单选题Companycom informs the system administrator that there is concern about the Electronic Service Agent and security. What can be said about Electronic Service Agent that will address concerns about security?()AAll Service Agent transactions are inbound requests secured by encryption (cryptographic processor card) Kerberos, and Hypertext Transfer Protocol Secure (HTTPS). BThe ATT Global Network Services (AGNS ) phone connection generates system IDs and passwords for the client every six months. Service Agent has no inbound capability.CAll Service Agent transactions are outbound requests secured by encryption (Hypertext Transfer Protocol Secure (HTTPS) or POST). Service Agent has no inbound capability. DThe transmissions from Service Agent can be either by Internet or the ATT Global Network Services (AGNS) phone connection. Service Agent transactions are inbound requests generated by a point to point connection.
单选题
Companycom informs the system administrator that there is concern about the Electronic Service Agent and security. What can be said about Electronic Service Agent that will address concerns about security?()
A
All Service Agent transactions are inbound requests secured by encryption (cryptographic processor card) Kerberos, and Hypertext Transfer Protocol Secure (HTTPS).
B
The AT&T Global Network Services (AGNS ) phone connection generates system IDs and passwords for the client every six months. Service Agent has no inbound capability.
C
All Service Agent transactions are outbound requests secured by encryption (Hypertext Transfer Protocol Secure (HTTPS) or POST). Service Agent has no inbound capability.
D
The transmissions from Service Agent can be either by Internet or the AT&T Global Network Services (AGNS) phone connection. Service Agent transactions are inbound requests generated by a point to point connection.
参考解析
解析:
暂无解析
相关考题:
The residents of 24 Acacia Grove were dissatisfied with the condition of the property, so John Preston called a meeting to discuss things last week. At the meeting John suggested setting up a residents’ committee. Everyone was so worried and angry about the agent’s inactivity that they agreed, and they elected John as chairman of the committee. Many residents said that they were tired of telephoning the agent and tired of complaining about the flats. Although the agent was responsible for the flats, they thought that he didn’t do enough. Therefore John was asked to write to the agent and say that they were disappointed with the management of the flats.The next service payment was due at the end of the month. However, they agreed not to pay it until they were happy with the plans to improve the property. They decided to tell the agent that he must start the work within one month. They all went away very pleased with themselves.1.Why did John Preston call a meeting last week?A.Because the residents were dissatisfied with the presents’ committee.B.Because the residents were dissatisfied with the bad management of the flats.C.Because some residents requested to change the present residents’ committee. E. Because he wanted to become chairman of the committee.2.Who elected John as chairman of the committee?A.The agentB.the residentsC.the committeeD.Acacia Grove3.What does the word “inactivity”mean in the thrid sentence in Para.1?“inactivity”A.weaknessB.ProgressC.StateD.Lace of actions4.What does the word “due” mean in the first sentence in Para.2?A.to be paidB. ProperC. OwedD. large5.When did they agree to pay the next service payment?A.at the end of the monthB.Within one monthC.When they were happy with the plans to improve the property.D.The agent would tell them.
Which statement is true about a distributed call control environment and the processing of dialed digits from an IP phone?()A、The router that is directly connected to the IP phone will look up the called number in its call routing table.B、The router that is directly connected to the IP phone will inform its call agent when a service request is detected.C、When the IP phone is picked up,the IP phone initiates the service request.D、The directly connected router passes the collected digits to its call agent,and the call agent looks up in its call-routing table the called number.
What can you install on IPCC Express to protect against worms, zero-day viruses, and other immediate security threats?()A、Microsoft Management Console B、Cisco Security Agent (headless agent) C、Cisco Security Agent Management Center D、Microsoft SQL Server 2000
Which statement is true about "full state backup" in a Cisco Unified Computing System?()A、 An XML file containing all details of the system, including IP address and cluster details B、 A binary file containing only service profiles, pools, and other items configured after initial configurationC、 A binary file containing all details of the system, including IP address and cluster detailsD、 An XML file containing only service profiles, pools, and other items configured after initial configurationE、 A text file with the NX-OS running configuration
The Service Agent User Interface option is being selected for Electronic Service Agent on the HMC. What would be typed in to authenticate and gain access to the application?()A、abc123B、hscrootC、passw0rdD、password
IBM remote support for hardware maintenance is required for several mission critical Power 595 servers. The data center is very security conscious and does not allow internet access. How should an administrator configure outbound connectivity of Electronic Service Agent?() A、VPNB、ModemC、Private LAND、Pass-through systems
Companycom informs the system administrator that there is concern about the Electronic Service Agent and security. What can be said about Electronic Service Agent that will address concerns about security?()A、All Service Agent transactions are inbound requests secured by encryption (cryptographic processor card) Kerberos, and Hypertext Transfer Protocol Secure (HTTPS). B、The ATT Global Network Services (AGNS ) phone connection generates system IDs and passwords for the client every six months. Service Agent has no inbound capability.C、All Service Agent transactions are outbound requests secured by encryption (Hypertext Transfer Protocol Secure (HTTPS) or POST). Service Agent has no inbound capability. D、The transmissions from Service Agent can be either by Internet or the ATT Global Network Services (AGNS) phone connection. Service Agent transactions are inbound requests generated by a point to point connection.
