单选题You need to control SSH. HTTP, and Telnet access to an MX240 router through any interface. You have decided to use a firewall filter. How should you apply the firewall filter?()Aas an outbound filter on interface fxp0Bas an outbound filter on interface lo0Cas an inbound filter on interface fxp0Das an inbound filter on interface lo0
单选题
You need to control SSH. HTTP, and Telnet access to an MX240 router through any interface. You have decided to use a firewall filter. How should you apply the firewall filter?()
A
as an outbound filter on interface fxp0
B
as an outbound filter on interface lo0
C
as an inbound filter on interface fxp0
D
as an inbound filter on interface lo0
参考解析
解析:
暂无解析
相关考题:
following code segment.[ServiceContract]public interface ICustomerService{...}public class CustomerService : ICustomerService{...}The service is self-hosted in a console application. Older client applications access the service at http://contoso.com:8080/CustomerService/V1.Newer client applications access the service at http://contoso.com:8080/CustomerService/V2.You need to ensure that any client application can access the service at either address.Which code segment should you use?()A.B.C.D.
You are receiving reports of possible unauthorized access to resources protected by a firewall enforcer running the Junos OS. You want to verity which users are currently accessing resources through the enforcer.Which command should you use to verify user access on the enforcer?()A. show services unified-access-control authentication-tableB. show auth tableC. show services unified-access-control policiesD. show services unified-access-control captive-portal
After attempting to telnet into a router, you are denied and you receive the error message "password required, but none set." What configuration changes will allow telnet access into this router?() A.B.C.D.
You are a technician at TestKing. Your assistant applied an IP access control list to Router TK1. You want to check the placement and direction of the access control list.Which command should you use?()A. show access-listB. show ip access-listC. show ip interfaceD. show interfaceE. show interface list
You‘re the systems administrator at Testing, and you create the following access control lists.You then enter the command ip access-group 101 in to apply access control list 101 to router TK1s e0 interface.Which of the following Telnet sessions will be blocked as a result of your access lists?()A. Telnet sessions from host A to host 5.1.1.10B. Telnet sessions from host A to host 5.1.3.10C. Telnet sessions from host B to host 5.1.2.10D. Telnet sessions from host B to host 5.1.3.8E. Telnet sessions from host C to host 5.1.3.10F. Telnet sessions from host F to host 5.1.1.10
You are trying to deploy a configuration job to an ios access point using the wlse, but the job fails. Which of the following would cause this failure?()A、snmp communitiesB、telnet/ssh user/passwordC、wlccp credentialsD、http user/password
You are trying to deploy a configuration job to an IOS access point using the WLSE, but the jobfails. Which of the following would cause this failure?()A、SNMP communitiesB、Telnet/SSH user/passwordC、WLCCP credentialsD、HTTP user/password
You are a technician at TestKing. Your assistant applied an IP access control list to Router TK1. You want to check the placement and direction of the access control list.Which command should you use?()A、show access-listB、show ip access-listC、show ip interfaceD、show interfaceE、show interface list
On the WLSE, which of the following fault policies would be used to verify that access to thecommand-line interface of the access point is secure?()A、registration errorB、authentication failures thresholdC、HTTP disabledD、Telnet disabled
You need to control SSH, HTTP, and Telnet access to an MX240 router through any interface.You have decided to use a firewall filter. How should you apply the firewall filter?()A、as an outbound filter on interface fxp0B、as an outbound filter on interface lo0C、as an inbound filter on interface fxp0D、as an inbound filter on interface lo0
You need to control SSH. HTTP, and Telnet access to an MX240 router through any interface. You have decided to use a firewall filter. How should you apply the firewall filter?()A、as an outbound filter on interface fxp0B、as an outbound filter on interface lo0C、as an inbound filter on interface fxp0D、as an inbound filter on interface lo0
There are 30 managed access points on the wlse. a radio scan is started but fails. Upon inspection of the device list in the reports tab, you notice a red indicator on the wds access point. upon inspection of the wds access point through its guid, it is discovered that the security keys are not set up between the wds access point and the wlse. Which of the following is mis configured?()A、snmp communitiesB、telnet/ssh user/passwordC、wlccp credentialsD、http user/password
The following are the details of your database:Instance name:test Host name : tech1.us.oracle.com IP address:145.33.230.186 Enterprise Manager Console HTTP Port number:5500 You started the database instance and you want to manage your database remotely with Enterprise Manager through a Web browser. Which two URLs would you use to access the Database Control?()A、http://145.33.230.186:5500/emB、http://www.145.33.230.186:5500/emC、http://tech1.us.oracle.com:5500/emD、http://test.145.33.230.186:5500/emE、http://test.tech1.us.oracle.com:5500F、http://www.tech1.us.oracle.com:5500/emG、http://test.tech1.us.oracle.com:5500/em
You have a login.ascx control and to display it in a view which method u would use()A、http.displayB、http.partialC、http.loadD、http.get
You need to design an e-mail access strategy for remote users. What should you do? () A、 Instruct remote users to connect to their e-mail by using RPCB、 Instruct remote users to connect to Outlook Web Access by using only HTTPSC、 Instruct remote users to connect to the company network by using PPTP connectionsD、 Instruct remote users to connectd to their e-mail by using RPC over HTTP Configure the HTTP servers to require encryption.
