What mechanism does a system use to compare the security labels of a subject and an object?系统使用什么机制来比较的主体和客体的安全标识?()A、Security Module.安全模块B、Validation Module.验证模块C、Clearance Check.声明检查D、Reference Monitor.引用监视器

What mechanism does a system use to compare the security labels of a subject and an object?系统使用什么机制来比较的主体和客体的安全标识?()

  • A、Security Module.安全模块
  • B、Validation Module.验证模块
  • C、Clearance Check.声明检查
  • D、Reference Monitor.引用监视器

相关考题:

what does the interactinonalview of language see language______. A、a linguistic system and a means for doing thingsB、a linguistic system made up of various subsystemsC、a system of categories based on the communicative needs of the learnerD、a communicative tool to build up and maintain social relations between people

When controlling the virtual router assignment for a PPP over ATM client, which mechanism does the router use first?() A. profileB. domain mapC. DHCP serverD. RADIUS server

By default, which PPP mechanism does the ERX Edge Router use to monitor the session for a PPP over ATM client?() A. pingB. helloC. get requestD. echo request

What are two ways to view the system log files on a WX device? ()(Choose two.) A. Use the CLI and enter show log.B. Use the CLI and enter show all.C. Use the CLI and enter show logging.D. In WebView, choose Admin Tools Display System Log.

In speaking activities, a speaker often tries to avoid using a difficult word or structure and chooses to use a simpler one. What learning strategy does the speaker use?A.SimplificationB.GeneralizationC.Paraphrase.D.Avoidance.

The following entry is in the /etc/host.equiv and /home/jsmith/.rhosts file on server Alpha:+ jsmith.What does this entry indicate?()A、The user "jsmith" can use r-commands from any server to server Alpha system-wideB、The user "jsmith" can use r-commands from server Alpha to any server system-wideC、The user "jsmith" can use r-commands from server Alpha to any server with a /home/jsmith directoryD、The user "jsmith" can use r-commands from any server to server Alpha only in the /home/jsmith directory

A p5 595 does not have any device connected to it for backup. What AIX method should be used to backup each of the LPAR environments and have a quick recovery path?()A、Use savevg and copy to an NFS filesystemB、Create a mksysb on an NFS exported filesystemC、Use tar to copy system over network with a pipeD、Create mksysb on an NFS exported NIM filesystem

What stanza file does a system administrator view to determine what kernel-tuning parameter changes were made when the system was last booted?()A、/etc/rc.netB、/etc/tunables/tuningC、/etc/tunables/lastbootD、/usr/samples/kernel/nextboot

Which mechanism does External BGP use to prevent the formation of routing loops?()A、AS pathB、Split horizonC、Poison reverseD、Unicast RPF check

What protocol does an IP phone use to learn the voice VLAN ID it should use for voice traffic?()A、VTPB、802.1 qC、CDPD、Skinny Station Protocol

A system does not have a nameserver defined for IP address resolution. What file does AIX use to determine the IP address of a remote system?()A、/etc/hostsB、/etc/namesC、/etc/rc.tcpipD、/etc/resolv.conf

A system administrator created a /etc/exports file on server "Alpha" and entered a filesystem to be exported to server "Bravo." However, the remote servers are unable to mount the filesystems. What does the system administrator need to do?()A、Use the exportfs command on server "Alpha" to export the filesystemB、Use the showmount command on server "Bravo" to import the filesystemC、Use the startsrc command on server "Bravo" to refresh the NFS daemonsD、Use the chfs command on server "Alpha" to change the filesystem type to NFS

An administrator needs to change a system’s run level from level 2 to level 3. What is the appropriate  method to accomplish this()A、Use the reboot command.B、Edit the /etc/reboot file and reboot the system.C、Edit /etc/.init.state file and reboot the system.D、Use the telinit command

What topologies does the IBM System Storage TS7650 ProtecTIER Deduplication Gateway support?()A、gridB、cascadeC、hub and spokeD、edge and core

By default, which PPP mechanism does the ERX Edge Router use to monitor the session for a PPP over ATM client?()A、pingB、helloC、get requestD、echo request

What are two ways to view the system log files on a WX device? ()(Choose two.)A、Use the CLI and enter show log.B、Use the CLI and enter show all.C、Use the CLI and enter show logging.D、In WebView, choose Admin Tools Display System Log.

You need to design an access control strategy for the Payment folder for the Sales Managers group. What should you do?()A、Use IPSec in transport modeB、Use Encrypting File System (EFS) over Web Distributed Authoring and Versioning (WebDAV)C、Use PEAP-EAP-TLSD、Use Encrypting File System (EFS) remote encryption

单选题Which database does WX Central Management System (WX CMS) software use to store historical data?()AOracleBMySQLCSybaseDMicrosoft Access

单选题The following entry is in the /etc/host.equiv and /home/jsmith/.rhosts file on server Alpha:+ jsmith.What does this entry indicate?()AThe user jsmith can use r-commands from any server to server Alpha system-wideBThe user jsmith can use r-commands from server Alpha to any server system-wideCThe user jsmith can use r-commands from server Alpha to any server with a /home/jsmith directoryDThe user jsmith can use r-commands from any server to server Alpha only in the /home/jsmith directory

单选题What stanza file does a system administrator view to determine what kernel-tuning parameter changes were made when the system was last booted?()A/etc/rc.netB/etc/tunables/tuningC/etc/tunables/lastbootD/usr/samples/kernel/nextboot

单选题What protocol does an IP phone use to learn the voice VLAN ID it should use for voice traffic?()AVTPB802.1 qCCDPDSkinny Station Protocol

单选题Which mechanism does External BGP use to prevent the formation of routing loops?()AAS pathBSplit horizonCPoison reverseDUnicast RPF check

单选题By using previous communication system, rescue is often a matter of chance. What does “a matter of chance” mean?()AoccasionallyBaccidentallyCoftenDusually

单选题What mechanism does a system use to compare the security labels of a subject and an object?系统使用什么机制来比较的主体和客体的安全标识?()ASecurity Module.安全模块BValidation Module.验证模块CClearance Check.声明检查DReference Monitor.引用监视器

单选题When controlling the virtual router assignment for a PPP over ATM client, which mechanism does the router use first?()AprofileBdomain mapCDHCP serverDRADIUS server

单选题A system does not have a nameserver defined for IP address resolution. What file does AIX use to determine the IP address of a remote system?()A/etc/hostsB/etc/namesC/etc/rc.tcpipD/etc/resolv.conf

单选题What language does International NAVTEX use?()ARussianBFrenchCEnglishDGerman

单选题Companycom purchased a new p5 570 without a HMC. The customer does not know how to power the full frame/system off since there does not appear to be an on/off button. What can be done to accomplish this task?()ATelnet into the machine and do a shutdown -FrBLog into ASMI as Administrator and use ASMI menusCLog into the service processor using WebSM and use ASMI menusDUse the off button which is located to the left below the LEDs