多选题What are three methods to reduce Mysql server exposure to remote connections?()ASetting — skip-networking when remote connections are not requiredBUsing the sql_mode=STRICT_SECURE after connections are established for encrypted communicationsCSetting specific GRANT privilege to limit remote authenticationDSetting – mysql_secure_configuration to enable paranoid modeEUsing SSL when transporting data over remote networks

多选题
What are three methods to reduce Mysql server exposure to remote connections?()
A

Setting — skip-networking when remote connections are not required

B

Using the sql_mode=STRICT_SECURE after connections are established for encrypted communications

C

Setting specific GRANT privilege to limit remote authentication

D

Setting – mysql_secure_configuration to enable paranoid mode

E

Using SSL when transporting data over remote networks


参考解析

解析: 暂无解析

相关考题:

PE1 has connections to VPN sites that are served by three remote PE routers. How many LSPs must be established to support 2547bis?() A. an LSP for each local CE deviceB. an LSP for each remote PE deviceC. an LSP for each remote CE deviceD. an LSP for each CE facing interface

Above is the output from show ip bgp neighbors command. What is line 21 stating about the BGP connection?() A. the number of consecutive TCP connections to the specified remote neig hborB. the number of total TCP connections that the router hasC. the number of times the router has established a TCP connectionD. the number of neighbors that the router has

PE1 has connections to VPN sites that are served by three remote PE routers. How many LSP’s must be established to support 2547bis?()A、an LSP for each local CE deviceB、an LSP for each remote PE deviceC、an LSP for each remote CE deviceD、an LSP for each CE facing interface

PE1 has connections to VPN sites that are served by three remote PE routers. How many LSPs must be established to support 2547bis?()A、an LSP for each local CE deviceB、an LSP for each remote PE deviceC、an LSP for each remote CE deviceD、an LSP for each CE facing interface

If a certificate authority trustpoint is not configured when enabling HTTPS and the remote HTTPS server requires client authentication, connections to the secure HTTP client will fail. Which command must be enabled for correct operation?()A、ip http client secure-ciphersuite 3des-ede-cbc-shaB、ip https max-connections 10C、ip http timeout-policy idle 30 life 120 requests 100D、ip http client secure-trustpoint trustpoint-name

What are three methods to reduce Mysql server exposure to remote connections?()A、Setting — skip-networking when remote connections are not requiredB、Using the sql_mode=STRICT_SECURE after connections are established for encrypted communicationsC、Setting specific GRANT privilege to limit remote authenticationD、Setting – mysql_secure_configuration to enable paranoid modeE、Using SSL when transporting data over remote networks

Your network consists of a single Active Directory domain. The remote access permission for all users is set to Control access through Remote Access Policy. You have a VPN server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). The current configuration allows all authenticated users to establish VPN connections to Server1. You create a global group named Group1.You need to prevent all members of Group1 from establishing VPN connections to Server1. What should you do?()A、From the local computer policy on Server1, modify the Account Policies settings. B、From Active Directory Users and Computers, modify the Security settings of Group1. C、From the Routing and Remote Access snap-in, create a new remote access policy. D、From the Routing and Remote Access snap-in, open the properties of Server1 and modify the security options.

You need to design a solution so that users in the retail outlets can access their e-mail on the Exchange 2003 servers. What should you do?()A、Install an Exchange 2003 server infrastructure that will support POP3 connections from the Internet. Install a user certificate on each client computer at the retail outlets. Instruct the users to sign and encrypt all outbound e-mail messagesB、Install an Exchange 2003 server infrastructure that will support encrypted POP3 connections from the Internet. Configure the client computer in the retail outlets to use an encrypted connection to the POP3 serverC、Install an Exchange 2003 server infrastructure that will support encrypted Microsoft Outlook Web Access connections from the Internet. Instruct all users at the retail outlets to access their e-mail by using Microsoft Internet Explorer 5.5 or later to connect to the secure Microsoft Outlook Web Access serverD、Install an Exchange 2003 server infrastructure that will support encrypted IMAP4 connections from the Internet. Configure the client computers in the retail outlets to use an encrypted connection to the IMAP4 server

You need to design a remote access strategy for the customer support users when they work from home. Your solution must meet security requirements. What should you do?()A、Deploy an L2TP/IPsec VPN server in each call center. Configure the portable computers as L2TP VPN clientsB、Create IPSec tunnel mode connections between the customer support users home and the company’s Internet-facing routersC、Create IP packet filters on the company’s Internet-facing routers to allow the Remote Desktop Protocol (RDP).Create IPSec filters on the terminal servers to allow only connections that use RDPD、Create IP packet filters on the company’s Internet-facing routers to allow the IPSec protocols. Assign the Secure Server (Require Security) IPSec policy to the terminal servers. Assign the Client (Respond only) IPSec policy to the portable computers

You have a VPN server that runs Windows Server 2003 Service Pack 2 (SP2). The VPN server supports only PPTP connections. A firewall protects the VPN server from the Internet. From a remote computer connected to the Internet, you attempt to connect to the VPN server. During the connection attempt, you receive a message that your user name and password are being verified. You then receive the following error message: “Error 721: The remote computer is not responding.”You need to ensure that you can establish a VPN connection to the VPN server from the Internet.  What should you do?()A、On the VPN server, enable LAN routing.B、On the VPN server, create a demand-dial interface.C、On the firewall, allow inbound connections that use TCP port 1701.D、On the firewall, allow inbound connections that use Generic Route Encapsulation (GRE) protocol 47.

