For security reasons, an administrator is asked to modify the system to prevent someone from leaving a terminal logged in. To enable a five minute timeout for all users, what would need to be done to accomplish this task?()A、Add the following line to /etc/environment: TMOUT=300B、Add the following lines to /.profile TMOUT=5 export TMOUTC、Execute the following command: chuser -u ALL -a TIMEOUT=5MD、Execute the following command: chsec -u ALL -a TIMEOUT=600
For security reasons, an administrator is asked to modify the system to prevent someone from leaving a terminal logged in. To enable a five minute timeout for all users, what would need to be done to accomplish this task?()
- A、Add the following line to /etc/environment: TMOUT=300
- B、Add the following lines to /.profile TMOUT=5 export TMOUT
- C、Execute the following command: chuser -u ALL -a TIMEOUT=5M
- D、Execute the following command: chsec -u ALL -a TIMEOUT=600
相关考题:
China Calls for Unified International Rules Against Internet CrimeCyber security has always been a serious issue as the Internet industry is ever growing. Nowadays, people can easily connect to the Internet with a simple click of a mouse. But the global network can be easily destroyed by a single leak. The world is facing a difficult situation in keeping web security.Currently, there are no unified international rules for maintaining Internet security. China has called for unified international rules against Internet crime. Last year China and some other countries handed in a draft Code of Conduct on Information Security to the UN.World leaders and experts discussed the possible Internet threats facing the world. They agreed that the only way to deal with Internet security threats was to trust each other and strengthen cooperation. The threats cannot be solved by any one country alone. And for these reasons, countries would have a greater chance of trusting each other in dealing with such threats.Though great efforts were made to issue common regulations for the Internet, few results have been achieved yet. Theres still a long way to go for unified global Internet security rules and regulations.26. Maintaining web security is () for the world.A. easyB. a piece of cakeC. difficult27. There are () to maintain cyberspace security.A. no unified international regulationsB. unified international regulationsC. worldwide unified regulations28. The only way to deal with cyber security threats was to()A. depend on China and the United NationsB. strengthen international cooperation and trust each otherC. ask world leaders and experts for help29.().results have been achieved in terms of common regulations for the Internet.A. A lot ofB. FewC. Good30.()summited a draft Code of Conduct on Information Security.A. China onlyB. The United StatesC. China and some other countries
_______means the level for which appropriate additional protective security measures shall be maintained for a period of time as a result of heightened risk of a security incident.A.Security level 1B.Security level 2C.Security level 3D.Security level 4
Click the Exhibit button.What are two valid reasons for the output shown in the exhibit?() (Choose two.) A. The local Web-filtering daemon is not enabled or is not running.B. The integrated Web-filtering policy server is not reachable.C. No DNS is configured on the SRX Series device.D. No security policy is configured to use Web filtering.
For security reasons a network technician wants to install a Linux based email server, Microsoftweb services, and directory services on different servers.Which of the following technologies would be BEST to reduce hard ware costs?()A. VPN concentratorB. Virtual serversC. WirelessD. Multimode fiber
ASystempadministratorneedstosetthedefaultpasswordlengthforalluserstosixcharacters.Whichofthefollowingfilesneedstobeeditedtoaccomplishthis() A./etc/security/limitsB./etc/security/mkuser.sysC./etc/security/privD./etc/security/user
An operator is asked to shutdown the telnet service for security reasons. What are the appropriate commands to achieve this?() A. comment out telnetd in /etc/services refresh -s inetdB. comment out telnetd in /etc/inetd.conf refresh -s inetdC. comment out telnetd in /etc/rc.tcpip refresh -s telnetdD. comment out telnetd in /etc/inetd.conf refresh -s telnetd
There are many reasons why customers lack sufficient security measures on the network. Which two reasons for insufficient security are typical of the customers today?() A.the use of hosted email services eliminating the need for local securityB.the perceived costs of security solutionsC.the lack of risk analysisD.the lack of threats to their networkE.the belief that free security tools are sufficientF.the desire to avoid unnecessary technologies
For security reasons, the network administrator needs to prevent pings into the corporate networks from hosts outside the internetwork. Which protocol should be blocked with access control lists()。 A.IPB.ICMPC.TCPD.UDP
Which Cisco security tool can best determine it a Cisco ISR router is properly secured? ()A、 Cisco SDM Security AuditB、 Cisco Security MARSC、 Cisco Security Agent MCD、 Cisco Security IntelliShieldE、 CAN
What are two reasons that a network administrator would use access lists (Choose two.)()。A、to control vty access into a routerB、to control broadcast traffic through a routerC、to filter traffic as it passes through a routerD、to filter traffic that originates from the routerE、to replace passwords as a line of defense against security incursions
