Users can define policy to control traffic flow between which two components? ()(Choose two.)A、from a zone to the router itselfB、from a zone to the same zoneC、from a zone to a different zoneD、from one interface to another interface
Users can define policy to control traffic flow between which two components? ()(Choose two.)
- A、from a zone to the router itself
- B、from a zone to the same zone
- C、from a zone to a different zone
- D、from one interface to another interface
相关考题:
You wish to enable an audit policy for all database users, except SYS, SYSTEM, and SCOTT.You issue the following statements:SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYS;SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYSTEM;SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SCOTT;For which database users is the audit policy now active?()A. All users except SYSB. All users except SCOTTC. All users except sys and SCOTTD. All users except sys, system, and SCOTT
Your corporate security policy requires that a user performing attacks must have limited network access and activities until an administrator can investigate.In the admin GUI, which sensor event policy action must you configure in "Configuration" >"Sensors" >"Sensor Event Policies" >[rule name] to accomplish this?()A. IgnoreB. Replace users roleC. Terminate user sessionD. Disable user account
Users can define policy to control traffic flow between which two components? ()(Choose two.) A. from a zone to the router itselfB. from a zone to the same zoneC. from a zone to a different zoneD. from one interface to another interface
Which two statements are true of login classes?() A. Users can be members of multiple login classes.B. Login classes define authorization parameters for a user.C. There are five system-defined login classes.D. Login class permission flags can be overridden for certain commands.
When configuring a DHCP server, which of the following can the administrator define for DHCP users?() A. Database serverB. NTP serverC. DHCP serverD. SQLServerE. DNS serverF. Domain name
When configuring a DHCP server, which of the following can the administrator define for DHCP users?()A、Database serverB、NTP serverC、DHCP serverD、SQLServerE、DNS serverF、Domain name
Which two statements are true of login classes?()A、Users can be members of multiple login classes.B、Login classes define authorization parameters for a user.C、There are five system-defined login classes.D、Login class permission flags can be overridden for certain commands.
An administrator needs to implement a security patch policy on the network that adheres to an internal SLA. Which of the following actions BEST achieves this task?()A、Define a test server group, install the patches and if successful schedule installation on production servers.B、Define a test server group, schedule installation on production servers and then install all updates and patches.C、Install the patches during a non-working hour.D、Send an email to all company users and request the best time for installation.
What is the primary purpose of creating a Location Group Policy? ()A、to associate more than one realm with an authentication serverB、to logically group network access devices and associate them with specific sign-in policiesC、to allow or prevent users from accessing resources in specific locations on the networkD、to define the URL that users of network access devices can use to access the Infranet Controller
You wish to enable an audit policy for all database users, except SYS, SYSTEM, and SCOTT.You issue the following statements: SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYS;SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SYSTEM; SQL AUDIT POLICY ORA_DATABASE_PARAMETER EXCEPT SCOTT; For which database users is the audit policy now active?()A、All users except SYSB、All users except SCOTTC、All users except sys and SCOTTD、All users except sys, system, and SCOTT
You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A new Company.com policy prohibits the users from changing their password by using Outlook Web App (OWA). What should you do?()A、The best option is to set up an Outlook Web App Mailbox policy so that the users comply with the Company.com policy.B、The best option is to set up a Group Policy Object so that the users comply with the Company.com policy.C、The best option is to change the authentication settings of the OWA virtual directory so that the users comply with the Company.com policy.D、The best option is to change the authentication settings of the IISADMPWD virtual directory so that the users comply with the Company.com policy.
You are the network administrator for TestKing.com. The network consists of a single Active Directory domain named testking.com. All network servers run Windows Server 2003, and all client computers run Windows XP Professional. A new management directive states that users can log to the domain only during business hours. Users who remain logged on after business hours must be automatically disconnected from network resources. You need to enforce this directive by using the minimum amount of administrative effort. Which two actions should you perform?() (Each correct answer presents part of the solution. Choose two)A、Configure the Default Domain Policy Group Policy object (GPO) to increase scheduling priority for all users.B、Configure the Default Domain Policy Group Policy object (GPO) to force users to log off when their logon hours expire.C、Select all user accounts. Modify the account properties to restrict logon hours to business hours.D、Create a domain user account named Temp. Configure the account properties to restrict logon hours to business hours.E、Modify the DACL on the Default Domain Policy Group Policy object (GPO) to assign the Allow - Read permission to the Users group.
