In discretionary access environments, which of the following entities is authorized to grant information access to other people?在自主访问环境下,下列哪个实体有权授予其他人信息访问权限?()A、Data Owner数据的所有者B、Manager经理人员C、Security Manager安全经理D、Group Leader小组领导

In discretionary access environments, which of the following entities is authorized to grant information access to other people?在自主访问环境下,下列哪个实体有权授予其他人信息访问权限?()

  • A、Data Owner数据的所有者
  • B、Manager经理人员
  • C、Security Manager安全经理
  • D、Group Leader小组领导

相关考题:

只封禁一台地址为193.62.40.230主机的access—list的正确配置是——。A.access—list 110 permit ip any any access—list 110 deny ip host 193.62.40.230 any access—list 1 10 deny ip any host 193.62.40.230B.access—list 110 denv ip host 193.62.40.230 any access—list 110 deny ip any host 193.62.40.230 access—-list 110 permit ip any anyC.access—list 110 deny ip host 193.62.40.230 any aCCeSS—list 110 deny ip any host 193.62.40.230D.access—list 110 deny ip host 193.62.40.230 any access—list 110 permit ip any any access—list 110 deny ip any host 193.62.40.230

The cost-volume-profit (C-V-P) analysis can be used in making decisions about ______ and so on.A.selling pricesB.production volumeC.levels of discretionary fixed costsD.all the three above

Which three types of policies must you configure to allow remote users transparent access to protected resources using IF-MAP Federation between a Junos Pulse Secure Access Service and a Junos Pulse Access Control Service?()A. Session-Export policies on the Junos Pulse Secure Access ServiceB. Session-Export policies on the Junos Pulse Access Control ServiceC. Session-Import policies on the Junos Pulse Secure Access ServiceD. Session-Import policies on the Junos Pulse Access Control ServiceE. Resource access policies on the Junos Pulse Access Control Service

WhichoneofthefollowingisNOT avalidRADIUSpackettype?() A.Access-rejectB.Access-responseC.Access-challengeD.Access-replyE.Access-accept

WhichitemrepresentsthestandardIPACL?() A.access-list50deny192.168.1.10.0.0.255B.access-list110permitipanyanyC.access-list2500denytcpanyhost192.168.1.1eq22D.access-list101denytcpanyhost192.168.1.1

An access list was written with the four statements shown in the graphic.Which single access list statement will combine all four of these statements into a single statement that will have exactly the same effect?()A.access-list10 permit 172.29.16.00.0.0.255B.access-list10 permit 172.29.16.00.0.1.255C.access-list10 permit 172.29.16.00.0.3.255D.access-list10 permit 172.29.16.00.0.15.255E.access-list10 permit 172.29.0.00.0.255.255

Which one of the following is NOT a valid RADIUS packet type?()A、 Access-rejectB、 Access-responseC、 Access-challengeD、 Access-replyE、 Access-accept

将Outlook中的任务清单导入到Access数据库中时,将在Access中以什么方式保存()A、Access中的表B、Access中的数据访问页C、Access中的查询D、Access中的报表

在Curver Editor中,可以添加动画声音的选项应为()。A、Environm entB、RendererC、Video PostD、Ripple

在通信专业中,MAC的英文全称是()。A、Media Access ControlB、Media Access ConnectC、Multiple Access ControlD、Multiple Access Connect

若要在文本型字段执行全文搜索,查询“Access”开头的字符串,正确的条件表达式设置为()A、like “Access*”B、like “Access”C、like “*Access*”D、like “*Access”