You have a server that runs Windows Server 2003 Service Pack 2 (SP2). Routing and Remote Access is enabled and the server is configured as a remote access server.  You need to configure the server to support only the MS-CHAP v2 authentication protocol for remote access authentication. What should you do from the Routing and Remote Access snap-in?()A、Configure the port properties.B、Create and configure a new demand-dial interface.C、From the server’s properties, modify the security options.D、From the Connections to Microsoft Routing and Remote Access Server policy, add a new condition.

You install Windows 2000 Professional on your computer at home. You create a new dial-up connection to connect to your company’s remote access server. You configure the connection to use both of your external modems and to use multilink to bind the modems together. You start the dial-up connection and connect to the remote access server. You notice that only one of the modems is connected to the remote access server. What should you do?()A、Configure the dial-up connection to use a SLIP connection.B、Configure the company’s remote access server to accept multilink connections.C、Replace your modems with new modems that support multilink.D、Grant your user account multilink permission on the company’s remote access.

You are the systems engineer for your company. The network consists of a single Active Directory domain. The company has a main office and two branch offices. All servers run Windows Server 2003. All client computers run either Windows XP Professional or Windows 2000 Professional.   Each branch office maintains a dedicated 256-Kbps connection to the main office. Each office also maintains a T1 connection to the Internet. Each office has a Microsoft Internet Security and Acceleration (ISA) Server 2000 computer, which provides firewall and proxy services on the Internet connection. Each branch office contains one domain controller and five servers that are not domain controllers. There is minimal administrative staff at the branch offices.  A new company policy states that all servers must now be remotely administered by administrators in the main office. The policy states that all remote administration connections must be authenticated by the domain and that all traffic must be encrypted. The policy also states that the remote administration traffic must never be carried in clear text across the Internet.   You choose to implement remote administration by enabling Remote Desktop connections on all servers on the network. You decide to use the Internet-connected T1 lines for remote administration connectivity between offices.   Because administrative tasks might require simultaneous connections to multiple servers across the network, you need to ensure that administrators do not lose connections to servers in one office when they attempt to connect to servers in another office.   What should you do? ()A、 Configure Routing and Remote Access on one server in each branch office. Create L2TP/IPSec VPN ports on these servers. Create new VPN connections on the administrators’ computers to connect to the VPN servers in the branch offices.B、 Configure a VPN server in each branch office. Create connections that use IPSec Authentication Header (AH) in tunnel mode from the main office connect to VPN servers in the branch offices.C、 Configure a local L2TP/IPSec VPN connection on the ISA Server 2000 firewall computer in the main office. Configure the ISA Server 2000 firewall computers at the branch offices as remote L2TP/IPSec VPN servers.D、 Configure a local PPTP VPN connection on the ISA Server 2000 firewall computers in each branch office. Configure the ISA Server 2000 firewall computer at the main office as a remote PPTP VPN server.

You need to design a method to encrypt confidential data. Your solution must address the concerns of the chief information officer. What should you do?()A、Encrypt customer information when it is stored and when it is being transmittedB、Require encrypted connections to the public Web site, which is hosted on the Web server on the perimeter networkC、Encrypt all marketing information on file servers and client computersD、Require encrypted connections to all file servers

You have a server that runs Windows Server 2003 Service Pack 2 (SP2). Routing and Remote Access is enabled and the server is configured as a remote access server. You need to configure the server to support only the MS-CHAP v2 authentication protocol for remote access authentication. What should you do from the Routing and Remote Access snap-in? () A、Configure the port properties.  B、Create and configure a new demand-dial interface.  C、From the servers properties, modify the security options.  D、From the Connections to Microsoft Routing and Remote Access Server policy, add a new condition.

You install Windows 2000 Professional on your portable computer. You create a new dial up connection to connect to your company’s remote access server. You connect to the remote access server by using the dial up connection. You can connect to the servers on the same segment as the remote access server. You cannot access the shared resources that are on the remote segments from the remote access server. What should you do? ()A、Configure the company remote access server to accept multilink connections.B、Configure the TCP/IP program for the dial up connection to disable IP header compression.C、Configure the TCP/IP properties for the dial up connection to use the default gateway on theremote network.D、Grant your user account dial in permission on the company remote access server.

