多选题You are required to configure a SCREEN option that enables IP source route option detection.Which twoconfigurations meet this requirement?() (Choose two.)A[edit security screen] user@host# show ids-option protectFromFlood { ip { loose-source-route-option; strict-source-route-option; } }B[edit security screen] user@host# show ids-option protectFromFlood { ip { source-route-option; } }C[edit security screen] user@host# show ids-option protectFromFlood { ip { record-route-option; security-option; } }D[edit security screen] user@host# show ids-option protectFromFlood { ip { strict-source-route-option; record-route-option; } }

多选题
You are required to configure a SCREEN option that enables IP source route option detection.Which twoconfigurations meet this requirement?() (Choose two.)
A

[edit security screen] user@host# show ids-option protectFromFlood { ip { loose-source-route-option; strict-source-route-option; } }

B

[edit security screen] user@host# show ids-option protectFromFlood { ip { source-route-option; } }

C

[edit security screen] user@host# show ids-option protectFromFlood { ip { record-route-option; security-option; } }

D

[edit security screen] user@host# show ids-option protectFromFlood { ip { strict-source-route-option; record-route-option; } }


参考解析

解析: 暂无解析

相关考题:

●A word processor enables you to create a (70) ,store it electronically on a disk,display it on a screen,modify it by entering commands and characters from the keyboard,and print it on a printer.(70) A.fileB.documentC.textD.paper

A word processor enables you to create a(66)., store it electronically on a disk, display it on a screen, modify it by entering commands and characters from the keyboard, and print it on a printer.A.fileB.documentC.textD.paper

You want to test a configured screen value prior to deploying.Which statement will allow you to accomplish this?() A. [edit security screen] user@host# show ids-option untrust-screen { alarm-test-only; }B. [edit security screen] user@host# show ids-option untrust-screen { alarm-without-drop; }C. [edit security screen] user@host# show ids-option untrust-screen { alarm-no-drop; }D. [edit security screen] user@host# show ids-option untrust-screen { test-without-drop; }

You are required to configure a SCREEN option that enables IP source route option detection.Which twoconfigurations meet this requirement?() (Choose two.) A. [edit security screen] user@host# show ids-option protectFromFlood { ip { loose-source-route-option; strict-source-route-option; } }B. [edit security screen] user@host# show ids-option protectFromFlood { ip { source-route-option; } }C. [edit security screen] user@host# show ids-option protectFromFlood { ip { record-route-option; security-option; } }D. [edit security screen] user@host# show ids-option protectFromFlood { ip { strict-source-route-option; record-route-option; } }

You want to test a configured screen value prior to deploying.Which statement will allow you to accomplish this?()A、[edit security screen] user@host# show ids-option untrust-screen { alarm-test-only; }B、[edit security screen] user@host# show ids-option untrust-screen { alarm-without-drop; }C、[edit security screen] user@host# show ids-option untrust-screen { alarm-no-drop; }D、[edit security screen] user@host# show ids-option untrust-screen { test-without-drop; }

As the network technician at Company, you need to configure DHCP snooping on a new switch.   Which three steps are required? ()A、 Configure the switch to insert and remove DHCP relay information (option-82 field) in forwarded  DHCP request messages.B、 Configure DHCP snooping globally.C、 Configure the switch as a DHCP server.D、 Configure DHCP snooping on an interface.E、 Configure all interfaces as DHCP snooping trusted interfaces.F、 Configure DHCP snooping on a VLAN or range of VLANs.

Prior to applying SCREEN options to drop traffic, you want to determine how your configuration will affect traffic. Which mechanism would you configure to achieve this objective?()A、the log option for the particular SCREEN optionB、the permit option for the particular SCREEN optionC、the SCREEN option, because it does not drop traffic by defaultD、the alarm-without-drop option for the particular SCREEN option

You are performing a backup of your database across the network. While taking the backup, you want to save space on the storage media and reduce the network bandwidth. Which command will you issue to configure the required type of backup?()A、 CONFIGURE DEVICE TYPE TO sbt BACKUP TYPE TO BACKUPSET;B、 CONFIGURE DEVICE TYPE TO disk BACKUP TYPE TO COPY;C、 CONFIGURE DEVICE TYPE TO sbt BACKUP TYPE TO COMPRESSED BACKUPSET;D、 CONFIGURE DEVICE TYPE TO sbt BACKUP TYPE TO COMPRESSED COPY;