Network Access Protection (NAP) is configured for the corporate network.Users connect to the corporate network by using portable computers.The company policy requires confidentiality of data when the data is in transit between the portable computers and the servers.You need to ensure that users can access network resources only from computers that comply with the company policy.What should you do?()A、Create an IPsec Enforcement Network policy.B、Create an 802.1X Enforcement Network policy.C、Create a Wired Network (IEEE 802.3) Group policy.D、Create an Extensible Authentication Protocol (EAP) Enforcement Network policy.
You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A new Company.com policy prohibits the users from changing their password by using Outlook Web App (OWA).However, they can use Windows to change their passwords.What should you do?()A、The best option is to configure the settings on the Segmentation tab, in the properties of the OWA virtual directory so that the users comply with the Company.com policy.B、The best option is to configure the settings on the Account tab, in the properties of the user accounts so that the users comply with the Company.com policy.C、The best option is to configure the settings on the Mailbox Features tab, in the properties of the mailboxes so that the users comply with the Company.com policy.D、The best option is to configure the settings on the Authentication tab, in the properties of the OWA virtual directory so that the users comply with the Company.com policy.
You have an Exchange Server 2010 organization.You need to ensure that all users in the organization can view the availability of a company projector.What should you create for the projector?()A、a distribution groupB、a mailboxC、a mail-enabled contactD、a sharing policy
单选题What is the primary purpose of creating a Location Group Policy? ()Ato associate more than one realm with an authentication serverBto logically group network access devices and associate them with specific sign-in policiesCto allow or prevent users from accessing resources in specific locations on the networkDto define the URL that users of network access devices can use to access the Infranet Controller
多选题When configuring a DHCP server, which of the following can the administrator define for DHCP users?()ADatabase serverBNTP serverCDHCP serverDSQLServerEDNS serverFDomain name
单选题You are a help desk technician for your company. Your company’s network includes an Active Directory domain and Windows XP Professional computers that are configured as members of the domain. Company policy prohibits users from accessing their computers unless they are authenticated by a domain controller. However, users report that they can log on to their computers, even though a network administrator has told them that a domain controller is not available. As a test, you log off of your computer and disconnect it from the network. You discover that you can log on by using your domain user account. You need to ensure that users cannot access their computers unless they are authenticated by a domain controller. How should you configure the local computer policy on these computers? ()AEnable the Require domain controller to unlock policy.BSet the Number of previous logons to cache policy to 0. CRemove all user and group accounts from the Log on locally user right. DRemove all user and group accounts from the Access this computer from the network user right.
单选题Your company has an Active Directory domain. The company runs Terminal Services. Standard users who connect to the Terminal Server are in the TSUsers organizational unit (OU). Administrative users are in the TSAdmins OU. No other users connect to the Terminal Server. You need to ensure that only members of the TSAdmins OU can run the Remote Desktop Protocol files. What should you do?()ACreate a Group Policy object (GPO) that configures the Allow .rdp files from unknown publishers policy setting in the Remote Desktop Client Connection template to Disabled. Apply the GPO to the TSUsers OU.BCreate a Group Policy object (GPO) that configures the Allow .rdp files from valid publishers and users default .rdp settings policy setting in the Remote Desktop Client Connection template to Disabled. Apply the GPO to the TSUsers OU.CCreate a Group Policy object (GPO) that configures the Allow .rdp files from valid publishers and users default .rdp settings policy setting in the Remote Desktop Client Connection template to Enabled. Apply the GPO to the TSAdmins OU.DCreate a Group Policy object (GPO) that configures the Specify SHA1 thumbprints of certificates representing trusted .rdp publishers policy setting in the Remote Desktop Client Connection template to Enabled. Apply the GPO to the TSAdmins OU.
单选题You have an Exchange Server 2010 organization.Users access their e-mail from the Internet by using Outlook Web App.You need to prevent users from downloading ZIP files from Outlook Web App.The solution must ensure that users can download ZIP files by using Microsoft Office Outlook. What should you do?()AConfigure the Content Filter agent.BConfigure the Attachment Filter agent.CCreate a managed folder mailbox policy.DCreate an Outlook Web App Mailbox policy.
