Mandatory Access requires that sensitivity labels be attached to all objects. Which of the following would be designated as objects on a MAC system?强制访问控制需要敏感性标识被标识在所有客体,以下哪一个将在访问控制系统上标识为一个客体?()A、users, windows, and programs.用户,窗口,以及程序B、files, directories, and print queue文件、 目录和打印队列C、devices, processes, I/O pipe, and sockets.设备,进程,输入输出通道以及接口D、files, directories, processes, and sockets.文件、目录,进程,以及接口

Mandatory Access requires that sensitivity labels be attached to all objects. Which of the following would be designated as objects on a MAC system?强制访问控制需要敏感性标识被标识在所有客体,以下哪一个将在访问控制系统上标识为一个客体?()

  • A、users, windows, and programs.用户,窗口,以及程序
  • B、files, directories, and print queue文件、 目录和打印队列
  • C、devices, processes, I/O pipe, and sockets.设备,进程,输入输出通道以及接口
  • D、files, directories, processes, and sockets.文件、目录,进程,以及接口

相关考题:

有关系S(S#,SNAME,SAGE),C(C#,CNAME),SC(S#,C#,GRADE)。其中S#是学生号,SNAME是学生姓名,SAGE是学生年龄, C#是课程号,CNAME是课程名称。要查询选修“ACCESS”课的年龄不小于20的全体学生姓名的SQL语句是SELECT SNAME FROM S,C,SC WHERE子句。这里的WHERE子句的内容是( )。A. S.S# = SC.S# and C.C# = SC.C# and SAGE=20 and CNAME=‘ACCESS’B. S.S# = SC.S# and C.C# = SC.C# and SAGE in=20 and CNAME in ‘ACCESS’C. SAGE in=20 and CNAME in ‘ACCESS’D. SAGE=20 and CNAME=’ ACCESS’

An enterprise has plans to start adding IPv6 support. The initial deployment requires support from some IPv6 - only device s that need to access servers that support only IPv4.Which of the following tools would be most appropriate?()A. Native IPv6B. Point - to -point tunnelsC. Multipoint tunnelsD. NAT - PT

In Mandatory Access Control, sensitivity labels contain what information?在强制访问控制中,敏感性标识包含什么信息?()A、the item's classification对象的分类B、the item's classification and category set对象的分类和类别设置C、the item's classification, category set and compartment set对象的分类、 分类设置和隔间设置D、the item's classification and its compartment对象的分类以及它的间隔

What is one reason you might recommend a solution using only autonomous access points to a customer? ()A、 The customer requires Layer 3 roaming.B、 The customer requires immediate wire line integration with a catalyst 6500 switch.C、 The customer needs an outdoor-ready access point.D、 The customer wants the option to migrate to LWAPP.

Under U.S. regulatory domain, which channel plan delivers the proper coverage in a large lecturehall that requires four access points?()A、1, 4, 7, 11B、1, 4, 8. 11C、1, 6, 11, 1D、2, 4, 6, 8

Which two pieces of information are needed when declaring the web resource collection in the deployment descriptor?()A、 the URL pattern that requires authorizationB、 the HTTP methods that require authorizationC、 the users allowed access to the web resourceD、 the J2EE roles allowed access to the web resourceE、 the authentication mechanism required by the web resource

You are installing a new deployment of the Junos Pulse Access Control Service. In your environment, you have VoIP handsets that support 802.1X authentication with EAP-MD5.Which deployment constraint must you consider?()A、EAP-MD5 is not supported by the Junos Pulse Access Control ServiceB、EAP-MD5 requires passwords to be stored in an encrypted format.C、EAP-MD5 requires passwords to be stored in a clear text format.D、EAP-MD5 performs a real time hash of the handset's MAC address.

Which statement regarding 802.1X is true?()A、802.1X is simple to implement on any workstation.B、802.1X requires access-lists to allow IP voice traffic across.C、Authentication is initiated when the workstation connects to an Ethernet port.D、802.1X requires HTTP access to initiate authentication.

On a Series 1010 lightweight access point, the alarm LED is flashing red, and all other LEDs are off. What is the lightweight access point indicating?()A、It has lost contact with controller.B、Its IP address already exists.C、It requires a code upgrade.D、It is operating normally.

Which two statements about a wireless repeater topology are true?()A、A wireless repeater is an access point that is not connected to the wired LAN.B、The repeater feature is only available in lightweight access point topologies.C、The SSID of the root access point must be configured on the repeater access point.D、This topology requires a 10 - 15 percent overlap between a wired access point and the wireless repeater.E、This topology requires a 15 - 25 percent overlap between a wired access point and the wireless repeater.F、To avoid interference, the repeater access point must use a different channel from what the root access point uses.

A class design requires that a member variable cannot be accessible directly outside the class. Which modifier should be used to obtain the access control?()    A、 publicB、 no modifierC、 protectedD、 private

Your corporate network has a member server named RAS1 that runs Windows Server 2008 R2. You configure RAS1 to use the Routing and Remote Access Services (RRAS).The companys remote access policy allows members of the Domain Users group to dial in to RAS1. The company issues smart cards to all employees.You need to ensure that smart card users are able to connect to RAS1 by using a dial-up connection.What should you do?()A、Install the Network Policy Server (NPS) server role on RAS1.B、Create a remote access policy that requires users to authenticate by using SPAP.C、Create a remote access policy that requires users to authenticate by using EAP-TLS.D、Create a remote access policy that requires users to authenticate by using MS-CHAP v2.

