单选题Using a policy with the policy-rematch flag enabled, what happens to the existing and new sessionswhen you change the policy action from permit to deny? ()AThe new sessions matching the policy are denied. The existing sessions are dropped.BThe new sessions matching the policy are denied. The existing sessions, not being allowed to carry any traffic, simply timeout.CThe new sessions matching the policy might be allowed through if they match another policy. The existing sessions are dropped.DThe new sessions matching the policy are denied. The existing sessions continue until they are completed or their timeout is reached.
单选题
Using a policy with the policy-rematch flag enabled, what happens to the existing and new sessionswhen you change the policy action from permit to deny? ()
A
The new sessions matching the policy are denied. The existing sessions are dropped.
B
The new sessions matching the policy are denied. The existing sessions, not being allowed to carry any traffic, simply timeout.
C
The new sessions matching the policy might be allowed through if they match another policy. The existing sessions are dropped.
D
The new sessions matching the policy are denied. The existing sessions continue until they are completed or their timeout is reached.
参考解析
解析:
暂无解析
相关考题:
Click the Exhibit button.In the configuration shown in the exhibit, you decided to eliminate the junos-ftp application from the match condition of the policy MyTraffic.What will happen to the existing FTP and BGPsessions?()A. The existing FTP and BGP sessions will continue.B. The existing FTP and BGP sessions will be re-evaluated and only FTP sessions will be dropped.C. The existing FTP and BGP sessions will be re-evaluated and all sessions will be dropped.D. The existing FTP sessions will continue and only the existing BGP sessions will be dropped.
Click the Exhibit button.In the exhibit, you decided to change myHosts addresses.What will happen to the new sessions matching the policy and in-progress sessions that had already matched the policy?()A. New sessions will be evaluated. In-progress sessions will be re-evaluated.B. New sessions will be evaluated. All in-progress sessions will continue.C. New sessions will be evaluated. All in-progress sessions will be dropped.D. New sessions will halt until all in-progress sessions are re-evaluated. In-progress sessions will be re-evaluated.
Using a policy with the policy-rematch flag enabled, what happens to the existing and new sessions when you change the policy action from permit to deny?() A. The new sessions matching the policy are denied. The existing sessions are dropped.B. The new sessions matching the policy are denied. The existingsessions, not being allowed tocarry any traffic, simply timeout.C. The new sessions matching the policy might be allowed through if they match another policy. The existing sessions are dropped.D. The new sessions matching the policy are denied. The existing sessions continue until they are completed or their time.
After applying the policy-rematch statement under the security policies stanza, what would happen to an existing flow if the policy source address or the destination address is changed and committed?()A. The Junos OS drops any flow that does not match the source address or destination address.B. All traffic is dropped.C. All existing sessions continue.D. The Junos OS does a policy re-evaluation.
After applying the policy-rematch statement under the security policies stanza, what would happen to an existing flow if the policy source address or the destination address is changed and committed?()A、The Junos OS drops any flow that does not match the source address or destination address.B、All traffic is dropped.C、All existing sessions continue.D、The Junos OS does a policy re-evaluation.
You need to configure Active Directory to implement the new password policy for the HR department. What should you do?()A、Create a new child domain named hr.ad.margiestravel.com in the existing forest. Move the resources from the HR OU to this new domain. Add the appropriate security settings in the Default Domain Policy for this new domain.B、Add the appropriate security settings to the current Default Domain Policy.C、Add the appropriate security settings to the local security policy of SQL1.D、Set the SQL server check_policy and check_expiration options to On when creating all user accounts.
In the exhibit, you decided to change myHosts addresses. [edit security policies] user@host# show from-zone Private to-zone External { policy MyTraffic { match { source-address myHosts; destination-address ExtServers;application [ junos-ftp junos-bgp ]; } then { permit { tunnel { ipsec-vpn vpnTunnel; } } } } } policy-rematch; What will happen to the new sessions matching the policy and in-progress sessions that hadalready matched the policy?()A、New sessions will be evaluated. In-progress sessions will be re-evaluated.B、New sessions will be evaluated. All in-progress sessions will continue.C、New sessions will be evaluated. All in-progress sessions will be dropped.D、New sessions will halt until all in-progress sessions are re-evaluated. In-progress sessions will be re-evaluated and possibly dropped.
