You are required to configure a SCREEN option that enables IP source route option detection.Which twoconfigurations meet this requirement?() (Choose two.)A、[edit security screen] user@host# show ids-option protectFromFlood { ip { loose-source-route-option; strict-source-route-option; } }B、[edit security screen] user@host# show ids-option protectFromFlood { ip { source-route-option; } }C、[edit security screen] user@host# show ids-option protectFromFlood { ip { record-route-option; security-option; } }D、[edit security screen] user@host# show ids-option protectFromFlood { ip { strict-source-route-option; record-route-option; } }

You are required to configure a SCREEN option that enables IP source route option detection.Which twoconfigurations meet this requirement?() (Choose two.)

  • A、[edit security screen] user@host# show ids-option protectFromFlood { ip { loose-source-route-option; strict-source-route-option; } }
  • B、[edit security screen] user@host# show ids-option protectFromFlood { ip { source-route-option; } }
  • C、[edit security screen] user@host# show ids-option protectFromFlood { ip { record-route-option; security-option; } }
  • D、[edit security screen] user@host# show ids-option protectFromFlood { ip { strict-source-route-option; record-route-option; } }

相关考题:

A Windows Communication Foundation (WCF) service is required to log all authorization attempts to the Windows Event Log. You need to configure a behavior and apply it to the service to support this requirement. Which behavior should you configure and apply?()A. service Authentication ManagerB. service AuthorizationC. service CredentialsD. service Security Audit

You are the administrator of Microsoft Windows 2000 computer. You are preparing to install SQL Server 2000 on the computer.Your company contains a variety of client computers that will connect to the SQL server 2000 computer by using a specific Net-Library, as shown in the following table.You need to allow the client computers to connect to the SQL Server 2000 computer. You also want to minimize the number of configuration changes required on the client computers.Which three actions should you take? (Each correct answer presents part of the solution. Choose three)A. Install SQL Server 2000 as a named instance.B. Install SQL Server 2000 as the default instance.C. Configure the new instance for Mixed Mode Authentication.D. Configure the new instance for Windows Authentication.E. Configure the server to use the Named Pipes, IPX/SPX, and TCP/IP Net-Libraries.F. Configure the server to use the Multiprotocol Net-Library.

As a network administrator, you are required to configure a switch port for a private Virtual LAN. In such a situation, which three of the following connection modes will be available during the configuration process? ()(Choose three.)A. isolated modeB. modular modeC. community modeD. promiscuous modeE. non-isolatedF. permanent

As an experienced technician, you are required to configure and verify SRM with SSO redundancy. In such a situation, you have to issue several commands in proper orders. Which of the following is correct?()A. show redundancy states, redundancy, mode ssoB. show redundancy states, mode sso, redundancyC. redundancy, mode sso, show redundancy statesD. mode sso, redundancy, show redundancy states

You need to configure a GRE tunnel on a IPSec router. When you are using the SDM to configurea GRE tunnel over IPsec, which two parameters are required when defining the tunnel interfaceinformation?()A、The crypto ACL numberB、The IPSEC mode (tunnel or transport)C、The GRE tunnel interface IP addressD、The GRE tunnel source interface or IP address, and tunnel destination IP addressE、The MTU size of the GRE tunnel interface

As the network technician at Company, you need to configure DHCP snooping on a new switch.   Which three steps are required? ()A、 Configure the switch to insert and remove DHCP relay information (option-82 field) in forwarded  DHCP request messages.B、 Configure DHCP snooping globally.C、 Configure the switch as a DHCP server.D、 Configure DHCP snooping on an interface.E、 Configure all interfaces as DHCP snooping trusted interfaces.F、 Configure DHCP snooping on a VLAN or range of VLANs.

An application accesses a small lookup table frequently. You notice that the required data blocks are getting aged out of the default buffer cache. How would you guarantee that the blocks for the table never age out?()A、Configure the KEEP buffer pool and alter the table with the corresponding storage clause.B、Increase the database buffer cache size.C、Configure the RECYCLE buffer pool and alter the table with the corresponding storage clause.D、Configure Automata Shared Memory Management.E、Configure Automatic Memory Management

You are the administrator of Company’s network.  A user named Sven has a Windows 2000 Professional portable computer. He has configured the portable computer with options that provide him with the maximum battery life. Sven reports that when the laptop resumes from standby mode he does not receive a prompt for the password.  You want to configure Sven’s portable computer to ensure that a password is required when the computer resumes from standby mode.   What should you do?()A、Reset Sven’s user account.B、Add Sven to the Power Users group.C、Configure the Advanced power options properties.D、Configure the power options to use the Home/Office Desk power scheme by default.E、Configure the power options to use the Portable/Laptop power scheme by default.