What are two reasons that a network administrator would use access lists? (Choose two.) ()。A、to control vty access into a router B、to control broadcast traffic through a router C、to filter traffic as it passes through a router D、to filter traffic that originates from the router E、to replace passwords as a line of defense against security incursions
What are three valid reasons to assign ports to VLANs on a switch? ()A、to make VTP easier to implementB、to isolate broadcast trafficC、to increase the size of the collision domainD、to allow more devices to connect to the networkE、to logically group hosts according to functionF、to increase network security
There are many reasons why customers lack sufficient security measures on the network. Which two reasons for insufficient security are typical of the customers today?()A、the use of hosted email services eliminating the need for local securityB、the perceived costs of security solutionsC、the lack of risk analysisD、the lack of threats to their networkE、the belief that free security tools are sufficientF、the desire to avoid unnecessary technologies
For security reasons a network technician wants to install a Linux based email server, Microsoft web services, and directory services on different servers. Which of the following technologies would be BEST to reduce hard ware costs?()A、VPN concentratorB、Virtual serversC、WirelessD、Multimode fiber
An administrator needs to configure a server to restrict mail traffic to an application server for security reasons. Which of the following techniques can be used to manage this?()A、 PATB、 ACLsC、 Subnet maskingD、 Port blocking
An operator is asked to shutdown the telnet service for security reasons. What are the appropriate commands to achieve this?()A、comment out telnetd in /etc/services refresh -s inetdB、comment out telnetd in /etc/inetd.conf refresh -s inetdC、comment out telnetd in /etc/rc.tcpip refresh -s telnetdD、comment out telnetd in /etc/inetd.conf refresh -s telnetd
For security reasons, an administrator is asked to modify the system to prevent someone from leaving a terminal logged in. Which of the following options would enable a five minute timeout for all users()A、Add the following line to /etc/environment: TMOUT=300B、Add the following lines to /.profile TMOUT=5 export TMOUTC、Run the following command: chuser -u ALL -a TIMEOUT=5MD、Run the following command: chsec -u ALL -a TIMEOUT=600
单选题()means the person on board the ship, accountable to the master, designated by the Company as responsible for the security of the ship, including implementation and maintenance of the ship security plan and for liaison with the company security officer and port facility security officers.AShip security officerBCompany security officerCPort facility security officerDPSC officer
单选题An administrator needs to configure a server to restrict mail traffic to an application server for security reasons. Which of the following techniques can be used to manage this?()A PATB ACLsC Subnet maskingD Port blocking
单选题()means the person designated as responsible for the development, implementation, revision and maintenance of the port facility security plan and for liaison with the ship security officers and company security officers.AShip security officerBCompany security officerCPort facility security officerDPSC officer
单选题() means the person designated by the Company for ensuring that a ship security assessment is carried out; that a ship security plan is developed, submitted for approval, and thereafter implemented and maintained and for liaison with port facility security officers and the ship security officer.AShip security officerBCompany security officerCPort facility security officerDPSC officer
单选题The ship security assessment is an essential and integral part of the process of developing and updating()Athe ship security planBthe company security planCthe port security planDthe national security plan
多选题What are three valid reasons to assign ports to VLANs on a switch?()Ato make VTP easier to implementBto isolate broadcast trafficCto increase the size of the collision domainDto allow more devices to connect to the networkEto logically group hosts according to functionFto increase network security
单选题For security reasons, the network administrator needs to prevent pings into the corporate networks from hosts outside the internetwork. Which protocol should be blocked with access control lists?()AIPBICMPCTCPDUDP
单选题Which operational mode command displays all active IPsec phase 2 security associations?()Ashow ike security-associationsBshow ipsec security-associationsCshow security ike security-associationsDshow security ipsec security-associations
多选题There are many reasons why customers lack sufficient security measures on the network. Which two reasons for insufficient security are typical of the customers today?()Athe desire to avoid unnecessary technologiesBthe belief that free security tools are sufficientCthe perceived costs of security solutionsDthe use of hosted email services eliminating the need for local securityEthe lack of threats to their networkFthe lack of risk analysis
单选题What does SSO stand for regarding ship security?()AShip security officeBShip security officerCShip security operatorDShip safety office