You need to design a method to implement account policies that meets the requirements in the written security policy. What should you do?()A、Create a GPO and link it to the New York OU, to the Denver OU, and to the Dallas OU.Configure the GPO with the required account policy settingsB、On all computers in the domain, configure the Local Security Policy7 with the required account policy settingsC、Configure the Default Domain Policy GPO with the required account policy settingsD、Configure the Default Domain Controllers Policy GPO with the required account policy settings

You are the administrator of you company network. A user named Peter requests assistance in his Windows 2000 Professional portable computer. Peter is preparing for his test and wants to optimize the battery life for his portable computer. You want to configure Peter’s computer to save the contents of memory on hard disk and then shutdown when Peter presses the sleep button.  What should you do? ()A、Configure power settings to use the standard option. B、Configure power settings to use the power off option. C、Configure power settings to use the hibernate option. D、Configure power settings to use always on power scheme. E、Configure the computer to use the portable laptop power scheme.

Your portable computer is in sleep mode. When you resume work on the portable computer, you are not prompted for a password.  You need to ensure that you are prompted for a password each time the portable computer recovers from sleep mode.  What should you do?()A、Configure the computer to hibernate when not in use.B、In the current power plan settings, configure the computer to require a password when recovering from sleep mode.C、Configure the computer to use the High Performance power plan.D、Configure the screen saver settings to require a password on resumption of work.

You deploy mobile devices that run Microsoft Windows Mobile 5.0 Pocket PC Phone Edition.   You need to prevent the device screen from turning dark when users view documents.   Which two actions should you perform?()A、Configure the backlight brightness setting to maximum.B、Display the soft input panel (SIP) when users read documents.C、Increase the value of the Turn off device if not used for option.D、Increase the value of the Turn off backlight if device is not used for option.

You are the network administrator for Company.com.  Two users, Roderick and Keith, share a Windows 2000 Professional computer. The computer remains logged on with a shared user account named Kiosk at all times. Roderick has limited dexterity, which prevents him from using the standard keyboard when completing his daily computing tasks. You configure his Windows 2000 Professional computer to use on-screen keyboard and ToggleKeys option. You have the accessibility option settings to the desktop. Keith does not want to use the on-screen keyboard when he uses the computer.   You need to enable both users to quickly switch between their preferred settings.   What should you do?()A、Create a roaming user profile for the Kiosk user account.B、Create an .acw file containing Peter’s preferred settings and save it to the desktop.C、Run the Accessibility wizard and select Restore Defaults.D、Use Task Manager to end the Explorer.exe process.

All servers on your network run Windows Server 2008 R2. You deploy Remote Desktop Services  (RDS).You are configuring the Remote Desktop Session Host (RD Session Host) role service. You need to ensure that authentication occurs before the Remote Desktop Connection logon screen appears. What should you do?()A、In the RD Session Host Configuration tool, select the Allow connections only from computers running Remote Desktop with Network Level Authentication option.B、In the RD Session Host Configuration tool, select the Allow connections from computers running any version of Remote Desktop option.C、In the Group Policy Object Editor, configure the Set TS Gateway authentication method setting to Use smart card.D、In the Group Policy Object Editor, configure the Set TS Gateway authentication method setting to Use locally logged-on credentials.

When you use Microsoft Windows Media Player to begin playback of a music file, you receive the following error message: "You do not have the rights to play this file."  You need to configure Windows Media Player to ensure playback of protected digital media.  What should you do? ()A、Disable the Set clock on devices automatically option.B、Enable the Automatically check if protected files need to be refreshed option.C、Enable the Update music files by retrieving media info from the Internet option.D、Enable the Download usage rights automatically when I play or sync a file option.

You plan to give an on-site presentation. The external display available for your audience is a 42-inch flat panel monitor.  You need to ensure that the presentation on the monitor of your computer is duplicated on the external monitor for the audience.  What should you do?()A、Click the Show my desktop on the external display only option.B、Configure the Presentation settings to mirror your desktop on the external display. C、Configure the Presentation settings to extend your desktop to the external display.D、Reduce the screen resolution of your primary display to a value equal to the maximum resolution of the external display.

You configure a subscription to a Really Simple Syndication (RSS) feed that often includes large videos. You need to minimize delay while watching the videos.  What should you do?()A、Configure the RSS feed to download attached files.B、Configure the RSS feed to retain the most recent items.C、Enable the Turn on feed reading view option of the RSS feed.D、Enable the Automatically mark feed as read when reading a feed option of the RSS feed.