Access数据库查询不可直接对()进行。A、单个Access表B、多个Access表C、多个Access表及其查询D、多个Access表以及EXCEL工作表

You are the network administrator for your company. Your network consists of a single Active   Directory domain. Three security groups named Accountants, Processors, and Management are located in an organizational unit (OU) named Accounting. All of the user accounts that belong to these three  groups are also in the Accounting OU. You create a Group Policy object (GPO) and link it to the  Accounting OU. You configure the GPO to disable the display options under the User Configuration  section of the GPO. You need to achieve the following goals: You need to ensure that the GPO applies to  all user accounts that are members of the Processors group. You need to prevent the GPO fromapplying  to any user account that is a member of the Accountants group. You need to prevent the GPO from  applying to any user account that is a member of the Management group, unless the user account is also  a member of the Processors group. What should you do?()A、 Modify the discretionary access control list (DACL) settings of the GPO to assign the Accountants and Management security groups the Deny - Read and the Deny - Apply Group Policy permissions. Modify the DACL of the GPO to assign the users who are in both the Accountants and Management security groups the Allow - Read and the Allow - Apply Group Policy permissions.B、 Modify the discretionary access control list (DACL) settings of the GPO to assign the Accountants and Management security groups the Deny - Read and the Deny - Apply Group Policy permissions. Create a new security group named Mixed that contains all the user accounts from the Processors group and the specific user accounts from the Management group to which you want the GPO to apply. Modify the DACL of the GPO to assign the Mixed security group the Allow - Read and the Allow - Apply Group Policy permissions.C、 Modify the discretionary access control list (DACL) settings of the GPO to assign the Accountants security group the Deny - Read and the Deny - Apply Group Policy permissions. Modify the DACL settings of the GPO to remove the Authenticated Users special group. Modify the DACL settings of the GPO to add the Processors group and assign the Allow - Read and the Allow - Apply Group Policy permissions.D、 Modify the discretionary access control list (DACL) settings of the GPO to assign the Accountants security group the Deny - Read and the Allow - Apply Group Policy permissions. Modify the DACL settings of the GPO to assign the Management security group the Deny - Read and the Deny - Apply Group Policy permissions.

You need to design a security strategy for the DHCP servers in the Seattle office. Which two actions should you perform?()A、Disable all unnecessary services on each DHCP serverB、Modify the discretionary access control lists (DACLs) in Active Directory so that only members of the Enterprise Admins security group can authorize additional DHCP serversC、Use an IPSec policy that allows only the packets necessary for DHCP and domain membership for each DHCP serverD、Install a digital certificate for SSL on each DHCP server

You deploy a Microsoft Exchange mobile messaging solution that uses Microsoft Windows Mobile 5.0 with Microsoft Messaging and Security Feature Pack.   The messaging infrastructure is configured to support the remote wipe feature.   When an administrator attempts to perform a remote wipe of a Windows Mobilebased device, the administrator receives a 401 error message.   You need to ensure that the administrator is authorized to perform remote wipes only.   What should you do?()A、Grant the administrator membership in the Domain Administrators group.B、Grant the administrator membership in the Exchange Administrators group.C、Add the new administrator account to the Discretionary Access Control List (DACL) of the Microsoft Exchange ActiveSync Administration folder.D、Select the Directory Security tab of the Exchange Server administration Web site, and then configure Read, Write, and Directory Browsing permissions.

You are designing a remote access strategy to meet the business and technical Requirement.  What should you do?()A、 Configure each server running Routing and Remote Access as a RADIUS Client.B、 Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as VPN access.C、 Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as dialup access.D、 Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as wireless access.

You are the network administrator for your company. The network consists of a single Active Directory domain. The domain includes an organizational unit (OU) named Processing. There are 100 computer accounts in the Processing OU. You create a Group Policy object (GPO) named NetworkSecurity and link it to the domain. You configure NetworkSecurity to enable security settings through the Computer Configuration section of the Group Policy settings. You need to ensure that NetworkSecurity will apply only to the computers in the Processing OU. You need to minimize the number of GPO links.  What should you do?()A、 Link NetworkSecurity to the Processing OU. Disable the User Configuration section of NetworkSecurity.B、 Link NetworkSecurity to the Processing OU. Remove the link from NetworkSecurity to the domain.C、 Modify the discretionary access control list (DACL) for NetworkSecurity to assign all computer accounts in the Processing OU the Allow - Read and the Allow - Apply Group Policy permissions.D、 Modify the discretionary access control list (DACL) for NetworkSecurity to assign the Authenticated Users group the Deny - Apply Group Policy permission and to assign all of the computer accounts in the Processing OU the Allow - Read and the Allow - Apply Group Policy permissions.

单选题You are designing a remote access strategy to meet the business and technical Requirement.  What should you do?()A Configure each server running Routing and Remote Access as a RADIUS Client.B Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as VPN access.C Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as dialup access.D Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as wireless access.

