多选题A site administrator is configuring Resource-level access control. Which of the following statements about Resource-level access control are true? Resource-level access control policies:()Aare optionalBare used to protect data beansCprovide coarse-grained access controlDnever specify a relationship
多选题
A site administrator is configuring Resource-level access control. Which of the following statements about Resource-level access control are true? Resource-level access control policies:()
A
are optional
B
are used to protect data beans
C
provide coarse-grained access control
D
never specify a relationship
参考解析
解析:
暂无解析
相关考题:
An administrator is configuring one server to monitor hardware level information on a second Windows server.Which of the following should be setup on the Windows server to allow the monitoring server to access this information?()A. WMIB. RISC. DNSD. SNMPE. SMTP
A network administrator is configuring ACLs on a cisco router, to allow affic from hosts on networks 192.168.146.0,192.168.147.0,192.168.148.0 and 192.168.149.0 only.Which two ACL statements when combined are the best for accomplishing the task?()A.access-list 10 permit ip 192.168.147.0 0.0.0.255.255B.access-list 10 permit ip 192.168.149.0 0.0.0.255.255C.access-list 10 permit ip 192.168.146.0 0.0.0.0.255D.access-list 10 permit ip 192.168.146.0 0.0.1.255E.access-list 10 permit ip 192.168.148.0 0.0.1.255F.access-list 10 permit ip 192.168.146.0 255.255.255.0
Which two practices help secure the configuration utilities on wireless access points from unauthorized access? (Choose two.)()A、assigning a private IP address to the APB、changing the default SSID valueC、configuring a new administrator passwordD、changing the mixed mode setting to single modeE、configuring traffic filtering
What is the key objective of the plan phase?()A、Identify the activities involved in installing and configuring equipment at a customer’s site or sitesB、Describe the day-to-day activities required to support, manage, and monitor a newly implemented systemC、Access current network readiness, site readiness, and operational readiness in preparation for designing a solution proposalD、Gain an understanding of high-level business and technical requirements
A network administrator is configuring ACLs on a cisco router, to allow affic from hosts on networks 192.168.146.0,192.168.147.0,192.168.148.0 and 192.168.149.0 only.Which two ACL statements when combined are the best for accomplishing the task?()A、access-list 10 permit ip 192.168.147.0 0.0.0.255.255B、access-list 10 permit ip 192.168.149.0 0.0.0.255.255C、access-list 10 permit ip 192.168.146.0 0.0.0.0.255D、access-list 10 permit ip 192.168.146.0 0.0.1.255E、access-list 10 permit ip 192.168.148.0 0.0.1.255F、access-list 10 permit ip 192.168.146.0 255.255.255.0
A site administrator is configuring Resource-level access control. Which of the following statements about Resource-level access control are true? Resource-level access control policies:()A、are optionalB、are used to protect data beansC、provide coarse-grained access controlD、never specify a relationship
The Company security administrator wants to prevent VLAN hopping on the network. What is one method that can be used to do this? ()A、 Attacks are prevented by utilizing the port-security feature.B、 An end station attempts to gain access to all VLANs by transmitting Ethernet frames in the 802.1q encapsulation.C、 Configuring an interface with the switchport mode dynamic command will prevent VLAN hopping.D、 An end station attempts to redirect VLAN traffic by transmitting Ethernet frames in the 802.1q encapsulation.E、 Configuring an interface with the "switchport mode access" command will prevent VLAN hopping.
Which of the following topology situations would be a qood candidate for configuring DMVPN()A、Extranet VPNB、Managed overlay VPN topologyC、Hub-and-spoke VPN topologyD、Central-site VPN topologyE、Full mesh VPN topologyF、Remote-access VPN topology
An administrator is configuring one server to monitor hardware level information on a second Windows server.Which of the following should be setup on the Windows server to allow the monitoring server to access this information?()A、WMIB、RISC、DNSD、SNMPE、SMTP
An administrator has just installed a web server for the companys Internet site. After bringing the system online, customers notify the administrator that they cannot connect to the server. The administrator tests the web server from a workstation and can access the website. The customers continue to report issues. Which of the following is the MOST likely reason for this?()A、 The servers firewall is misconfigured.B、 The server’s timeout feature is set incorrectly.C、 The web server was not installed properly.D、 The company firewall is misconfigured.
