单选题You are attempting to secure a MySQL server by using SSL encryption. On starting MySQL, you get this error: 130123 10:38:02 [ERROR] mysqld: unknown option '—ssl' What is the cause of the error?()AThe — ssl level was not specifiedBThe server was not started with the – enable–ssl-plugin optionC— ssl is not a valid server optionDThe mysqld binary was not compiled with SSL supportEThe server's SSL certificate was invalid

单选题
You are attempting to secure a MySQL server by using SSL encryption. On starting MySQL, you get this error: 130123 10:38:02 [ERROR] mysqld: unknown option '—ssl' What is the cause of the error?()
A

The — ssl level was not specified

B

The server was not started with the – enable–ssl-plugin option

C

— ssl is not a valid server option

D

The mysqld binary was not compiled with SSL support

E

The server's SSL certificate was invalid


参考解析

解析: 暂无解析

相关考题:

Of the threats discussed below, what is the main advantage of using Cisco Secure Desktop which is part of the Cisco ASA VPN solution?()A、 Secure desktop will create a completely separate computing environment thatwill be deleted when you are done.This ensures that no confidential data has been left on the shared/public computer.B、 Secure desktop is used to protect access to your registry and systemfiles when browsing to SSL/VPN protectedpages.C、 Secure Desktop ensures that an SSLprotected password cannotbe exploitedby a man in the middle attackusing a spoofed certificate.D、 Secure desktop hardens the operating system of the machines you are using at the time secure desktop islaunched.

What is the least secure mode of enabling an IMAP server for Cisco Unity Express?()A、SSL B、VPN C、Mixed D、SMTP E、HTTPSF、Non-SSL

What are three methods to reduce Mysql server exposure to remote connections?()A、Setting — skip-networking when remote connections are not requiredB、Using the sql_mode=STRICT_SECURE after connections are established for encrypted communicationsC、Setting specific GRANT privilege to limit remote authenticationD、Setting – mysql_secure_configuration to enable paranoid modeE、Using SSL when transporting data over remote networks

You are attempting to secure a MySQL server by using SSL encryption. On starting MySQL, you get this error: 130123 10:38:02 [ERROR] mysqld: unknown option '—ssl' What is the cause of the error?()A、The — ssl level was not specifiedB、The server was not started with the – enable–ssl-plugin optionC、— ssl is not a valid server optionD、The mysqld binary was not compiled with SSL supportE、The server's SSL certificate was invalid

Your company has a server that runs Windows Server 2008. The server has the Web Server (IIS) role installed.  You need to activate SSL for the default Web site.  Which two actions should you perform?()A、Obtain and import a server certificate by using the IIS Manager console.B、Select the Generate Key option in the Machine Key dialog box for the default Web site.C、Add bindings for the HTTPS protocol to the default Web site by using the IIS Manager console.D、Install the Digest Authentication component for the Web server role by using the Server Manager console.

You have an Exchange Server 2010 organization and an Active Directory Rights Management Services(AD RMS) server.  All users access their mailboxes by using Outlook Web App (OWA).  You need to plan a security solution for the organization to meet the following requirements:.Secure messages by using administrator-defined templates  .Ensure that e-mail messages sent by users can be stored in an encrypted format  What should you include in the plan?()A、a legal holdB、Domain SecurityC、Outlook Protection RulesD、Secure/Multipurpose Internet Mail Extensions (S/MIME)

You work as a exchange administrator at TestKing.com. The TestKing.com network contains an internalnetwork as well as a perimeter network. The primeter network contains an Exchange Server 2010 EdgeTransport Server named TESTKING-EX. During the course of day you receive an instruction form the CIO to formulate a remote managementsolution for TESTKING-EX01 based on the set criteria below: You need to ensure that management traffic is encypted. You nedd to ensure that remote administration is permitted fron the Internet network.You need to ensure that Exchange Management Console (EMC) is supported. What should you do?()A、You should recommend that Windows Management Instrumentation Command-line (WMIC) be used.B、You should recommend that Lightweight Directory Access Protocol(LDAP)over Secure Socket Layer(SSL) be used.C、You should recommend that Windows Remote Management (WinRM) over SSL be used.D、You should recommend that Remote Desktop Protocol(RDP)over Secure Socket Layer(SSL)be used.

