单选题Prior to applying SCREEN options to drop traffic, you want to determine how your configuration will affect traffic. Which mechanism would you configure to achieve this objective?()Athe log option for the particular SCREEN optionBthe permit option for the particular SCREEN optionCthe SCREEN option, because it does not drop traffic by defaultDthe alarm-without-drop option for the particular SCREEN option

单选题
Prior to applying SCREEN options to drop traffic, you want to determine how your configuration will affect traffic. Which mechanism would you configure to achieve this objective?()
A

the log option for the particular SCREEN option

B

the permit option for the particular SCREEN option

C

the SCREEN option, because it does not drop traffic by default

D

the alarm-without-drop option for the particular SCREEN option


参考解析

解析: 暂无解析

相关考题:

You want to test a configured screen value prior to deploying.Which statement will allow you to accomplish this?() A. [edit security screen] user@host# show ids-option untrust-screen { alarm-test-only; }B. [edit security screen] user@host# show ids-option untrust-screen { alarm-without-drop; }C. [edit security screen] user@host# show ids-option untrust-screen { alarm-no-drop; }D. [edit security screen] user@host# show ids-option untrust-screen { test-without-drop; }

Which two statements about the use of SCREEN options are correct? ()(Choose two.) A. SCREEN options offer protection against various attacksB. SCREEN options are deployed prior to route and policy processing in first path packet processingC. SCREEN options are deployed at the ingress and egress sides of a packet flowD. SCREEN options, you must take special care to protect OSPF

You are required to configure a SCREEN option that enables IP source route option detection.Which twoconfigurations meet this requirement?() (Choose two.) A. [edit security screen] user@host# show ids-option protectFromFlood { ip { loose-source-route-option; strict-source-route-option; } }B. [edit security screen] user@host# show ids-option protectFromFlood { ip { source-route-option; } }C. [edit security screen] user@host# show ids-option protectFromFlood { ip { record-route-option; security-option; } }D. [edit security screen] user@host# show ids-option protectFromFlood { ip { strict-source-route-option; record-route-option; } }

You want to test a configured screen value prior to deploying.Which statement will allow you to accomplish this?()A、[edit security screen] user@host# show ids-option untrust-screen { alarm-test-only; }B、[edit security screen] user@host# show ids-option untrust-screen { alarm-without-drop; }C、[edit security screen] user@host# show ids-option untrust-screen { alarm-no-drop; }D、[edit security screen] user@host# show ids-option untrust-screen { test-without-drop; }

Which two statements are true regarding trace options on Junos devices?()A、You can see the contents of the log file by entering the show log filename commandB、Trace options will send information to your screen automaticallyC、Trace options are limited to one protocol at a timeD、The file name and set of flags may be specified when enabling trace options

Which two statements about the use of SCREEN options are correct? ()(Choose two.)A、SCREEN options offer protection against various attacksB、SCREEN options are deployed prior to route and policy processing in first path packet processingC、SCREEN options are deployed at the ingress and egress sides of a packet flowD、SCREEN options, you must take special care to protect OSPF

You are required to configure a SCREEN option that enables IP source route option detection.Which twoconfigurations meet this requirement?() (Choose two.)A、[edit security screen] user@host# show ids-option protectFromFlood { ip { loose-source-route-option; strict-source-route-option; } }B、[edit security screen] user@host# show ids-option protectFromFlood { ip { source-route-option; } }C、[edit security screen] user@host# show ids-option protectFromFlood { ip { record-route-option; security-option; } }D、[edit security screen] user@host# show ids-option protectFromFlood { ip { strict-source-route-option; record-route-option; } }

Where do you configure SCREEN options?()A、zones on which an attack might arriveB、zones you want to protect from attackC、interfaces on which an attack might arriveD、interfaces you want to protect from attack

Prior to applying SCREEN options to drop traffic, you want to determine how your configuration will affect traffic. Which mechanism would you configure to achieve this objective?()A、the log option for the particular SCREEN optionB、the permit option for the particular SCREEN optionC、the SCREEN option, because it does not drop traffic by defaultD、the alarm-without-drop option for the particular SCREEN option

You want to migrate your application from the development environment to the production environment. While doing the task, you want the database objects owned by the user DEVUSER in the development environment to be moved to the user APPS in the production environment. Which option of Oracle Data Pump Import would you use to achieve this objective?()A、ownerB、touserC、includeD、schemasE、fromuserF、transformG、remap_schemaH、remap_datafileI、reuse_datafilesJ、remap_tablespace

In one of your online transaction processing (OLTP) applications, users are manipulating and querying a database table simultaneously. From the Segment Advisor, you find that one of the tables is highly fragmented and you want to shrink the table immediately without affecting the currently active queries.  Which option would you use with the ALTER TABLE command to achieve this objective?()A、REBUILDB、CASCADEC、TRUNCATED、ROW MOVEMENTE、SHRINK SPACE COMPACTF、SHRINK SPACE CASCADE

