解析: 暂无解析

  • 第21题:

    单选题
    Prior to applying SCREEN options to drop traffic, you want to determine how your configuration will affect traffic. Which mechanism would you configure to achieve this objective?()
    A

    the log option for the particular SCREEN option

    B

    the permit option for the particular SCREEN option

    C

    the SCREEN option, because it does not drop traffic by default

    D

    the alarm-without-drop option for the particular SCREEN option


    正确答案: B
    解析: 暂无解析

  • 第22题:

    单选题
    You want to administer your PROD database from a remote host machine using a Web-enabled interface. Which Oracle tool would you use to accomplish this task efficiently without using command-line interfaces?()
    A

    SQL*Plus

    B

    iSQL*Plus

    C

    Management Server

    D

    Management Repository

    E

    Oracle Enterprise Manager 10g Database Control


    正确答案: D
    解析: 暂无解析

  • 第23题:

    单选题
    In which scenario will you use the Flashback Version Query feature?()
    A

     when you want to restore a table that has been dropped from the Recycle Bin

    B

     when you want to identify the transaction ID of the transaction that deleted some important records from a table

    C

     when you want to recover the schema of a dropped user

    D

    when you want to restore a dropped tablespace


    正确答案: C
    解析: 暂无解析