You are a systems administrator who is attempting to troubleshoot a problem with accessing a Web site ona computer running Windows Server 2008. In the past, users have been able to access the Web site byusing http://hr.contoso.com. However, when they attempt to access the site now, they receive the errormessage "Internet Explorer Cannot Display The Web page." Which of the following steps should you taketo resolve the error?()A、Using Server Manager, add the HTTP Errors server role.B、Using Server Manager, verify that the World Wide Web Publishing Service has been started.C、Verify the configuration of the usersWeb browsers.D、Using Server Manager, add the HTTP Logging server role.

You are the administrator of an Active Directory domain. All servers run Windows Server 2003. All client computers run Windows XP Professional. A server named Filesrv1 contains confidential data that is only available to users in the human resources (HR) department.  You want all computers in the HR department to connect to Filesrv1 by using an IPSec policy. You assign the Server (Request Security) IPSec policy to Filesrv1. Using Network Monitor, you notice that some computers in the HR department connect to Filesrv1 without using the IPSec policy.   You need to configure Filesrv1 to ensure that all computers connect to it by using the IPSec policy.   What should you do?()A、Assign the Secure Server(Require Security) IPSec policy.B、Assign the Client (Respond Only)IPSec policy.C、Unassign the Server(Request Security IPSec policy.D、Restart the IPSec Services service.

Your network contains a Web server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). Server1 has one Web site.  You configure Server1 to use a Web server certificate. Users report that they can access the Web site by using http://server1 and https://server1. You need to ensure that all traffic to, and from, Server1 is encrypted. What should you do?()A、In IIS Manager, enable the Require secure channel (SSL) option.B、In IIS Manager, enable the Digest authentication for Windows domain servers option.C、In Local Security Policy, enable Domain Member: Require strong (Windows 2000 or later) session key.D、In Local Security Policy, enable Domain Member: Digitally encrypt or sign secure channel data (always).

You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You are in charge of a member server that runs Windows Server 2008. Themember server has the Web Server (IIS) server role installed. The server hosts a Web site that is onlyaccessible to the executives of your company. According to the requirement of the company policy, theexecutives must use user certificates to access the confidential Web content. You have to make sure thatthe executives can only access the secure Web site by using their installed certificates. What action shouldyou perform to make sure of this?()A、A Certificate Trust list should be configured to include the executives certification authority (CA)certificate.B、The SSL settings should be configured to Require 128-bit SSL on the confidential Web site.C、The Client Certificates settings should be configured to Accept on the SSL settings for the confidentialWeb site.D、The Client Certificates settings should be configured to Require on the SSL settings for the confidentialWeb site.

多选题What are three methods to reduce Mysql server exposure to remote connections?()ASetting — skip-networking when remote connections are not requiredBUsing the sql_mode=STRICT_SECURE after connections are established for encrypted communicationsCSetting specific GRANT privilege to limit remote authenticationDSetting – mysql_secure_configuration to enable paranoid modeEUsing SSL when transporting data over remote networks

多选题A Mysql instance is running on a dedicated server. Developers access the server from the same network subnet. Users access the database through an application that is running on a separate server in a DMZ. Which two will optimize the security of this setup?()ADisabling connections from named pipes or socket files (depending on the operating system of the server)BEnabling and using SSL for connections to the Mysql databaseCInstalling Mysql on the application server, and running the database and application on the same serverDStarting the server with – bind- address=0.0.0.0 specifiedERunning the server with – skip-networking specifiedFLimiting logins to originate from the application server or the server's subnet'

单选题You work as a exchange administrator at TestKing.com. The TestKing.com network contains an internalnetwork as well as a perimeter network. The primeter network contains an Exchange Server 2010 EdgeTransport Server named TESTKING-EX. During the course of day you receive an instruction form the CIO to formulate a remote managementsolution for TESTKING-EX01 based on the set criteria below: You need to ensure that management traffic is encypted. You nedd to ensure that remote administration is permitted fron the Internet network.You need to ensure that Exchange Management Console (EMC) is supported. What should you do?()AYou should recommend that Windows Management Instrumentation Command-line (WMIC) be used.BYou should recommend that Lightweight Directory Access Protocol(LDAP)over Secure Socket Layer(SSL) be used.CYou should recommend that Windows Remote Management (WinRM) over SSL be used.DYou should recommend that Remote Desktop Protocol(RDP)over Secure Socket Layer(SSL)be used.

