With respect to a computer file system, an access control list (ACL) is a list of permissions attached to an object. Which of the following makes forwarding decisions in hardware?()A、IETFB、PFCC、TCAMD、ASIC

With respect to a computer file system, an access control list (ACL) is a list of permissions attached to an object. Which of the following makes forwarding decisions in hardware?()

  • A、IETF
  • B、PFC
  • C、TCAM
  • D、ASIC

相关考题:

Evaluate the following block of code:What is the outcome of the above code?() A. It produces an error because a fully qualified host name needs to be specified.B. It produces an error because the range of ports associated with the hosts has not been specified.C. It creates an access control list (ACL) with the user ACCT_MGR who gets the CONNECT and RESOLVE privileges.D. It creates an access control list (ACL) with the user ACCT_MGR who gets the CONNECT privilege but not the RESOLVE privilege.

A user is attempting to access files shared on a remote computer. The file share permissions allowthe user to have full control; however, the NTFS permissions allow the user to have read access.Which of the following is the user’s resulting access level for the remotely shared directory?()A.ModifyB.Full controlC.WriteD.Read

Which of the following is the BEST way to allow web software through the server firewall?() A. Implement an application exception.B. Implement an access control list (ACL).C. Open the corporate firewall to allow port 80.D. Implement port blocking on port 80.

You are the network administrator for Ezonexam.com. The file server for the accounting department is a Windows 2000 Server computer named Ezonexam1. You have created a folder named Payments on the system partition of Ezonexam1. Payments is shared on the network as Payments with the default share permissions. The owner of the Payments folder is domain Admins. The NTFS permissions are shown in the following table.NTFS PermissionsDomain Admins: Allow ReadAccounting: Allow Full ControlThere is a file called review.doc in the Payment folder. The owner of review.doc is a user named Paul who is on a temporary leave of absence. The NTFS permissions for the file list only Paul on the access control list, with Full Control permission.You want to remove Paul's access to review.doc and grant the Modify permission for a user named Lily Loo. You open the Security properties of review.doc and discover that you are unable to modify the permissions of the file.You want to be able to remove Paul's access and grant Lily Loo the Modify permission on review.doc.What should you do?A.Take ownership of the file.B.Take ownership of the Payments folder.C.Grant Domain Admins Full control of the Payments shared folder.D.Grant Domain Admins Change for the Payments shared folder.

Which switching engine enables the access control list lookup to be committed to hardware? () A.IETFB.PFCC.ASICD.TCAM

You are securing a network for TestKing and want to apply an ACL (access control list) to an interface of a router. Which one of the following commands would you use?() A. permit access-list 101 outB. ip access-group 101 outC. apply access-list 101 outD. access-class 101 outE. ip access-list e0 out

Which item represents the standard IP ACL?() A.access-list 50 deny 192.168.1.1 0.0.0.255B.access-list 110 permit ip any anyC.access-list 2500 deny tcp any host 192.168.1.1 eq 22D.access-list 101 deny tcp any host 192.168.1.1

You are securing a network for TestKing and want to apply an ACL (access control list) to an interface of a router. Which one of the following commands would you use?()A、permit access-list 101 outB、ip access-group 101 outC、apply access-list 101 outD、access-class 101 outE、ip access-list e0 out

Which of the following would be the correct location to access when enabling Driver Signature Verification?()A、On the hardware tab in System Properties.B、In the Security Center applet in Control Panel.C、In Device Manager under the File menu and options.D、In Computer Management.

You administer a Windows 2000 Professional computer that is shared by a couple of employees. During one of your sessions at the computer, you notice that one of the other users has installed hardware drivers that have caused the computer to become unstable. You want to determine which of these newly installed drivers are not included in the Hardware Compatibility List (HCL). What should you do? ()A、Run the sysprep tool with the -pnp and -noreboot options on the computer.B、Run the File Signature Verification tool on the computer.C、Run the System File Checker tool on the computer.D、Configure driver signing to prevent the installation of unsigned drivers.