Cisco IOS is the software used on the vast majority of Cisco Systems routers and current Cisco network switches. As a network administrator, you are required to configure MPLS on Cisco IOS. In such a situation, which three of the following steps are necessary to take?()A、Start LDP.B、Enable CEF switching.C、Configure conditional label advertising.D、Enable label switching on frame mode interfaces.E、disable IP TTL propagationF、configure conditional label advertising

As a network administrator, you are required to configure a switch port for a private Virtual LAN. In such a situation, which three of the following connection modes will be available during the configuration process? ()(Choose three.)A、isolated modeB、modular modeC、community modeD、promiscuous modeE、non-isolatedF、permanent

Which two steps are required for a Kompella Layer 2 VPN?()A、Configure a site ID for each CEB、Configure a VPN label for each VPNC、Configure a MP-BGP session to each PED、Configure an Extended LDP Session to each PE

You are performing a backup of your database across the network. While taking the backup, you want to save space on the storage media and reduce the network bandwidth. Which command will you issue to configure the required type of backup?()A、 CONFIGURE DEVICE TYPE TO sbt BACKUP TYPE TO BACKUPSET;B、 CONFIGURE DEVICE TYPE TO disk BACKUP TYPE TO COPY;C、 CONFIGURE DEVICE TYPE TO sbt BACKUP TYPE TO COMPRESSED BACKUPSET;D、 CONFIGURE DEVICE TYPE TO sbt BACKUP TYPE TO COMPRESSED COPY;

You need to design a method to implement account policies that meets the requirements in the written security policy. What should you do?()A、Create a GPO and link it to the New York OU, to the Denver OU, and to the Dallas OU.Configure the GPO with the required account policy settingsB、On all computers in the domain, configure the Local Security Policy7 with the required account policy settingsC、Configure the Default Domain Policy GPO with the required account policy settingsD、Configure the Default Domain Controllers Policy GPO with the required account policy settings

You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. You intend to configure FILESTREAM data, enabling FILESTREAM for file I/O streaming access and allowing remote client computers to have streaming access to FILESTREAM data. You must make sure that FILESTREAM data is enabled. In the options below, which service should you configure? () A、You should configure Distributed File SystemB、You should configure SQL ServerC、You should configure SQL Server Full TextD、You should configure SQL Server VSS Writer

You are designing the settings for FinServ. You specify the permissions that will be used. You need to specify any additional settings required by the company. What should you do?()A、Install a digital certificate for Encrypting File System (EFS) on FinServB、Activate failure auditing on the access to files and objectsC、Configure all firewalls to track when any packets addresses to FinServ are droppedD、Create an IPSec policy that requires IPSec encryption between FinServ and the firewall

You have 15 computers that run Windows 7. You need to implement a monitoring solution that meets thefollowing requirements. Sends an e-mail notification when an application error is logged in the event log  Runs a script to restart the computer if an application error occurs between 17:00 and 07:00 Minimizes the administrative effort required to monitor applications. What should you do?()A、On all the computers, configure a custom view. Configure a custom task for the application error events.B、On a computer, configure a custom view to display the application errors. Configure a custom task forthe application error events.C、On a central computer, configure an event subscription. On all of the computers, configure a customtask in the Forwarded Events log.D、On all the computers, configure an event subscription to a central computer. On the central computer,configure a custom task in the Forwarded Events log.

A Windows Communication Foundation (WCF) service is required to log all authorization attempts to the Windows Event Log. You need to configure a behavior and apply it to the service to support this requirement. Which behavior should you configure and apply?()A、service Authentication ManagerB、service AuthorizationC、service CredentialsD、service Security Audit

You need to design a strategy for remote client computer access that meets all business and technical requirements. What should you do?()A、Configure the HTTP virtual server on the Exchange front-end server to require a secure connection. Instruct the sales personnel to use Microsoft Outlook Web Access to connect to the Exchange front-end serverB、Configure the back-end Exchange servers to use static ports for RPC connections. Open the required ports on the firewall. Install Microsoft Outlook 2003 on the portable computers and configure it to connect to the Exchange back-end server using a MAPI connectionC、Configure the Exchange front-end server to require secure connections from IMAP4 client computers. Install Microsoft Outlook 2003 on the portable computers and configure it to use a secure IMAP4 connectionD、Configure the Exchange servers to support RPC over HTTPS. Install Microsoft outlook 2003 on the portable computers and configure it to use RPC over HTTPS

You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2002 instance. You upgrade this instance to SQL Server 2008. You configure the Agent service to use the LocalSystem account. There is a file named Orderdata on a remote network share. A job accesses this Orderdata file by using a CMDExec step. The job step fails to complete execution after the upgrade. You must make sure that the job can complete execution, so you have to configure the job step. What action should you perform? () A、You should configure a certificate B、You should configure the SQL Server Agent service to use the NetworkService account.C、You should configure the job step to use a proxy account D、You should configure the SQL Server Agent service to use a local Windows account