单选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You are in charge of a member server that runs Windows Server 2008. Themember server has the Web Server (IIS) server role installed. The server hosts a Web site that is onlyaccessible to the executives of your company. According to the requirement of the company policy, theexecutives must use user certificates to access the confidential Web content. You have to make sure thatthe executives can only access the secure Web site by using their installed certificates. What action shouldyou perform to make sure of this?()AA Certificate Trust list should be configured to include the executives certification authority (CA)certificate.BThe SSL settings should be configured to Require 128-bit SSL on the confidential Web site.CThe Client Certificates settings should be configured to Accept on the SSL settings for the confidentialWeb site.DThe Client Certificates settings should be configured to Require on the SSL settings for the confidentialWeb site.

单选题Of the threats discussed below, what is the main advantage of using Cisco Secure Desktop which is part of the Cisco ASA VPN solution?()A Secure desktop will create a completely separate computing environment thatwill be deleted when you are done.This ensures that no confidential data has been left on the shared/public computer.B Secure desktop is used to protect access to your registry and systemfiles when browsing to SSL/VPN protectedpages.C Secure Desktop ensures that an SSLprotected password cannotbe exploitedby a man in the middle attackusing a spoofed certificate.D Secure desktop hardens the operating system of the machines you are using at the time secure desktop islaunched.

单选题You administer a SQL Server 2008 Reporting Services (SSRS) instance. You plan to design an authentication method for SSRS reports that use SQL Server data connections. You need to ensure that all SSRS reports communicate to the SQL Server instance by using the Kerberos authentication protocol. What should you do?()AConfigure the default Web site on the instance to use the Integrated Security type.BConfigure the application pool used by the default Web site to use a domain account. CConfigure the default Web site on the instance to use the Secure Sockets Layer (SSL) protocol.DRegister a service principal name (SPN) in the Active Directory directory service for the SSRSinstance.

单选题Your network contains the servers configured as shown in the following table. Name Server role Private IP address Public IP address Server1Routing and Remote Access server192.168.1.1 131.107.0.1 Web1 Web server 192.168.1.2 ? Your company is assigned the public IP addresses from 131.107.0.1 to 131.107.0.31.You need to ensure that Web1 is accessible from the Internet by using https://131.107.0.2.What should you do from the Routing and Remote Access console?()AFrom the Static Routes node, configure a static route.BFrom the server properties, configure SSL Certificate Binding.CFrom the NAT interface, add an address pool and a reservation.DFrom the NAT interface, configure the Secure Web Server (HTTPS) service.

单选题You are the network administrator for The network consists of a single Active Directory domain named All servers run Windows Server 2003. One domain controller on the network is configured as a certification authority (CA). The network contains a Web server that runs IIS 6.0 and hosts a secure intranet site. The server also hosts other sites that do not require HTTPS. You configure a server certificate on the IIS server by using a certificate from your internal CA. All users are required to connect to the intranet site by using HTTPS. Some users report that they cannot connect to the secure intranet site by using HTTPS. You confirm that all users can connect to the nonsecure sites hosted on the Web server by using HTTP. You want to view the failed HTTPS requests. What should you do?()AReview the log files created by IIS on the Web server.BReview the security log in Event Viewer on the Web server.CReview the security log in Event Viewer on the ca.DReview the contents of the Failed Requests folder on the ca.

单选题Your network contains a Web server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). Server1 has one Web site.  You configure Server1 to use a Web server certificate. Users report that they can access the Web site by using http://server1 and https://server1. You need to ensure that all traffic to, and from, Server1 is encrypted. What should you do?()AIn IIS Manager, enable the Require secure channel (SSL) option.BIn IIS Manager, enable the Digest authentication for Windows domain servers option.CIn Local Security Policy, enable Domain Member: Require strong (Windows 2000 or later) session key.DIn Local Security Policy, enable Domain Member: Digitally encrypt or sign secure channel data (always).