A site administrator is configuring Command-level access control. Which of the following statements about Command-level access control are true? Command level access control policies: ()A、are mandatoryB、specify action group ExecuteCommandActionGroup for Controller commandsC、specify action group ViewCommandActionGroup for View commandsD、specify resource group ControllerCommandResourceGroup for Controller commandsE、specify resource group ViewCommandResourceGroup for View commands
Your network contains three Active Directory sites named Site1, Site2, and Site3. Users can only access Site1 from the Internet. In each site, you plan to deploy a Mailbox server and a Hub Transport server. You need to plan the deployment of Exchange servers to meet the following requirements: .Ensure that Exchange ActiveSync and Outlook Anywhere clients can connect to their Mailboxes from theInternet .Minimize hardware costs What should you include in your plan?()A、In Site1, deploy one Client Access server.B、In each site, deploy one Client Access server.C、In Site1, deploy one Client Access server and one Edge Transport server.D、In each site, deploy one Client Access server and one Edge Transport server.
You are an IIS Web server administrator implementing authentication settings for a new Web site.According to the requirements for the Human Resources Web site, users should be prompted forauthentication information when they attempt to access the site. The site will be accessed only by userswho have accounts in your organization’s Active Directory domain. You have already configured the filesystem permissions for the content based on the appropriate settings. You also want to maximize securityof the site. Which two actions should you take to meet these requirements?()A、Enable Windows authentication.B、Enable basic authentication.C、Disable anonymous authentication.D、Enable anonymous authentication.
You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You are in charge of a member server that runs Windows Server 2008. Themember server has the Web Server (IIS) server role installed. The server hosts a Web site that is onlyaccessible to the executives of your company. According to the requirement of the company policy, theexecutives must use user certificates to access the confidential Web content. You have to make sure thatthe executives can only access the secure Web site by using their installed certificates. What action shouldyou perform to make sure of this?()A、A Certificate Trust list should be configured to include the executives certification authority (CA)certificate.B、The SSL settings should be configured to Require 128-bit SSL on the confidential Web site.C、The Client Certificates settings should be configured to Accept on the SSL settings for the confidentialWeb site.D、The Client Certificates settings should be configured to Require on the SSL settings for the confidentialWeb site.
Your network contains two Active Directory sites named Site1 and Site2. Only Site1 can be accessed from the Internet. You have an Exchange Server 2010 organization. You deploy a Client Access server in Site1 and enable Windows Integrated Authentication for OutlookWeb App (OWA). In Site2, you deploy a Mailbox server and a Client Access server. You need to configure the Exchange organization to meet the following requirements: .Allow users to access their mailboxes from the Internet by using OWA .Prevent authentication prompts from displaying when users connect to OWA by using domain- joinedcomputers that are connected to the internal network What should you do?()A、Modify the Exchange virtual directory on the Client Access server in Site1.B、Modify the Exchange virtual directory on the Client Access server in Site2.C、Modify the OWA virtual directory on the Client Access server in Site1.D、Modify the OWA virtual directory on the Client Access server in Site2.
单选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You are in charge of a member server that runs Windows Server 2008. Themember server has the Web Server (IIS) server role installed. The server hosts a Web site that is onlyaccessible to the executives of your company. According to the requirement of the company policy, theexecutives must use user certificates to access the confidential Web content. You have to make sure thatthe executives can only access the secure Web site by using their installed certificates. What action shouldyou perform to make sure of this?()AA Certificate Trust list should be configured to include the executives certification authority (CA)certificate.BThe SSL settings should be configured to Require 128-bit SSL on the confidential Web site.CThe Client Certificates settings should be configured to Accept on the SSL settings for the confidentialWeb site.DThe Client Certificates settings should be configured to Require on the SSL settings for the confidentialWeb site.
多选题An administrator is configuring one server to monitor hardware level information on a second Windows server.Which of the following should be setup on the Windows server to allow the monitoring server to access this information?()AWMIBRISCDNSDSNMPESMTP
单选题You are a systems administrator who is attempting to troubleshoot a problem with accessing a Web site ona computer running Windows Server 2008. In the past, users have been able to access the Web site byusing http://hr.contoso.com. However, when they attempt to access the site now, they receive the errormessage "Internet Explorer Cannot Display The Web page." Which of the following steps should you taketo resolve the error?()AUsing Server Manager, add the HTTP Errors server role.BUsing Server Manager, verify that the World Wide Web Publishing Service has been started.CVerify the configuration of the usersWeb browsers.DUsing Server Manager, add the HTTP Logging server role.
