单选题With respect to a computer file system, an access control list (ACL) is a list of permissions attached to an object. Which of the following makes forwarding decisions in hardware?()AIETFBPFCCTCAMDASIC

单选题
With respect to a computer file system, an access control list (ACL) is a list of permissions attached to an object. Which of the following makes forwarding decisions in hardware?()
A

IETF

B

PFC

C

TCAM

D

ASIC


参考解析

解析: 暂无解析

相关考题:

●An Embedded System is a (72)designed for specific control functions within a larger system.(72) A. computerB. programC.computer systemD.tool

Your Windows 2000 Professional computer has 10 shared folders that are available to other network users. A user reports that he cannot access a shared folder named ShareA.You want to respond to the user's problem as quickly as possible by using an administrative tool.However, you cannot remember the server location of ShareA. What should you do?A.Use Windows Explorer to display the file paths of your shared folders.B.Use Storage in Computer Management to view logical drive properties.C.Use Event Viewer in Computer Management to search for shared folder error messages.D.Use System Tools in Computer Management to display the file paths of your shared folders.

The smallest unit of information in a computer system is called a(72)A.BitB.ByteC.blockD.file

A complete computer system contains(74)。A.arithmetic unit, control unit and memoryB.input/output devices and mainframeC.mainframe. and programs of utilityD.hardware system and software system

A user is attempting to access files shared on a remote computer. The file share permissions allowthe user to have full control; however, the NTFS permissions allow the user to have read access.Which of the following is the user’s resulting access level for the remotely shared directory?()A.ModifyB.Full controlC.WriteD.Read

You are the network administrator for Ezonexam.com. The file server for the accounting department is a Windows 2000 Server computer named Ezonexam1. You have created a folder named Payments on the system partition of Ezonexam1. Payments is shared on the network as Payments with the default share permissions. The owner of the Payments folder is domain Admins. The NTFS permissions are shown in the following table.NTFS PermissionsDomain Admins: Allow ReadAccounting: Allow Full ControlThere is a file called review.doc in the Payment folder. The owner of review.doc is a user named Paul who is on a temporary leave of absence. The NTFS permissions for the file list only Paul on the access control list, with Full Control permission.You want to remove Paul's access to review.doc and grant the Modify permission for a user named Lily Loo. You open the Security properties of review.doc and discover that you are unable to modify the permissions of the file.You want to be able to remove Paul's access and grant Lily Loo the Modify permission on review.doc.What should you do?A.Take ownership of the file.B.Take ownership of the Payments folder.C.Grant Domain Admins Full control of the Payments shared folder.D.Grant Domain Admins Change for the Payments shared folder.

In the fields of physical security and information security,access control is the selective restriction of access to a place or other resource.The act of accessing may mean consuming,entering,or using.Permission to access a resource is called authorization(授权).An access control mechanism(71)between a user(or a process executing on behalf of a user)and system resources,such as applications,operating systems,firewalls,routers,files,and databases.The system must first authenticate(验证)a user seeking access.Typically the authentication function determines whether the user is(72)to access the system at all.Then the access control function determines if the specific requested access by this user is permitted.A security administrator maintains an authorization database that specifies what type of access to which resources is allowed for this user.The access control function consults this database to determine whether to(73)access.An auditing function monitors and keeps a record of user accesses to system resources.In practice,a number of(74)may cooperatively share the access control function.All operating systems have at least a rudimentary(基本的),and in many cases a quite robust,access control component.Add-on security packages can add to the(75)access control capabilities of the OS.Particular applications or utilities,such as a database management system,also incorporate access control functions.External devices,such as firewalls,can also provide access control services.A.cooperatesB.coordinatesC.connectsD.mediates

System and application access control is to prevent( )access to systems and applications.Access to information and application system functions shall be restricted in accordance with the access control policy.A.physicalB.specialC.authorizedD.unauthorized

Which three devices are used by the Cisco Wireless Control System (WCS) for wireless management?()A、WLAN controllersB、WLAN Solution Engine (WLSE)C、Cisco Wireless Control System (WCS)D、Cisco Wireless Location ApplianceE、lightweight access point (AP)F、autonomous access point (AP)

Which of the following would be the correct location to access when enabling Driver Signature Verification?()A、On the hardware tab in System Properties.B、In the Security Center applet in Control Panel.C、In Device Manager under the File menu and options.D、In Computer Management.