Your corporate network has a member server named RAS1 that runs Windows Server 2008. You configure RAS1 to use the Routing and Remote Access Service (RRAS) The companys remote access policy allows members of the Domain Users group to dial in to RAS1. The company issues smart cards to all employees. You need to ensure that smart card users are able to connect to RAS1 by using a dial-up connection. What should you do?()A、 Install the Network Policy Server (NPS) on the RAS1 serverB、 Create a remote access policy that requires users to authenticate by using SPAPC、 Create a remote access policy that requires users to authenticate by using EAP-TLSD、 Create a remote access policy that requires users to authenticate by using MS-CHAP v2

单选题In Mandatory Access Control, sensitivity labels contain what information?在强制访问控制中,敏感性标识包含什么信息?()Athe item's classification对象的分类Bthe item's classification and category set对象的分类和类别设置Cthe item's classification, category set and compartment set对象的分类、 分类设置和隔间设置Dthe item's classification and its compartment对象的分类以及它的间隔

单选题Which of the following are necessary components of a Multi-Level Security Policy?下列哪一项是多级安全策略必需的组件?()ASensitivity Labels for subjects objects and a system high evaluation.对主体和客体实施敏感性标识以及对其进行系统高的评价BSecurity Clearances for subjects Security Labels for objects and Mandatory Access Control.对主体和客体安全标识的安全许可以及强制访问控制CSensitivity Labels for only objects and Mandatory Access Control.只针对客体的敏感性标识和强制访问控制DSensitivity Labels for subjects objects and Discretionary Access Control.对主体及客体的敏感性表情和自主访问控制

单选题Your corporate network has a member server named RAS1 that runs Windows Server 2008 R2. You configure RAS1 to use the Routing and Remote Access Services (RRAS). The companyˉs remote access policy allows members of the Domain Users group to dial in to RAS1. The company issues smart cards to all employees. You need to ensure that smart card users are able to connect to RAS1 by using a dial-up connection. What should you do?()AInstall the Network Policy Server (NPS) server role on RAS1.BCreate a remote access policy that requires users to authenticate by using SPAP.CCreate a remote access policy that requires users to authenticate by using EAP-TLS.DCreate a remote access policy that requires users to authenticate by using MS-CHAP v2.

单选题Under U.S. regulatory domain, which channel plan delivers the proper coverage in a large lecturehall that requires four access points?()A1, 4, 7, 11B1, 4, 8. 11C1, 6, 11, 1D2, 4, 6, 8

单选题On a cisco 1000 series controller-based access point,the alarm led is flashing red,but the other leds are off. What is this access point indicating?()Aits ip address already exists.Bit is operating normally.Cit requires a code upgrade.Dit has lost contact with the controller.

单选题You are installing a new deployment of the Junos Pulse Access Control Service. In your environment, you have VoIP handsets that support 802.1X authentication with EAP-MD5.Which deployment constraint must you consider?()AEAP-MD5 is not supported by the Junos Pulse Access Control ServiceBEAP-MD5 requires passwords to be stored in an encrypted format.CEAP-MD5 requires passwords to be stored in a clear text format.DEAP-MD5 performs a real time hash of the handset's MAC address.

多选题You administer a network containing SRX Series firewalls. New policy requires that you implement MAG Series devices to provide access control for end users. The policy requires that the SRX Series devices dynamically enforce security policy based on the source IP address of the user. The policy also requires that the users communicate with protected resources using encrypted traffic. Which two statements are true?()AThe endpoints can use agentless access.BEncrypted traffic flows between the endpoint and the enforcer.CEncrypted traffic flows between the endpoint and the protected resourceDThe endpoints can use the Odyssey Access Client.

单选题A class design requires that a member variable cannot be accessible directly outside the class. Which modifier should be used to obtain the access control?()A publicB no modifierC protectedD private

多选题Which two statements about a wireless repeater topology are true?()AA wireless repeater is an access point that is not connected to the wired LAN.BThe repeater feature is only available in lightweight access point topologies.CThe SSID of the root access point must be configured on the repeater access point.DThis topology requires a 10 - 15 percent overlap between a wired access point and the wireless repeater.EThis topology requires a 15 - 25 percent overlap between a wired access point and the wireless repeater.FTo avoid interference, the repeater access point must use a different channel from what the root access point uses.

单选题An enterprise has plans to start adding IPv6 support. The initial deployment requires support from some IPv6 - only device s that need to access servers that support only IPv4. Which of the following tools would be most appropriate?()ANative IPv6BPoint - to -point tunnelsCMultipoint tunnelsDNAT - PT

单选题A design requires 100 access points with high channel bandwidth and disabled lower data rates.How are the data rates set on the Cisco WLC and Cisco WCS?()Aper SSIDBper access pointCgloballyDper WLAN and radio

单选题On a series 1010 lightweight access point, the alarm led is flashing red, and all other leds are off. What is the lightweight access point indicating?()Ait has lost contact with controller.Bits ip address already exists.Cit requires a code upgrade.Dit is operating normally.

单选题The maxim of _____ requires that a participant’s contribution be relevant to the conversation.AquantityBqualityCmannerDrelation