Your company has a main office and five branch offices that are connected by WAN links. The  company has an Active Directory domain named contoso.com.   Each branch office has a member server configured as a DNS server. All branch office DNS servers host  a secondary zone for contoso.com.   The safer , easier way to help you pass any IT exams.  7 / 90   You need to configure the contoso.com zone to resolve client queries for at least four days in the event  that a WAN link fails.  What should you do()A、Configure the Expires after option for the contoso.com zone to 4 days.B、Configure the Retry interval option for the contoso.com zone to 4 days.C、Configure the Refresh interval option for the contoso.com zone to 4 days.D、Configure the Minimum (default) TTL option for the contoso.com zone to 4 days.

Your computer hardware supports Microsoft Windows Aero Experience. The transparency feature does not appear to be enabled. You need to use the transparency feature.  What are the two possible ways to achieve this goal? ()A、Configure theme settings to Windows Vista.B、Increase the screen resolution to 1024 x 768 pixels or higher.C、Change the Color scheme option to Windows Aero.D、Change the Visual effects option to Let Windows choose whats best for my computer

You have two desktop computers at your home. You establish a remote desktop connection from one computer to the other.  The remote session fails to show the desktop background of the remote computer. You need to view the desktop background when you establish a remote session.  What should you do?()A、Copy the desktop background image file from the remote computer to the local computer. B、Configure the Remote Desktop Connection properties to display the remote desktop in full screen.C、Click the Broadband option on the Experience tab of the Remote Desktop Connection properties.D、Click the LAN (10Mbps or higher) option on the Experience tab of the Remote Desktop Connection properties.

You use two user accounts for your computer: standard user and administrator. You log on to your computer as standard user but are unable to make advanced configuration changes. You need to make advanced configuration changes while you are logged on as a standard user.  What should you do? ()A、Enable the User Account Control: Only elevate executables that are signed and validated option.B、Disable the User Account Control: Only elevate executables that are signed and validated option.C、Configure the User Account Control: Behavior of the elevation prompt for standard users setting to the Prompt for credentials option.D、Configure the User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode setting to the Prompt for consent option.

单选题You need to design a method to implement account policies that meets the requirements in the written security policy. What should you do?()ACreate a GPO and link it to the New York OU, to the Denver OU, and to the Dallas OU.Configure the GPO with the required account policy settingsBOn all computers in the domain, configure the Local Security Policy7 with the required account policy settingsCConfigure the Default Domain Policy GPO with the required account policy settingsDConfigure the Default Domain Controllers Policy GPO with the required account policy settings

单选题An important tablespace of your database is dropped by mistake. You use the Flashback Database feature to retrieve the tablespace. You perform the following steps to retrieve the tablespace:   1. You log on to Enterprise Manager as SYSDBA.    2. You select the maintenance screen.    3. You choose Perform Recovery option on the maintenance screen.    4. You choose Whole Database in the Object Type drop-down list Perform Recovery: Type screen. 5. You choose Recover to Current Time from the Operation Type on the Perform Recovery: Type screen.    6. You provide the Host Credentials for a database user. on the Perform Recovery: Type screen.    7. You click the continue button.    An information screen appears saying that the database is unavailable. What is this information screen?()ARecovery ManagerBRecovery WindowCRecovery WizardDEnterprise Manager Home Page

单选题Prior to applying SCREEN options to drop traffic, you want to determine how your configuration will affect traffic. Which mechanism would you configure to achieve this objective?()Athe log option for the particular SCREEN optionBthe permit option for the particular SCREEN optionCthe SCREEN option, because it does not drop traffic by defaultDthe alarm-without-drop option for the particular SCREEN option

单选题You are the administrator of your company’s network. A user name Andrew has limited dexterity, which prevents him from using standard keyboard when completing his daily tasks. You configure Windows 2000 Professional to use sticky keys and screen keyboard options. You save the accessibility options to a shared folder on the local hard disk of Andrews’s computer. You want to configure the same options for another user Peter. You log on to Peter’s computer using his local user account and you access the folder over the network from Peter’s computer. You select the .acw file from the shared folder to set up Peter’s computer to use the accessibility option. You receive an error message as follows: " There was a problem running the file when running the accessibility wizard". What should you do to install the accessibility features on Peter’s computer?()ACopy the .acw file to the c;/documents/setting/default user folderBSave the accessibility option to the floppy disk and change the permission to allow full control  of the fileCResume the setting for the option by using utility manager, then copy the file to Peter’s local  profile folderDChange the permission of the .acw file in the folder to allow access for Peter’s user account.

单选题You must configure a SCREEN option that would protect your device from a session table flood.Which configuration meets this requirement?()A AB BC CD D

单选题Where do you configure SCREEN options?()Azones on which an attack might arriveBzones you want to protect from attackCinterfaces on which an attack might arriveDinterfaces you want to protect from attack