On which HMC GUI panel can the ’Enable Electronic Service Agent’ option be found?() A、HMC ManagementB、Systems ManagementC、Service ManagementD、Electronic Management
A new customer wants to install a Power 750 in a warehouse location that has no local staff to support it. They are concerned about hardware support and would like to have the system notify IBM service if there is an issue.Which actions will address the customer concern?()A、Enable automatic problem reporting from smitB、Use IVM to enable console mirroring to IBM Remote Support.C、Use the HMC to enable reporting through Electronic Service Agent.D、Enable Automatic Problem Reporting in ASMI using he embedded modem on the FSP.
You want to provide all users in your corporation with a single agent that provides access to multiple connection types conditionally. For example, you connect to the Junos Pulse Access Control Service if you are connected to the intranet, but you connect to the Junos Pulse Secure Access Service if you are on a remote network. Which agent should you use for this type of connection requirement?()A、Junos Pulse should be configured with location awareness rules configured.B、Odyssey Access Client should be installed with Host Checker configured to check the client's location.C、Junos Pulse should be configured with all components installed.D、Agentless access should be enabled so that clients can connect to any service without concern for installing an agent.
You have three classes of users on your network: employee, contractor, and IT administrator. You configure the Junos Pulse Access Control Service to assign roles to each user class and require that a specific wireless SSID be preconfigured for the Odyssey Access Client based on the role. Which configuration method should you use to satisfy this scenario?()A、Create a "Settings Update file" in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under "User Roles" "Agent" "Odyssey Settings" "Preconfigured Installer".B、Configure a wired adapter and assign the required SSID under "User Roles" "Agent" "Odyssey Settings".C、Create a script in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under "User Roles" "Agent" "Odyssey Settings" "Preconfigured Installer".D、Create a "Preconfiguration file" in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under "User Roles" "Agent" "Odyssey Settings" "Preconfigured Installer".
All client computers in your network run Windows 7 with default firewall settings. You have a server-based application that requires an agent to be installed on all client computers. You need to use Group Policy to allow the application to initiate installation of the agent on all client computers. What should you do?()A、Create inbound port rules.B、Create inbound program rules.C、Create connection security rules.D、Create Windows service hardening rules.
You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2002 instance. You upgrade this instance to SQL Server 2008. You configure the Agent service to use the LocalSystem account. There is a file named Orderdata on a remote network share. A job accesses this Orderdata file by using a CMDExec step. The job step fails to complete execution after the upgrade. You must make sure that the job can complete execution, so you have to configure the job step. What action should you perform? () A、You should configure a certificate B、You should configure the SQL Server Agent service to use the NetworkService account.C、You should configure the job step to use a proxy account D、You should configure the SQL Server Agent service to use a local Windows account
Companycom is trying to communicate with the service processor of the a new p5 590. However, the customer can not access the service processor. What needs to be done to fix this problem?()A、Enable DHCP server on the HMCB、Configure host name and IP address on DNS serverC、Manually set the IP address of the service processorD、Connect a RS-232 cable from the HMC to the service processor
单选题What can you install on IPCC Express to protect against worms, zero-day viruses, and other immediate security threats?()AMicrosoft Management Console BCisco Security Agent (headless agent) CCisco Security Agent Management Center DMicrosoft SQL Server 2000
单选题A new customer wants to install a Power 750 in a warehouse location that has no local staff to support it. They are concerned about hardware support and would like to have the system notify IBM service if there is an issue.Which actions will address the customer concern?()AEnable automatic problem reporting from smitBUse IVM to enable console mirroring to IBM Remote Support.CUse the HMC to enable reporting through Electronic Service Agent.DEnable Automatic Problem Reporting in ASMI using he embedded modem on the FSP.