A user suspects that a recently installed program overwrote a Windows system file on the computer. Which of the following commands could be run to check and verify the system files?()A、system /vB、winnt /sC、sfc /scannowD、chkdsk /f

集散控制系统的英文缩写DCS是指()A、Direct Control SystemB、Distributed Control SystemC、Distributed Computer SystemD、Direct Computer System

DCS控制系统的英文全称是()。A、Distributed Control systrmB、Down Computer systemC、Demand control systemD、shutdown Control system

A user is attempting to access files shared on a remote computer. The file share permissions allow the user to have full control; however, the NTFS permissions allow the user to have read access. Which of the following is the user’s resulting access level for the remotely shared directory?()A、ModifyB、Full controlC、WriteD、Read

With respect to a computer file system, an access control list (ACL) is a list of permissions attached to an object. Which of the following makes forwarding decisions in hardware?()A、IETFB、PFCC、TCAMD、ASIC

You are the administrator of your Windows 2000 Professional computer. You share severalfolders on your computer, which are accessible to all the users on your company’s network. You want to ensure that you have correctly assigned the appropriate permissions to all the shares.Where can you view all the shares in use on your computer, so as to verify the permissions as quickly as possible? ()A、Control Panel  Data Sources (ODBC).B、Control Panel  System Tools  Shared Folders.C、Computer Management  System Tools  System Information.D、Computer Management  System Tools  Shared Folders  Open Files.E、Computer Management  System Tools  Shared Folders  Sessions.F、Computer Management  System Tools  Shared Folders  Shares.

You install windows 2000 Professional on a new dual processor Pentium III computer. The system BIOS is APM compliant. When you attempt to shutdown the computer, the shut down dialog box remains on the screen and the power remains on.  What should you do?()A、Restart the computer. Disable the AMP in the system BIOS restart the computer.B、Restart the computer. Use the power options in control panel to enable APM and restart the computer.C、Restart the computer. Use the power options in control panel to enable hibernate support then restart.D、Restart the computer. Use the power options in control panel to create a different power scheme then restart.E、Windows 2000 does not support APM on computers with multiple processors.

You need to recommend a solution for the file servers in the branch offices that meets the storage requirements.What should you include in the recommendation?()A、Distributed File System (DFS) and access-based enumeration (ABE)B、File Server Resource Manager (FSRM) quotas and file screensC、NTFS disk quotas and NTFS permissionsD、Services for Network File System (NFS) and offline files

Your computer is unable to support some display features of Microsoft Windows Aero. You need to check the graphics component rating of the computer.  Which Control Panel option should you use? ()A、Programs  Programs and FeaturesB、Appearance and Personalization  Ease of Access CenterC、System and Maintenance  Problem Reports and SolutionsD、System and Maintenance  Performance Information and Tools/

单选题Which of the following would be the correct location to access when enabling Driver Signature Verification?()AOn the hardware tab in System Properties.BIn the Security Center applet in Control Panel.CIn Device Manager under the File menu and options.DIn Computer Management.

单选题You have a computer that runs Windows XP Professional. You use Microsoft Outlook Express to download e-mail messages. You need to copy the e-mail messages, Outlook Express settings, and Internet Explorer settings to a new computer that runs Windows XP Professional. What should you do?()ACopy all *.dbx files from the old computer to the new computer. BEstablish a Remote Assistance session from the old computer to the new computer.CBack up the system state on the old computer. Restore the system state on the new computer. DRun the File and Settings Transfer Wizard on the old computer. Run the File and Settings Transfer Wizard on the new computer.