In the configuration shown in the exhibit, you decided to eliminate the junos-ftp applicationfrom the match condition of the policy MyTraffic. [edit security policies] user@hostl# show from-zone Private to-zone External { policy MyTraffic { match { source-address myHosts; destination-address ExtServers; application [ junos-ftp junos-bgp ]; } then { permit { tunnel { ipsec-vpn vpnTunnel; } } } } } policy-rematch; What will happen to the existing FTP and BGP sessions?()A、The existing FTP and BGP sessions will continue.B、The existing FTP and BGP sessions will be re-evaluated and only FTP sessions will be dropped.C、The existing FTP and BGP sessions will be re-evaluated and all sessions will be dropped.D、The existing FTP sessions will continue and only the existing BGP sessions will be dropped.
Using a policy with the policy-rematch flag enabled, what happens to the existing and new sessions when you change the policy action from permit to deny?()A、The new sessions matching the policy are denied. The existing sessions are dropped.B、The new sessions matching the policy are denied. The existingsessions, not being allowed tocarry any traffic, simply timeout.C、The new sessions matching the policy might be allowed through if they match another policy. The existing sessions are dropped.D、The new sessions matching the policy are denied. The existing sessions continue until they are completed or their time.
Using a policy with the policy-rematch flag enabled, what happens to the existing and new sessionswhen you change the policy action from permit to deny? ()A、The new sessions matching the policy are denied. The existing sessions are dropped.B、The new sessions matching the policy are denied. The existing sessions, not being allowed to carry any traffic, simply timeout.C、The new sessions matching the policy might be allowed through if they match another policy. The existing sessions are dropped.D、The new sessions matching the policy are denied. The existing sessions continue until they are completed or their timeout is reached.
Using a policy with the policy-rematch flag enabled, what happens to the existing and newsessions when you change the policy action from permit to deny?()A、The new sessions matching the policy are denied. The existing sessions are dropped.B、The new sessions matching the policy are denied. The existing sessions, not being allowed to carry any traffic, simply timeout.C、The new sessions matching the policy might be allowed through if they match another policy. The existing sessions are dropped.D、The new sessions matching the policy are denied. The existing sessions continue until they are completed or their timeout is reached.
You administer a Windows 2000 network at Company's main office. You have purchased 15 new Windows 2000 Professional computers that will be used in the finance department. The new computers are equipped with a fax modem. You install the Fax service with the default values and settings on each computer. You want to prevent users from using the Control Panel to remove the fax printer. What should you do?()A、Remove the users’ account from the DACL for the fax printer.B、Edit the local Computer Policy to prevent users from using Printers in Control Panel.C、Edit the local Computer Policy. Configure the Prevent deletion of printers setting to enabled.D、Edit the local Computer Policy. Configure the Prevent addition of printers setting to disabled
Your network consists of a single Active Directory domain. The functional level of the domain is Windows Server 2008 R2. All domain controllers run Windows Server 2008 R2. A corporate policy requires that the users from the research department have higher levels of account and password security than other users in the domain. You need to recommend a solution that meets the requirements of the corporate policy. Your solution must minimize hardware and software costs. What should you recommend?()A、Create a new Active Directory site. Deploy a Group Policy object (GPO) to the site.B、Create a new Password Settings Object (PSO) for the research department’s usersC、Create a new organizational unit (OU) named Research in the existing domain. Deploy a Group Policy object (GPO) to the Research OU.D、Create a new domain in the forest.Add the research department’s user accounts to the new domain.Configure a new security policy in the new domain.
Terminal Services application runs on the server. Users report that the application stops responding. You monitor the memory usage on the server for a week. You discover that the application has a memory leak. A patch is not currently available. You create a new resource-allocation policy in Microsoft Windows Server Resource Manager. You configure a Process Matching Criteria named TrackShip and select the application. You need to terminate the application when the application consumes more than half of the available memory on the server. What should you do?()A、Configure the resource-allocation policy and set the maximum working set limit option to half the available memory on the server. Set the new policy as a Profiling Policy.B、Configure the resource-allocation policy and set the maximum working set limit option to half the available memory on the server. Set the new policy as a Managing Policy.C、Configure the resource-allocation policy and set the maximum committed memory option to half the available memory on the server. Set the new policy as a Profiling Policy.D、Configure the resource-allocation policy and set the maximum committed memory option to half the available memory on the server. Set the new policy as a Managing Policy.