多选题You are the senior systems engineer for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. Client computers in the sales department run Windows NT Workstation 4.0 with the Active Directory Client Extensions software installed. All other client computers run Windows XP Professional. All servers are located in an organizational unit (OU) named Servers. All client computers are located in an OU named Desktops. Four servers contain confidential company information that is used by users in either the finance department or the research department. Users in the sales department also store files and applications on these servers. The company’s written security policy states that for auditing purposes, all network connections to these resources must require authentication at the protocol level. The written security policy also states that all network connections to these resources must be encrypted. The company budget does not allow for the purchase of any new hardware or software. The applications and data located on these servers may not be moved to any other server in the network. You define and assign the appropriate permissions to ensure that only authorized users can access the resources on the servers. You now need to ensure that all connections made to these servers by the users in the finance department and in the research department meet the security guidelines stated by the written security policy. You also need to ensure that all users in the sales department can continue to access their resources. Which two actions should you take?()ACreate a new Group Policy object (GPO) and link it to the Servers OU. Enable the Secure Server (Require Security) IPSec policy in the GPO.BCreate a new Group Policy object (GPO) and link it to the Servers OU. Enable the Server (Request Security) IPSec policy in the GPO.CCreate a new Group Policy object (GPO) and link it to the Desktops OU. Enable the Client (Respond only) IPSec policy in the GPO.DCreate a new Group Policy object (GPO). Edit the GPO to enable the Registry Policy Processing option and the IP Security Policy Processing option. Copy the GPO files to the Netlogon shared folder.EUse System Policy Editor to open the System.adm file and enable the Registry Policy Processing option and the IP Security Policy Processing option. Save the system policy as NTConfig.pol.
单选题Your corporate security policy requires that a user performing attacks must have limited network access and activities until an administrator can investigate.In the admin GUI, which sensor event policy action must you configure in "Configuration" "Sensors" "Sensor Event Policies" [rule name] to accomplish this?()AIgnoreBReplace users roleCTerminate user sessionDDisable user account
多选题You administer a network containing SRX Series firewalls. New policy requires that you implement MAG Series devices to provide access control for end users. The policy requires that the SRX Series devices dynamically enforce security policy based on the source IP address of the user. The policy also requires that the users communicate with protected resources using encrypted traffic. Which two statements are true?()AThe endpoints can use agentless access.BEncrypted traffic flows between the endpoint and the enforcer.CEncrypted traffic flows between the endpoint and the protected resourceDThe endpoints can use the Odyssey Access Client.
多选题Users can define policy to control traffic flow between which two components?()Afrom a zone to the device itselfBfrom a zone to the same zoneCfrom a zone to a different zoneDfrom one interface to another interface
单选题An administrator needs to implement a security patch policy on the network that adheres to aninternal SLA. Which of the following actions BEST achieves this task?()A Define a test server group, install the patches and if successful schedule installation on production servers.B Define a test server group, schedule installation on production servers and then install all updates and patches.C Install the patches during a non-working hour.D Send an email to all company users and request the best time for installation.
单选题You administer a Windows 2000 Professional computer that is shared by multiple users. You receive a phone call from one of the users of the shared computer that tells you that the computer is reporting a kernel stop error. You notice that a user has tried to install video drivers that have caused the computer to become unstable. You want to ensure that users can install only the drivers that are approved by the manufacturer. What should you do? ()AConfigure File signature verification to block driver installation, and set driver signing as a system default.BRemove all users from the Power User group.CCreate a Local Computer Policy to prevent users from installing drivers.DCreate a Local Computer Policy to enable Windows File Protection.
单选题Network Access Protection (NAP) is configured for the corporate network. Users connect to the corporate network by using portable computers. The company policy required confidentiality of data when the data is in transmit between the portable computers and the servers. You need to ensure taht users can access network resources only from computers that comply with the company policy. What should you do? ()A Create an IPsec Enforcement Network policyB Create an 802.1X enforcement network policyC Create a wired network (IEEE 802.3) Group PolicyD Create an Extensible Authentication Portocol (EAP) Enforcement Network Policy