单选题You need to design an access control strategy for the Payment folder for the Sales Managers group. What should you do?()AUse IPSec in transport modeBUse Encrypting File System (EFS) over Web Distributed Authoring and Versioning (WebDAV)CUse PEAP-EAP-TLSDUse Encrypting File System (EFS) remote encryption

单选题You need to design an access control strategy for the financial data used by the accounting department. Your solution must meet business requirements. What should you do?()AModify the properties of the computer object named P_FS2 to enable the Trust computer for delegation attribute. Instruct accounting department users to use Encrypting File System (EFS) to encrypt filesBModify the properties of all accounting department user accounts to enable the Account is trusted for delegation attribute. Instruct accounting department users to use Encrypting File System (EFS) to encrypt filesCModify the properties of accounting department computers to enable the Trust computer for delegation attribute. Configure accounting department client computers to use IPSec to communicate with P_FS2DModify the properties of all administrator accounts in the forest to enable to Account is trusted for delegation attribute. Configure accounting department client computers to use IPSec to communicate with P_FS2

单选题You have a computer that runs Windows 7. You log on to the computer by using a user account that is amember of Administrators group. From Windows Explorer you open C:/windows system32/drivers/etc/hostsin Notepad. You attempt to save the file and receive the Save As dialog box. You need to ensure that youcan save changes to C:/windows/system32/drivers/etc hosts. What should you do?( )AStop the Windows Search service.BRemove the inherited permissions from the file.CStart Windows Notepad by using elevated privileges.DChange the User Account Control (UAC) settings to Notify me only when program try to make changesto my computer.

单选题You have a computer that runs Windows 7. A user installs a third-party media player on the computer. Youdiscover that all media files automatically open by using the third-party media player. You need to ensurethat all media files open automatically by using Windows Media Player. You must achieve this goal by usingthe minimum amount of administrative effort. What should you do?()ASelect a media file. Right-click the file and select Open with.BSelect a media file. Right-click the file and select Restore previous versions.CFrom Control Panel, modify the Set your default programs settings.DFrom Control Panel, modify the Set program access and computer defaults settings.

多选题Which three devices are used by the Cisco Wireless Control System (WCS) for wireless management?()AWLAN controllersBWLAN Solution Engine (WLSE)CCisco Wireless Control System (WCS)DCisco Wireless Location ApplianceElightweight access point (AP)Fautonomous access point (AP)

单选题You are the administrator of your company’s network. A user name Andrew has limited dexterity, which prevents him from using standard keyboard when completing his daily tasks. You configure Windows 2000 Professional to use sticky keys and screen keyboard options. You save the accessibility options to a shared folder on the local hard disk of Andrews’s computer. You want to configure the same options for another user Peter. You log on to Peter’s computer using his local user account and you access the folder over the network from Peter’s computer. You select the .acw file from the shared folder to set up Peter’s computer to use the accessibility option. You receive an error message as follows: " There was a problem running the file when running the accessibility wizard". What should you do to install the accessibility features on Peter’s computer?()ACopy the .acw file to the c;/documents/setting/default user folderBSave the accessibility option to the floppy disk and change the permission to allow full control  of the fileCResume the setting for the option by using utility manager, then copy the file to Peter’s local  profile folderDChange the permission of the .acw file in the folder to allow access for Peter’s user account.

单选题You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a computer which hosts several applications in your company. The instance runs on the computer. A job named DiliveryList is created by you. This job requires a file to be written to a file server. But because the job cannot access the file server, it fails to run. You intend to configure the SQL Server Agent service so that only the SQL Server Agent service has read and write access to the file server. Which account type should you use? ()AYou should use local Service accountBYou should use network Service accountCYou should use domain accountDYou should use local System account