单选题You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2002 instance. You upgrade this instance to SQL Server 2008. You configure the Agent service to use the LocalSystem account. There is a file named Orderdata on a remote network share. A job accesses this Orderdata file by using a CMDExec step. The job step fails to complete execution after the upgrade. You must make sure that the job can complete execution, so you have to configure the job step. What action should you perform? ()AYou should configure a certificate BYou should configure the SQL Server Agent service to use the NetworkService account.CYou should configure the job step to use a proxy account DYou should configure the SQL Server Agent service to use a local Windows account
单选题The Service Agent User Interface option is being selected for Electronic Service Agent on the HMC. What would be typed in to authenticate and gain access to the application?()Aabc123BhscrootCpassw0rdDpassword
单选题What is true about the functions provided by a DHCP Relay Proxy over the DHCP Relay agent?()AMonitors and manages leases.BCreates host route dynamically after address assignment.CProvides an IP address from a pool.DMust be on same subnet as DHCP server
单选题Which statement is true about a distributed call control environment and the processing of dialed digits from an IP phone?()AThe router that is directly connected to the IP phone will look up the called number in its call routing table.BThe router that is directly connected to the IP phone will inform its call agent when a service request is detected.CWhen the IP phone is picked up,the IP phone initiates the service request.DThe directly connected router passes the collected digits to its call agent,and the call agent looks up in its call-routing table the called number.
单选题You want to provide all users in your corporation with a single agent that provides access to multiple connection types conditionally. For example, you connect to the Junos Pulse Access Control Service if you are connected to the intranet, but you connect to the Junos Pulse Secure Access Service if you are on a remote network. Which agent should you use for this type of connection requirement?()AJunos Pulse should be configured with location awareness rules configured.BOdyssey Access Client should be installed with Host Checker configured to check the client's location.CJunos Pulse should be configured with all components installed.DAgentless access should be enabled so that clients can connect to any service without concern for installing an agent.
单选题On which HMC GUI panel can the ’Enable Electronic Service Agent’ option be found?()AHMC ManagementBSystems ManagementCService ManagementDElectronic Management
单选题IBM remote support for hardware maintenance is required for several mission critical Power 595 servers. The data center is very security conscious and does not allow internet access. How should an administrator configure outbound connectivity of Electronic Service Agent?()AVPNBModemCPrivate LANDPass-through systems
单选题Which statement is true about "full state backup" in a Cisco Unified Computing System?()A An XML file containing all details of the system, including IP address and cluster details B A binary file containing only service profiles, pools, and other items configured after initial configurationC A binary file containing all details of the system, including IP address and cluster detailsD An XML file containing only service profiles, pools, and other items configured after initial configurationE A text file with the NX-OS running configuration
单选题All client computers in your network run Windows 7 with default firewall settings. You have a server-based application that requires an agent to be installed on all client computers. You need to use Group Policy to allow the application to initiate installation of the agent on all client computers. What should you do?()ACreate inbound port rules.BCreate inbound program rules.CCreate connection security rules.DCreate Windows service hardening rules.
单选题Companycom is trying to communicate with the service processor of the a new p5 590. However, the customer can not access the service processor. What needs to be done to fix this problem?()AEnable DHCP server on the HMCBConfigure host name and IP address on DNS serverCManually set the IP address of the service processorDConnect a RS-232 cable from the HMC to the service processor
单选题Companycom informs the system administrator that there is concern about the Electronic Service Agent and security. What can be said about Electronic Service Agent that will address concerns about security?()AAll Service Agent transactions are inbound requests secured by encryption (cryptographic processor card) Kerberos, and Hypertext Transfer Protocol Secure (HTTPS). BThe ATT Global Network Services (AGNS ) phone connection generates system IDs and passwords for the client every six months. Service Agent has no inbound capability.CAll Service Agent transactions are outbound requests secured by encryption (Hypertext Transfer Protocol Secure (HTTPS) or POST). Service Agent has no inbound capability. DThe transmissions from Service Agent can be either by Internet or the ATT Global Network Services (AGNS) phone connection. Service Agent transactions are inbound requests generated by a point to point connection.