In your Automatic Storage Management (ASM) instance, one of the nonempty disk groups, DGROUP1, is no longer required and you want this disk group to be removed. You execute the following command to achieve this objective:  DROP DISKGROUP dgroup1 EXCLUDING CONTENTS;  What would be the result of this command?()A、 This command would result in an error because the disk group is not empty.B、 The command would distribute the contents of the specified disk group among all other disk groups and then drop the specified disk group.C、 The command would result in the contents being moved to the parent disk group and dropping of the disk group.D、 The command would result in the disk group being marked as INVALID because it cannot be dropped.E、 The command would drop the disk group, ignoring the EXCLUDING CONTENTS option.

An important tablespace of your database is dropped by mistake. You use the Flashback Database feature to retrieve the tablespace. You perform the following steps to retrieve the tablespace:   1. You log on to Enterprise Manager as SYSDBA.    2. You select the maintenance screen.    3. You choose Perform Recovery option on the maintenance screen.    4. You choose Whole Database in the Object Type drop-down list Perform Recovery: Type screen. 5. You choose Recover to Current Time from the Operation Type on the Perform Recovery: Type screen.    6. You provide the Host Credentials for a database user. on the Perform Recovery: Type screen.    7. You click the continue button.    An information screen appears saying that the database is unavailable. What is this information screen?()A、Recovery ManagerB、Recovery WindowC、Recovery WizardD、Enterprise Manager Home Page

You are the administrator of your company's network. A use named Michael has limited dexterity, which prevents him from using a standard keyboard to complete his daily computing tasks. You want to configure his Windows 2000 Professional computer to use the appropriate accessibility options. You logon to Michael’s computer by using Michael’s user account, which is a member of local users group. You configure the stickykeys, filterkeys and togglekeys options. You then log off. Michael logs on to the computer by using this user account. Michael is able to use the accessibility option that you have configured. However, when he returns from lunch, the accessibility options are automatically turned off. What should you do? ()A、Use Accessibility Options in Control Panel to reconfigure accessibility idle time settingsB、Use Accessibility Options in Control Panel to enable the FilterKeys option to reconfigure the time settingC、Use Utility Manager to configure the accessibility options to start automatically when Windows 2000 Professional loadsD、Use Utility Manager to increase accessibility idle time setting for Michael’s accessibility options, and save the settings.

You use two user accounts for your computer: standard user and administrator. You log on to your computer as standard user but are unable to make advanced configuration changes. You need to make advanced configuration changes while you are logged on as a standard user.  What should you do? ()A、Enable the User Account Control: Only elevate executables that are signed and validated option.B、Disable the User Account Control: Only elevate executables that are signed and validated option.C、Configure the User Account Control: Behavior of the elevation prompt for standard users setting to the Prompt for credentials option.D、Configure the User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode setting to the Prompt for consent option.

You are the administrator of your company’s network. A user name Andrew has limited dexterity, which prevents him from using standard keyboard when completing his daily tasks. You configure Windows 2000 Professional to use sticky keys and screen keyboard options. You save the accessibility options to a shared folder on the local hard disk of Andrews’s computer. You want to configure the same options for another user Peter. You log on to Peter’s computer using his local user account and you access the folder over the network from Peter’s computer. You select the .acw file from the shared folder to set up Peter’s computer to use the accessibility option. You receive an error message as follows: " There was a problem running the file when running the accessibility wizard". What should you do to install the accessibility features on Peter’s computer?()A、Copy the .acw file to the c;/documents/setting/default user folderB、Save the accessibility option to the floppy disk and change the permission to allow full control  of the fileC、Resume the setting for the option by using utility manager, then copy the file to Peter’s local  profile folderD、Change the permission of the .acw file in the folder to allow access for Peter’s user account.

单选题You want to migrate your application from the development environment to the production environment. While doing the task, you want the database objects owned by the user DEVUSER in the development environment to be moved to the user APPS in the production environment. Which option of Oracle Data Pump Import would you use to achieve this objective?()AownerBtouserCincludeDschemasEfromuserFtransformGremap_schemaHremap_datafileIreuse_datafilesJremap_tablespace

单选题You want a record of all queries that are not using indexes. How would you achieve this?()ABy enabling the Slow Query Log because all queries that are not using indexes will be logged automaticallyBBy enabling the Error Log because not using indexes is an errorCBy enabling the Slow Query Log and using the – log-queries-not-using-indexes optionDBy enabling the Error Log and using the – log-queries-not-using-indexes option

单选题You want to create a new optimized database for your transactional production environment to be used by a financial application. While creating the database, you want the Oracle software to take care of all basic settings to optimize the database performance. Which method would you use to achieve this objective?()AUse the CREATE DATABASE .. command to create the database with Oracle-managed files. BUse the Database Configuration Assistant (DBCA) to create the database with Oracle-managed files. CUse Enterprise Manager to create a new database with the Online Transaction Processing (OLTP) option. DUse Database Configuration Assistant (DBCA) to create the database with Transaction Processing template. EUse the CREATE DATABASE .. command to create the database with Automatic Storage Management (ASM) file system.