Which one of the following describes who will be able to see an existing doc that contains a readers field ?()A、only those people listed in the access listB、anyone listed as a reader or above in the aclC、only those people list in the readers fieldD、anyone list as a reader or above in the acl and who is also list in the readers field

A user is attempting to access files shared on a remote computer. The file share permissions allow the user to have full control; however, the NTFS permissions allow the user to have read access. Which of the following is the user’s resulting access level for the remotely shared directory?()A、ModifyB、Full controlC、WriteD、Read

Which item represents the standard IP ACL?()A、access-list 50 deny 192.168.1.1 0.0.0.255B、access-list 110 permit ip any anyC、access-list 2500 deny tcp any host 192.168.1.1 eq 22D、access-list 101 deny tcp any host 192.168.1.1

Which switching engine enables the access control list lookup to be committed to hardware? ()A、IETFB、PFCC、ASICD、TCAM

Which of the following is the BEST way to allow web software through the server firewall?()A、Implement an application exception.B、Implement an access control list (ACL).C、Open the corporate firewall to allow port 80.D、Implement port blocking on port 80.

Which of the following is the default access control list file for the Resource Management and Control (RMC) subsystem?()A、/var/rmc/ctrmc.aclsB、/etc/ctrmc/rsct.aclsC、/etc/security/rsct.aclsD、/usr/sbin/rsct/cfg/ctrmc.acls

Which commands will list all the logical volumes and the file system distribution across a specific physical volume of the following?()A、lspv -lB、lslv -pC、lsps -aD、lsvg -m

Which of the following commands is used to retrieve database names from the local catalog for DRDA host databases on System i and System z?()A、LIST DB DIRECTORYB、LIST DCS DIRECTORYC、LIST NODE DIRECTORYD、LIST ACTIVE DATABASES

Evaluate the following block of code:   BEGIN DBMS_NETWORK_ACL_ADMIN.CREATE_ACL ( acl =  ’mycompany-com-permissions.xml’, principal = ’ACCT_MGR’, is_grant = TRUE, privilege = ’connect’);  DBMS_NETWORK_ACL_ADMIN.ASSIGN_ACL ( acl = ’mycompany-com-permissions.xml’, host = ’*.mycompany.com’); END;   What is the outcome of the above code?()A、 It produces an error because a fully qualified host name needs to be specified.B、 It produces an error because the range of ports associated with the hosts has not been specified.C、 It creates an access control list (ACL) with the user ACCT_MGR who gets the CONNECT and RESOLVE privileges.D、 It creates an access control list (ACL) with the user ACCT_MGR who gets the CONNECT privilege but not the RESOLVE privilege.

You need to configure fine-grained access control to external network resources from within your database. You create an access control list (ACL) using the DBMS_NETWORK_ACL_ADMIN package. Which statement is true regarding the ACL created?()A、It is a list of remote database links stored in the XML file that are available to the users of the database.B、It is a list of users and network privileges stored in the XML file according to which a group of users can connect to one or more hosts.C、It is a list of users and network privileges stored in the data dictionary according to which a group of users can connect to one or more hosts.D、It is the list of the host names or the IP addresses stored in the data dictionary that can connect to your database through PL/SQL network utility packages such as UTL_TCP.

Your network contains a domain-based namespace named DFS1. DFS1 has Windows 2008 Server mode enabled. You need to ensure that only files and folders in DFS1 that users have permissions to access are displayed. What should you do?()A、Disable referrals.B、Modify the system access control list.C、Enable access-based enumeration (ABE).D、Modify the discretionary access control list.

单选题Which of the following is the default access control list file for the Resource Management and Control (RMC) subsystem?()A/var/rmc/ctrmc.aclsB/etc/ctrmc/rsct.aclsC/etc/security/rsct.aclsD/usr/sbin/rsct/cfg/ctrmc.acls

单选题Which of the following would be the correct location to access when enabling Driver Signature Verification?()AOn the hardware tab in System Properties.BIn the Security Center applet in Control Panel.CIn Device Manager under the File menu and options.DIn Computer Management.

单选题With respect to a computer file system, an access control list (ACL) is a list of permissions attached to an object. Which of the following makes forwarding decisions in hardware?()AIETFBPFCCTCAMDASIC

单选题You are a technician at TestKing. Your assistant applied an IP access control list to Router TK1. You want to check the placement and direction of the access control list.Which command should you use?()Ashow access-listBshow ip access-listCshow ip interfaceDshow interfaceEshow interface list

单选题You are securing a network for TestKing and want to apply an ACL (access control list) to an interface of a router. Which one of the following commands would you use?()Apermit access-list 101 outBip access-group 101 outCapply access-list 101 outDaccess-class 101 outEip access-list e0 out

单选题Which switching engine enables the access control list lookup to be committed to hardware? ()AIETFBPFCCASICDTCAM