Your network contains an Exchange Server 2010 server. You need to plan a mailbox sharing solution for the organization to meets the following requirements: .Ensure that assistants can read and modify the e-mail messages of their managers .Ensure that assistants can impersonate their managers when they send e-mail messages What should you include in the plan?()A、Full Access and Send As permissionsB、Full Access and send on behalf of permissionsC、Role Based Access Control (RBAC) assignments and Send As permissionsD、Role Based Access Control (RBAC) assignments and send on behalf of permissions
Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 client computers. You are planning to deploy Windows 7 Enterprise to the client computers. You need to design a custom image that will enable users to connect to a Telnet server. What should you do?()A、 Configure Windows Firewall to allow the Telnet program through Windows Firewall before capturing the image.B、 Change User Account Control settings before capturing the image.C、 Turn on the Telnet Server feature in the image.D、 Turn on the Telnet Client feature in the image.
单选题You need to design a security strategy for a remote e-mail access. What should you do?()ARequire remote users to access e-mails by using Outlook Mobile AccessBRequire Outlook Web Access users to install the secure MIME ActiveX-Control and to encrypt all messagesCOn Outlook Web Access servers that accept connections from the Internet configure IIS to require SSL for all connectionsDOn Outlook Web Access servers that accept connections from the Internet configure IIS to require Integrated Windows Authentication
多选题You are designing a service that will use the Windows Azure AppFabric Service Bus. You need to recommend an approach for controlling access to the service by using the Windows Azure AppFabric Access Control Service. Which two actions should you recommend?()AConfigure the service to not require authentication.BConfigure the service to require a relay access token.CSpecify message security for all communications between clients and the service.DSpecify transport security for allcommunications between clients and the service.
单选题You are a help desk technician for your company. Stefan and Irene are software developers for the company. Stefan is developing a Web application on his Windows XP Professional computer. The computer is named Stefan132. All client computers use Microsoft Internet Explorer 6. 0 or later as their Web browser. When Irene types http://Stefan132 in the Address bar of her Web browser, she cannot access the Web application. However, Stefan can access the Web application by typing http://localhost or http://Stefan132 in the Address bar of his Web browser. He can also access resources on the company network. When you run the Ping command on your computer, you cannot connect to Stefan’s computer. When you attempt to access http://Stefan132 from your computer, Internet Explorer displays “DNS or Server Error.” You need to ensure that Irene can access the Web application on Stefan’s computer. First, you establish a Remote Assistance connection to Stefan’s computer. What should you do next on Stefan’s computer?()ARun the IPconfig /renew command. BStop and then restart the World Wide Web Publishing service. CEnsure that the Everyone group has Allow - Full Control permission on the Inetpub folder. DIn the properties of the Local Area Connection connection, allow a Windows Firewall exception for port 80.
单选题Your network consists of a single Active Directory domain. You have a Web server named server1.contoso.com that runs Windows Server 2003 Service Pack 2 (SP2). Users access a Web site on Server1 by using the URL http://server1.contoso.com. Users also access the Web site on Server1 by using the URL http://192.168.1.10. You need to configure DNS to enable users to access the Web site by using the URL http://www.contoso.com. The solution must prevent the need to manually update DNS if the IP address of Server1 changes. Which type of resource record should you create in DNS?()Aalias (CNAME)Bhost (A)Chost (AAAA)Dhost information (HINFO)
单选题Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 client computers. You are planning to deploy Windows 7 Enterprise to the client computers. You need to design a custom image that will enable users to connect to a Telnet server. What should you do?()A Configure Windows Firewall to allow the Telnet program through Windows Firewall before capturing the image.B Change User Account Control settings before capturing the image.C Turn on the Telnet Server feature in the image.D Turn on the Telnet Client feature in the image.
单选题You are receiving reports of possible unauthorized access to resources protected by a firewall enforcer running the Junos OS. You want to verity which users are currently accessing resources through the enforcer.Which command should you use to verify user access on the enforcer?()Ashow services unified-access-control authentication-tableBshow auth tableCshow services unified-access-control policiesDshow services unified-access-control captive-portal
单选题You are a technician at TestKing. Your assistant applied an IP access control list to Router TK1. You want to check the placement and direction of the access control list.Which command should you use?()Ashow access-listBshow ip access-listCshow ip interfaceDshow interfaceEshow interface list
单选题Your network contains a domain-based namespace named DFS1. DFS1 has Windows 2008 Server mode enabled. You need to ensure that only files and folders in DFS1 that users have permissions to access are displayed. What should you do?()ADisable referrals.BModify the system access control list.CEnable access-based enumeration (ABE).DModify the discretionary access control list.
单选题You need to control SSH, HTTP, and Telnet access to an MX240 router through any interface.You have decided to use a firewall filter. How should you apply the firewall filter?()Aas an outbound filter on interface fxp0Bas an outbound filter on interface lo0Cas an inbound filter on interface fxp0Das an inbound filter on interface lo0
单选题Your network consists of a single Active Directory domain named contoso.com. All servers run Windows Server 2003 Service Pack 2 (SP2). You deploy a Web server named Server1. Users access the server by using the URL http://server1.contoso.com. You need to create a new resource record that will allow users to access the server by using the URL http://www.contoso.com. The solution must prevent the need to modify the new record if the IP address of Server1 changes. Which type of resource record should you configure?()Aalias(CNAME)Bhost (A)Cmail exchanger (MX)Dpointer(PTR)