单选题You use—login-path to access a MySQL server on a Linux installation. Which statement is true about the – login-path option that is created by using mysql_config_editor?()AAll system users have access to the MySQL server via—login path localBlogin-path can be used only for MySQL servers running on a local machineClogin-path allows you to provide login credentials without passing clear text passwords on the command lineDWhen using – login-path to connect to a remote MySQL server, the remote server version must be 5.6 or later

多选题You need to design an access control strategy for the external and intranet Web sites. Which two actions should you perform?()AEnable SSL on the external Web site by using a Microsoft cryptographic service provider (CSP)BEnable Microsoft .NET Passport authentication on the external Web site. Use Passport Level 0 with SSL on the external Web siteCEnable SSL on the external Web site by using a commercial digital certificateDEnable SSL on the intranet Web site by using an internal server certificateEEnable SSL on the external Web site by using an internal server certificate

单选题You are a systems administrator troubleshooting a problem with accessing a Web server running WindowsServer 2008. Previously, another administrator created and installed a server certificate on the computer.Users report that they are able to connect to the site using HTTP but that they receive a warning in InternetExplorer when trying to connect by HTTPS. You want to enable users to connect using both HTTP andHTTPS. You attempt to access the site by using an instance of Internet Explorer on the server itself, andyou receive the same warning message for HTTPS connections. How can you resolve this issue?()AChange the site binding for the Web site to enable connections on port 443.BChange the SSL settings for the Web site to enable the Require SSL option.CObtain and install an Internet Certificate on the Web server.DExport and re import the existing security certificate.

单选题You are the network administrator for The network consists of a single Active Directory domain. The domain contains 20 Windows Server 2003 computers and 400 Windows XP Professional computers. Software Update Services (SUS) is installed on a server named Testking2. The network security administrator wants you to ensure that the administrative password is not compromised when an administrator connects to Testking2's SUSAdmin Web site remotely by using HTTP. You want only SSL to be used to connect to the SUSAdmin Web site. The network security administrator creates a digital certificate and enables communication for SSL on port 443 of Testking2. However, administrators are still able to connect to the SUSAdmin Web site by using HTTP. You need to ensure that communication to the SUSAdmin Web site is always secure. What should you do?()ADisable port 80 on the SUSAdmin Web site.BRequire 128-Bit SSL on all directories related to the SUSAdmin Web site.CChange the default Web site to require 128-Bit SSL.DEnable IPSec on Testking2 with the Request Security IPsec template.

单选题You install a copy of Mysql 5.6.13 on a brand new Linux server by using RPM packages. The server starts successfully as verified by the following commands: $ pidof mysqld 3132 $tail – n2 /var/lib.mysql/hostname.err 2013-08-18 08:18:38 3132 [Note] /usr/sbin/mysqld:ready for connections. Version: '5.6.13-enterprise-commercial-advaced' socket:'/tmp/mysql.sock' port; 3306 Mysql Enterprise Server – Advanced Edition (Commercial) You attempt to log in as the root user with the following command: $mysql – u root ERROR 1045 (28000): Access denied for user 'root'@'localhost' (using password: NO) Which statement is true about this scenario?()AThe RPM installation script sets a default password of password for new installationsBThe local root user must log in with a blank password initially: mysql –u root –pCNew security measures mean that the mysql_secure_installation script must be run first on all new installationsDThe mysql_install_bd post-installation script used – random-password

单选题You adjust a default configuration to the following /etc/my.cnf on a Linux installation:[mysqld] Loq-bin Binrylog_format=ROW You do not notice the spelling error in binrylog_format and restart your production server. How does the MySQL server behave with incorrectly spelled options?()AMysqld uses internal configuration versioning and reverts to the previous configurationBWhen using mysql_config_editor for configuration adjustments, it detects incorrect syntax and typing mistakesCThe mysqld_safe script skips the unknown variable and starts using the remaining configuration changesDMysqld prints to the error log about an unknown variable, and then exits

多选题You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003.The network contains a Web server named Server1 that runs IIS 6.0 and hosts a secure Web site. The Web site is accessible from the intranet, as well as from the Internet. All users must authenticate when they connect to Server1. All users on the Internet must use a secure protocol to connect to the Web site. Users on the intranet do not need to use a secure protocol.You need verify that all users are using a secure protocol to connect to Server1 from the Internet.   What are two possible ways to achieve this goal?()AMonitor the events in the application log on Server1.BMonitor the events in the security log on Server1.CMonitor the Web server connections on Server1 by using a performance log.DMonitor network traffic to Server1 by using Network Monitor.EMonitor the IIS logs on Server1.