单选题Your network consists of a single Active Directory domain. The functional level of the domain is Windows Server 2008 R2. All domain controllers run Windows Server 2008 R2. A corporate policy requires that the users from the research department have higher levels of account and password security than other users in the domain. You need to recommend a solution that meets the requirements of the corporate policy. Your solution must minimize hardware and software costs. What should you recommend?()ACreate a new Active Directory site. Deploy a Group Policy object (GPO) to the site.BCreate a new Password Settings Object (PSO) for the research department’s usersCCreate a new organizational unit (OU) named Research in the existing domain. Deploy a Group Policy object (GPO) to the Research OU.DCreate a new domain in the forest.Add the research department’s user accounts to the new domain.Configure a new security policy in the new domain.
单选题You need to configure Active Directory to implement the new password policy for the HR department. What should you do?()ACreate a new child domain named hr.ad.margiestravel.com in the existing forest. Move the resources from the HR OU to this new domain. Add the appropriate security settings in the Default Domain Policy for this new domain.BAdd the appropriate security settings to the current Default Domain Policy.CAdd the appropriate security settings to the local security policy of SQL1.DSet the SQL server check_policy and check_expiration options to On when creating all user accounts.
单选题In the configuration shown in the exhibit, you decided to eliminate the junos-ftp applicationfrom the match condition of the policy MyTraffic. [edit security policies] user@hostl# show from-zone Private to-zone External { policy MyTraffic { match { source-address myHosts; destination-address ExtServers; application [ junos-ftp junos-bgp ]; } then { permit { tunnel { ipsec-vpn vpnTunnel; } } } } } policy-rematch; What will happen to the existing FTP and BGP sessions?()AThe existing FTP and BGP sessions will continue.BThe existing FTP and BGP sessions will be re-evaluated and only FTP sessions will be dropped.CThe existing FTP and BGP sessions will be re-evaluated and all sessions will be dropped.DThe existing FTP sessions will continue and only the existing BGP sessions will be dropped.
单选题You are a Database Administrator with TXGlobal. You use a password file to establish remote connections to the HR database on the server located at the home office. Currently, two active remote sessions exist to this database. These sessions were established using the SYSDBA privilege from the remote machines. You accidentally deleted the password file. What will be the consequence of this action?()A Both the sessions will be killed, and no new sessions will be created using the SYSDBA or SYSOPER privilege.B Both the sessions will remain active, but no new sessions will be created using the SYSDBA or SYSOPER privilege.CBoth the sessions will be killed, but new sessions will be created using the SYSDBA or SYSOPER privilege when the database restarts.D The database will crash, and no new sessions will be created using the SYSDBA or SYSOPER privilege when the database restarts.
单选题You need to design a software usage policy for the employees of Southbridge Video. The policy must meet business requirements. What should you do?()AConfigure the software restriction policy in the Default Domain Policy Group Policy object (GPO)BCreate a new connection object by using the Connection Manager Administration Kit (CMAK), and install the new connection object on all client computersCCreate and configure a local security policy on both of the ISA server computersDConfigure the Internet Explorer settings in the Default Domain Policy Group Policy object (GPO)
单选题Terminal Services application runs on the server. Users report that the application stops responding. You monitor the memory usage on the server for a week. You discover that the application has a memory leak. A patch is not currently available. You create a new resource-allocation policy in Microsoft Windows Server Resource Manager. You configure a Process Matching Criteria named TrackShip and select the application. You need to terminate the application when the application consumes more than half of the available memory on the server. What should you do?()AConfigure the resource-allocation policy and set the maximum working set limit option to half the available memory on the server. Set the new policy as a Profiling Policy.BConfigure the resource-allocation policy and set the maximum working set limit option to half the available memory on the server. Set the new policy as a Managing Policy.CConfigure the resource-allocation policy and set the maximum committed memory option to half the available memory on the server. Set the new policy as a Profiling Policy.DConfigure the resource-allocation policy and set the maximum committed memory option to half the available memory on the server. Set the new policy as a Managing Policy.
单选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services,and configuring aweb services infrastructure. You are in charge of a server that runs Windows Server 2008. The TerminalServices server role is installed on the server. A Terminal Services application runs on the server. Now youreceive report from users saying that that the application stops responding. You monitor the memory usageon the server for a week and find that the application has a memory leak. A patch is not currently available.You create a new resource-allocation policy in Microsoft Windows System Resource Manager (WSRM).You configure a Process Matching Criteria named TrackShip and choose the application. You have toterminate the application when the application consumes more than half of the available memory on theserver. What action should you perform?()AThe resource-allocation policy and the maximum working set limit option should be set to half the available memory on the server. The new policy should be set as a Managing Policy.BThe resource-allocation policy and the maximum committed memory option should be set to half the available memory on the server. The new policy should be set as a Profiling Policy.CThe resource-allocation policy and the maximum committed memory option should be set to half the available memory on the server. The new policy should be set as a Managing Policy.DThe resource-allocation policy should be configured and the maximum working set limit option should be set to half the available memory on the server. The new policy should be set as a Profiling Policy.