You need to design the configuration of the Windows Server 2003 Routing and Remote Access server in the Seattle office to meet business requirements. What should you do?()A、Configure a remote access policy on the Routing and Remote Access server to require MS-CHAP v2 for all connectionsB、Use a Group Policy object (GPO) to configure a Restricted Groups policy that applies to the Routing and Remote Access server. Use this Restricted Groups policy to remove all accounts form the local Users group, and then add authorized computer accountsC、Configure the Routing and Remote Access server to use only PPTP connectionsD、Configure the Routing and Remote Access server to use only IPSec over L2TP connections.Configure IPSec to use certificates

You have a server that runs Windows Server 2003 Service Pack 2 (SP2). You enable Remote Desktop on the server and add 10 users to the Remote Desktop Users group. Users report that they occasionally receive an error message indicating that Terminal Server has reached the maximum number of connections. You need to ensure that all 10 users can establish Remote Desktop connections to the server concurrently. What should you do?()A、From Add or Remove Programs, add the Terminal Server component.B、From Add or Remove Programs, add the Connection Point Services component.C、From the Terminal Services Configuration console, modify the Maximum connections setting.D、From the Terminal Services Configuration console, modify the Restrict each user to one session setting.

You need to design an authentication solution for Terminal Services that meets the business requirements.What should you do?()A、Configure the terminal server to use smart cardsB、Configure IPSec to permit only Remote Desktop Protocol (RDP) connections to the terminal serverC、Deny the Remote Desktop Users group access to the terminal serverD、Restrict treyresearch.com users from logging on locally to the terminal server

多选题A Mysql instance is running on a dedicated server. Developers access the server from the same network subnet. Users access the database through an application that is running on a separate server in a DMZ. Which two will optimize the security of this setup?()ADisabling connections from named pipes or socket files (depending on the operating system of the server)BEnabling and using SSL for connections to the Mysql databaseCInstalling Mysql on the application server, and running the database and application on the same serverDStarting the server with – bind- address=0.0.0.0 specifiedERunning the server with – skip-networking specifiedFLimiting logins to originate from the application server or the server's subnet'

单选题You are a Database Administrator with TXGlobal. You use a password file to establish remote connections to the HR database on the server located at the home office. Currently, two active remote sessions exist to this database. These sessions were established using the SYSDBA privilege from the remote machines. You accidentally deleted the password file. What will be the consequence of this action?()A Both the sessions will be killed, and no new sessions will be created using the SYSDBA or SYSOPER privilege.B Both the sessions will remain active, but no new sessions will be created using the SYSDBA or SYSOPER privilege.CBoth the sessions will be killed, but new sessions will be created using the SYSDBA or SYSOPER privilege when the database restarts.D The database will crash, and no new sessions will be created using the SYSDBA or SYSOPER privilege when the database restarts.

多选题Your company has 10 servers that run Windows Server 2008. The servers have Remote Desktop Protocol (RDP) enabled for server administration. RDP is configured to use default security settings. All administrators’ computers run Windows Vista. You need to ensure the RDP connections are as secure as possible.Which two actions should you perform? ()ASet the security layer for each server to the RDP Security Layer.BConfigure the firewall on each server to block port 3389.CAcquire user certificates from the internal certification authority.DConfigure each server to allow connections only to Remote Desktop client computers that use Network Level Authentication.

多选题You are the network administrator for your company. All servers run Windows Server 2003.   You configure the Routing and Remote Access service on a server named Server2. Server2 is connected to a modem pool and supports eight simultaneous inbound connections. You instruct remote users to dial in to Server2 from their home computers.The company’s written business policy states that the only client computer operating systems that should be supported for dial-up access are Windows 95, Windows 98, Windows 2000 Professional, and Windows XP Professional.You need to configure the remote access policy to support the most secure authentication methods possible. You want to enable only the necessary authentication methods based on the supported client computers that will be connecting.   Which authentication method or methods should you enable?()APAPBSPAPCCHAPDMS-CHAP Version 1EMS-CHAP Version 2

单选题PE1 has connections to VPN sites that are served by three remote PE routers. How many LSP’s must be established to support 2547bis?()Aan LSP for each local CE deviceBan LSP for each remote PE deviceCan LSP for each remote CE deviceDan LSP for each CE facing interface

单选题You have a VPN server that runs Windows Server 2003 Service Pack 2 (SP2). The VPN server supports only PPTP connections. A firewall protects the VPN server from the Internet. From a remote computer connected to the Internet, you attempt to connect to the VPN server. During the connection attempt, you receive a message that your user name and password are being verified. You then receive the following error message: “Error 721: The remote computer is not responding.”You need to ensure that you can establish a VPN connection to the VPN server from the Internet.  What should you do?()AOn the VPN server, enable LAN routing.BOn the VPN server, create a demand-dial interface.COn the firewall, allow inbound connections that use TCP port 1701.DOn the firewall, allow inbound connections that use Generic Route Encapsulation (GRE) protocol 47.