单选题In discretionary access environments, which of the following entities is authorized to grant information access to other people?在自主访问环境下,下列哪个实体有权授予其他人信息访问权限?()AData Owner数据的所有者BManager经理人员CSecurity Manager安全经理DGroup Leader小组领导

单选题Which of the following are necessary components of a Multi-Level Security Policy?下列哪一项是多级安全策略必需的组件?()ASensitivity Labels for subjects objects and a system high evaluation.对主体和客体实施敏感性标识以及对其进行系统高的评价BSecurity Clearances for subjects Security Labels for objects and Mandatory Access Control.对主体和客体安全标识的安全许可以及强制访问控制CSensitivity Labels for only objects and Mandatory Access Control.只针对客体的敏感性标识和强制访问控制DSensitivity Labels for subjects objects and Discretionary Access Control.对主体及客体的敏感性表情和自主访问控制

多选题Which three types of policies must you configure to allow remote users transparent access to protected resources using IF-MAP Federation between a Junos Pulse Secure Access Service and a Junos Pulse Access Control Service?()ASession-Export policies on the Junos Pulse Secure Access ServiceBSession-Export policies on the Junos Pulse Access Control ServiceCSession-Import policies on the Junos Pulse Secure Access ServiceDSession-Import policies on the Junos Pulse Access Control ServiceEResource access policies on the Junos Pulse Access Control Service

多选题What are two use cases enabled by IF-MAP Federation?()AUsers authenticated to one Junos Pulse Access Control Service can transparently access resources protected by another Junos Pulse Access Control Service.BUsers authenticated to a Junos Pulse Access Control Service can transparently access resources protected by a Junos Pulse Secure Access Service.CRemote access users authenticated to a Junos Pulse Secure Access Service can transparently access resources protected by a Junos Pulse Access Control Service.DRemote access users authenticated to one Junos Pulse Secure Access Service can transparently access resources protected by another Junos Pulse Secure Access Service.

单选题You are the network administrator for your company. The network consists of a single Active Directory domain. The domain includes an organizational unit (OU) named Processing. There are 100 computer accounts in the Processing OU. You create a Group Policy object (GPO) named NetworkSecurity and link it to the domain. You configure NetworkSecurity to enable security settings through the Computer Configuration section of the Group Policy settings. You need to ensure that NetworkSecurity will apply only to the computers in the Processing OU. You need to minimize the number of GPO links.  What should you do?()A Link NetworkSecurity to the Processing OU. Disable the User Configuration section of NetworkSecurity.B Link NetworkSecurity to the Processing OU. Remove the link from NetworkSecurity to the domain.C Modify the discretionary access control list (DACL) for NetworkSecurity to assign all computer accounts in the Processing OU the Allow - Read and the Allow - Apply Group Policy permissions.D Modify the discretionary access control list (DACL) for NetworkSecurity to assign the Authenticated Users group the Deny - Apply Group Policy permission and to assign all of the computer accounts in the Processing OU the Allow - Read and the Allow - Apply Group Policy permissions.

单选题Which of the following statements explains why it is normally best to have more than one controller-based access point participate in the containment of one rogue access point?()Aclients connected to the rogue access point must be able to connect to the containment controller-based access point.Bmultiple controller-based access points will load-balance the containment task using fewer resources than a single access point.Cclients connected to the rogue access point may be out of the range of the controller-based access point providing containment.Deach controller-based access point can handle only a limited amount of clients connected to the rogue access points.

单选题Which one of the following is NOT a valid RADIUS packet type?()A Access-rejectB Access-responseC Access-challengeD Access-replyE Access-accept

单选题Your network contains a domain-based namespace named DFS1. DFS1 has Windows 2008 Server mode enabled. You need to ensure that only files and folders in DFS1 that users have permissions to access are displayed. What should you do?()ADisable referrals.BModify the system access control list.CEnable access-based enumeration (ABE).DModify the discretionary access control list.

单选题Wlse uses snmp communication with an ethernet switch for what purpose?()Ashut down rogue access pointsBconfigure access pointsCdiscover access pointsDinventory access points

单选题Which Junos Pulse Access Control Service client provides a built-in viewer to access local logs?()AOdyssey Access ClientBJunos PulseCJava agentDAgent less access