单选题After applying the policy-rematch statement under the security policies stanza, what would happen to an existing flow if the policy source address or the destination address is changed and committed?()AThe Junos OS drops any flow that does not match the source address or destination address.BAll traffic is dropped.CAll existing sessions continue.DThe Junos OS does a policy re-evaluation.
单选题In the exhibit, you decided to change myHosts addresses. [edit security policies] user@host# show from-zone Private to-zone External { policy MyTraffic { match { source-address myHosts; destination-address ExtServers;application [ junos-ftp junos-bgp ]; } then { permit { tunnel { ipsec-vpn vpnTunnel; } } } } } policy-rematch; What will happen to the new sessions matching the policy and in-progress sessions that hadalready matched the policy?()ANew sessions will be evaluated. In-progress sessions will be re-evaluated.BNew sessions will be evaluated. All in-progress sessions will continue.CNew sessions will be evaluated. All in-progress sessions will be dropped.DNew sessions will halt until all in-progress sessions are re-evaluated. In-progress sessions will be re-evaluated and possibly dropped.
单选题In the configuration shown in the exhibit, you decided to eliminate the junos-ftp applicationfrom the match condition of the policy MyTraffic. [edit security policies] user@hostl# show from-zone Private to-zone External { policy MyTraffic { match { source-address myHosts; destination-address ExtServers; application [ junos-ftp junos-bgp ]; } then { permit { tunnel { ipsec-vpn vpnTunnel; } } } } } policy-rematch; What will happen to the existing FTP and BGP sessions?()AThe existing FTP and BGP sessions will continue.BThe existing FTP and BGP sessions will be re-evaluated and only FTP sessions will be dropped.CThe existing FTP and BGP sessions will be re-evaluated and all sessions will be dropped.DThe existing FTP sessions will continue and only the existing BGP sessions will be dropped.
单选题Using a policy with the policy-rematch flag enabled, what happens to the existing and newsessions when you change the policy action from permit to deny?()AThe new sessions matching the policy are denied. The existing sessions are dropped.BThe new sessions matching the policy are denied. The existing sessions, not being allowed to carry any traffic, simply timeout.CThe new sessions matching the policy might be allowed through if they match another policy. The existing sessions are dropped.DThe new sessions matching the policy are denied. The existing sessions continue until they are completed or their timeout is reached.
单选题In the exhibit, you decided to change myHosts addresses. [edit security policies] user@host# show from-zone Private to-zone External { policy MyTraffic { match { source-address myHosts; destination-address ExtServers;application [ junos-ftp junos-bgp ]; } then { permit { tunnel { ipsec-vpn vpnTunnel; } } } } } policy-rematch; What will happen to the new sessions matching the policy and in-progress sessions that hadalready matched the policy?()ANew sessions will be evaluated. In-progress sessions will be re-evaluated.BNew sessions will be evaluated. All in-progress sessions will continue.CNew sessions will be evaluated. All in-progress sessions will be dropped.DNew sessions will halt until all in-progress sessions are re-evaluated. In-progress sessions will be re-evaluated and possibly dropped.
单选题Using a policy with the policy-rematch flag enabled, what happens to the existing and new sessionswhen you change the policy action from permit to deny? ()AThe new sessions matching the policy are denied. The existing sessions are dropped.BThe new sessions matching the policy are denied. The existing sessions, not being allowed to carry any traffic, simply timeout.CThe new sessions matching the policy might be allowed through if they match another policy. The existing sessions are dropped.DThe new sessions matching the policy are denied. The existing sessions continue until they are completed or their timeout is reached.
单选题Using a policy with the policy-rematch flag enabled, what happens to the existing and new sessions when you change the policy action from permit to deny?()AThe new sessions matching the policy are denied. The existing sessions are dropped.BThe new sessions matching the policy are denied. The existingsessions, not being allowed tocarry any traffic, simply timeout.CThe new sessions matching the policy might be allowed through if they match another policy. The existing sessions are dropped.DThe new sessions matching the policy are denied. The existing sessions continue until they are completed or their time.