You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. Now your company CIO assigns a task to you. The company CIO wants you to configure FILESTREAM data and the two requirements below must be met: you must enable FILESTREAM for file I/O streaming access; remote client computers must be able to have streaming access to FILESTREAM data. You must make sure that FILESTREAM data is enabled. Which service should you configure? () A、You should configure SQL Server VSS Writer B、You should configure Distributed File System C、You should configure SQL Server D、You should configure SQL Server Full Text

单选题You are performing a backup of your database across the network. While taking the backup, you want to save space on the storage media and reduce the network bandwidth. Which command will you issue to configure the required type of backup?()A CONFIGURE DEVICE TYPE TO sbt BACKUP TYPE TO BACKUPSET;B CONFIGURE DEVICE TYPE TO disk BACKUP TYPE TO COPY;C CONFIGURE DEVICE TYPE TO sbt BACKUP TYPE TO COMPRESSED BACKUPSET;D CONFIGURE DEVICE TYPE TO sbt BACKUP TYPE TO COMPRESSED COPY;

单选题You need to design a method to implement account policies that meets the requirements in the written security policy. What should you do?()ACreate a GPO and link it to the New York OU, to the Denver OU, and to the Dallas OU.Configure the GPO with the required account policy settingsBOn all computers in the domain, configure the Local Security Policy7 with the required account policy settingsCConfigure the Default Domain Policy GPO with the required account policy settingsDConfigure the Default Domain Controllers Policy GPO with the required account policy settings

单选题You plan to deploy a distributed database application that runs on Windows Server 2008 R2. You need to design a storage strategy that meets the following requirements: èAllocates storage to servers as required   èIsolates storage traffic from the existing network   èEnsures that data is available if a single disk fails   èEnsures that data is available if a single storage controller fails What should you include in your design?()AAn iSCSI disk storage subsystem that uses Microsoft Multipath I/O. Configure a RAID?0 array.BAn iSCSI disk storage subsystem that uses Virtual Disk Service (VDS). Configure a RAID?5 array.CA Fibre Channel (FC) disk storage subsystem that uses Microsoft Multipath I/O. Configure a RAID?5  array.DA Fibre Channel(FC)disk storage subsystem that uses Virtual Disk Service(VDS).Configure a RAID?0 array.

单选题You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. You intend to configure FILESTREAM data, enabling FILESTREAM for file I/O streaming access and allowing remote client computers to have streaming access to FILESTREAM data. You must make sure that FILESTREAM data is enabled. In the options below, which service should you configure? ()AYou should configure Distributed File SystemBYou should configure SQL ServerCYou should configure SQL Server Full TextDYou should configure SQL Server VSS Writer

单选题As an experienced technician, you are required to configure and verify SRM with SSO redundancy. In such a situation, you have to issue several commands in proper orders. Which of the following is correct?()Ashow redundancy states, redundancy, mode ssoBshow redundancy states, mode sso, redundancyCredundancy, mode sso, show redundancy statesDmode sso, redundancy, show redundancy states

多选题Your network consists of three Active Directory forests. Forest trust relationships exist between all forests. Each forest contains one domain. All domain controllers run Windows Server 2008 R2. Your company has three network administrators. Each network administrator manages a forest and the Group Policy objects (GPOs) within that forest.   You need to create standard GPOs that the network administrators in each forest will use. The GPOs must meet the following requirements:   èThe GPOs must only contain settings for either user configurations or computer configurations. èThe number of GPOs must be minimized.   Which two actions should you perform?()AExport the new GPOs to .cab files. Ensure that the .cab files are available to the network administrator  in each forest.BCreate two new GPOs. Configure both GPOs to use the required user configurations and the required  computer configurations.CCreate two new GPOs. Configure one GPO to use the required user configuration. Configure the other GPO to use the required computer configuration.DBack up the Sysvol folder that is located on the domain controller where the new GPOs were created. Provide the backup to the network administrator in each forest.

多选题As a network administrator, you are required to configure a switch port for a private Virtual LAN. In such a situation, which three of the following connection modes will be available during the configuration process? ()(Choose three.)Aisolated modeBmodular modeCcommunity modeDpromiscuous modeEnon-isolatedFpermanent

多选题You are maintaining a database that is in ARCHIVELOG mode. You have configured the flash recovery area in your database. The database is in MOUNT EXCLUSIVE mode, and you want to configure the Flashback Database feature. Which two options are NOT required to configure the Flashback Database feature? ()AOpen the database in read-only mode.BSet the retention target with the DB_FLASHBACK_RETENTION_TARGET initialization parameter.CEnable the block change tracking feature.DExecute the ALTER DATABASE FLASHBACK ON statement.