单选题In one of your online transaction processing (OLTP) applications, users are manipulating and querying a database table simultaneously. From the Segment Advisor, you find that one of the tables is highly fragmented and you want to shrink the table immediately without affecting the currently active queries. Which option would you use with the ALTER TABLE command to achieve this objective?()A REBUILDB CASCADEC TRUNCATED ROW MOVEMENTE SHRINK SPACE COMPACTF SHRINK SPACE CASCADE

单选题Prior to applying SCREEN options to drop traffic, you want to determine how your configuration will affect traffic. Which mechanism would you configure to achieve this objective?()Athe log option for the particular SCREEN optionBthe permit option for the particular SCREEN optionCthe SCREEN option, because it does not drop traffic by defaultDthe alarm-without-drop option for the particular SCREEN option

单选题You are the administrator of your company’s network. A user name Andrew has limited dexterity, which prevents him from using standard keyboard when completing his daily tasks. You configure Windows 2000 Professional to use sticky keys and screen keyboard options. You save the accessibility options to a shared folder on the local hard disk of Andrews’s computer. You want to configure the same options for another user Peter. You log on to Peter’s computer using his local user account and you access the folder over the network from Peter’s computer. You select the .acw file from the shared folder to set up Peter’s computer to use the accessibility option. You receive an error message as follows: " There was a problem running the file when running the accessibility wizard". What should you do to install the accessibility features on Peter’s computer?()ACopy the .acw file to the c;/documents/setting/default user folderBSave the accessibility option to the floppy disk and change the permission to allow full control  of the fileCResume the setting for the option by using utility manager, then copy the file to Peter’s local  profile folderDChange the permission of the .acw file in the folder to allow access for Peter’s user account.

单选题You must configure a SCREEN option that would protect your device from a session table flood.Which configuration meets this requirement?()A AB BC CD D

单选题An important tablespace of your database is dropped by mistake. You use the Flashback Database feature to retrieve the tablespace. You perform the following steps to retrieve the tablespace:   1. You log on to Enterprise Manager as SYSDBA.    2. You select the maintenance screen.    3. You choose Perform Recovery option on the maintenance screen.    4. You choose Whole Database in the Object Type drop-down list Perform Recovery: Type screen. 5. You choose Recover to Current Time from the Operation Type on the Perform Recovery: Type screen.    6. You provide the Host Credentials for a database user. on the Perform Recovery: Type screen.    7. You click the continue button.    An information screen appears saying that the database is unavailable. What is this information screen?()ARecovery ManagerBRecovery WindowCRecovery WizardDEnterprise Manager Home Page

单选题Where do you configure SCREEN options?()Azones on which an attack might arriveBzones you want to protect from attackCinterfaces on which an attack might arriveDinterfaces you want to protect from attack

单选题In one of your online transaction processing (OLTP) applications, users are manipulating and querying a database table simultaneously. From the Segment Advisor, you find that one of the tables is highly fragmented and you want to shrink the table immediately without affecting the currently active queries.  Which option would you use with the ALTER TABLE command to achieve this objective?()AREBUILDBCASCADECTRUNCATEDROW MOVEMENTESHRINK SPACE COMPACTFSHRINK SPACE CASCADE

单选题You are the administrator of your company's network. A use named Michael has limited dexterity, which prevents him from using a standard keyboard to complete his daily computing tasks. You want to configure his Windows 2000 Professional computer to use the appropriate accessibility options. You logon to Michael’s computer by using Michael’s user account, which is a member of local users group. You configure the stickykeys, filterkeys and togglekeys options. You then log off. Michael logs on to the computer by using this user account. Michael is able to use the accessibility option that you have configured. However, when he returns from lunch, the accessibility options are automatically turned off. What should you do? ()AUse Accessibility Options in Control Panel to reconfigure accessibility idle time settingsBUse Accessibility Options in Control Panel to enable the FilterKeys option to reconfigure the time settingCUse Utility Manager to configure the accessibility options to start automatically when Windows 2000 Professional loadsDUse Utility Manager to increase accessibility idle time setting for Michael’s accessibility options, and save the settings.

单选题You want to test a configured screen value prior to deploying.Which statement will allow you to accomplish this?()A[edit security screen] user@host# show ids-option untrust-screen { alarm-test-only; }B[edit security screen] user@host# show ids-option untrust-screen { alarm-without-drop; }C[edit security screen] user@host# show ids-option untrust-screen { alarm-no-drop; }D[edit security screen] user@host# show ids-option untrust-screen { test-without-drop; }