单选题You are a Windows Server 2008 systems administrator responsible for configuring FTP Publishing Servicefor use by members of your organization’s engineering department. The name of the server is FTPServer01. Several users have reported that they are able to access most files through the FTP site,but they cannot access the contents of the Drawings folder. You have verified that these users. Windowsaccounts have the correct file system permissions for this folder. You want to minimize the permissionsgranted to all the users. Which of the following changes should you make to enable users to access thisfolder?()AChange the permissions for the IUSR_FTPServer01 account on the Drawings folder.BCreate new TCP/IP Address Restrictions entries for the users who cannot access the Drawings folder.CDisable the Allow Only Anonymous Connections option.DAdd the users to the local Administrators group on FTPServer02.
单选题Rate your level of proficiency with configuring and troubleshooting access to files and shared folders,configuring file system permissions, and troubleshooting Terminal Services. ()AVery HighBHighCModerateDLowEVery Low
单选题Your network consists of an Active Directory forest that contains two sites named Site1 and Site2. From the Internet, users can only access servers in Site1. You have an Exchange Server 2007 organization. Each site contains servers that run the Client Access server role, the Mailbox server role, and the HubTransport server role. You plan to transition the organization to Exchange Server 2010. You need to recommend the server role that you must transition first to Exchange Server 2010. Your solution must provide the least amount of downtime for users in the organization. Which servers should you transition first?()Athe Client Access servers in Site1Bthe Client Access servers in Site2Cthe Hub Transport servers in Site1Dthe Hub Transport servers in Site2
单选题An administrator is configuring cross-site LVM and wants to ensure that logical volume copies are always onseparate disks. When creating a new logical volume, how could the administrator ensure that this requirement is achieved?()ASet the allocation policy to strictBSet the allocation policy to superstrictCSet the Maximum Number of Physical Volumes to 2DSet the Number of Copies for each logical partition to 2
多选题A site administrator is configuring Resource-level access control. Which of the following statements about Resource-level access control are true? Resource-level access control policies:()Aare optionalBare used to protect data beansCprovide coarse-grained access controlDnever specify a relationship
单选题Which of the following topology situations would be a qood candidate for configuring DMVPN?()AExtranet VPNBManaged overlay VPN topologyCHub-and-spoke VPN topologyDCentral-site VPN topologyEFull mesh VPN topologyFRemote-access VPN topology
单选题You have a public computer that runs Windows XP Professional. All users log on to the computer by using the same user account. You log on to the computer by using the local administrator account and attempt to access a secure Web site. You discover that you have automatically logged on to the secure Web site by using the credential of another user. You need to connect to the secure Web site by using your own credentials. What should you do?()ARun ipconfig /flushdns at the command prompt. BReset the password for the local administrator user account. CFrom the Internet Options in Internet Explorer, clear the AutoComplete history.DFrom the Internet Options in Internet Explorer, delete the Temporary Internet Files.
单选题You are a systems administrator troubleshooting a problem with accessing a Web server running WindowsServer 2008. Previously, another administrator created and installed a server certificate on the computer.Users report that they are able to connect to the site using HTTP but that they receive a warning in InternetExplorer when trying to connect by HTTPS. You want to enable users to connect using both HTTP andHTTPS. You attempt to access the site by using an instance of Internet Explorer on the server itself, andyou receive the same warning message for HTTPS connections. How can you resolve this issue?()AChange the site binding for the Web site to enable connections on port 443.BChange the SSL settings for the Web site to enable the Require SSL option.CObtain and install an Internet Certificate on the Web server.DExport and re import the existing security certificate.
单选题Your network contains two Active Directory sites named Site1 and Site2. Only Site1 can be accessed from the Internet. You have an Exchange Server 2010 organization. You deploy a Client Access server in Site1 and enable Windows Integrated Authentication for OutlookWeb App (OWA). In Site2, you deploy a Mailbox server and a Client Access server. You need to configure the Exchange organization to meet the following requirements: .Allow users to access their mailboxes from the Internet by using OWA .Prevent authentication prompts from displaying when users connect to OWA by using domain- joined computers that are connected to the internal network What should you do?()AModify the Exchange virtual directory on the Client Access server in Site1.BModify the Exchange virtual directory on the Client Access server in Site2.CModify the OWA virtual directory on the Client Access server in Site1.DModify the OWA virtual directory on the Client Access server in Site2.