网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Mandatory Access requires that sensitivity labels be attached to all objects. Which of the following would be designated as objects on a MAC system?强制访问控制需要敏感性标识被标识在所有客体,以下哪一个将在访问控制系统上标识为一个客体?()
A
users, windows, and programs.用户,窗口,以及程序
B
files, directories, and print queue文件、 目录和打印队列
C
devices, processes, I/O pipe, and sockets.设备,进程,输入输出通道以及接口
D
files, directories, processes, and sockets.文件、目录,进程,以及接口
参考答案
参考解析
解析:
暂无解析
更多 “单选题Mandatory Access requires that sensitivity labels be attached to all objects. Which of the following would be designated as objects on a MAC system?强制访问控制需要敏感性标识被标识在所有客体,以下哪一个将在访问控制系统上标识为一个客体?()A users, windows, and programs.用户,窗口,以及程序B files, directories, and print queue文件、 目录和打印队列C devices, processes, I/O pipe, and sockets.设备,进程,输入输出通道以及接口D files, directories, processes, and sockets.文件、目录,进程,以及接口” 相关考题
考题
LOCATION UPDATE的原因值有()
A.Normal location updatingB.Peroid updatingC.IMSI attachD.GPRS AttachE.Power on
考题
What is necessary for a subject to have read access to an object in a Multi-Level Security Policy?什么对于主体在多层安全策略中拥有对一个客体的访问权限是必要的?()A、The subject's sensitivity label must dominate the object's sensitivity label.主体的敏感性标识必须支配客体的敏感性标识B、The subject's sensitivity label subordinates the object's sensitivity label.主体的敏感性标识从属于客体的敏感性标识C、The subject's sensitivity label is subordinated by the object's sensitivity label.主体的敏感性标识被客体的敏感性标识从属D、The subject's sensitivity label is dominated by the object's sensitivity label.主体的敏感性标识以客体的敏感性标识为主体
考题
In Mandatory Access Control, sensitivity labels contain what information?在强制访问控制中,敏感性标识包含什么信息?()A、the item's classification对象的分类B、the item's classification and category set对象的分类和类别设置C、the item's classification, category set and compartment set对象的分类、 分类设置和隔间设置D、the item's classification and its compartment对象的分类以及它的间隔
考题
Which of the following are necessary components of a Multi-Level Security Policy?下列哪一项是多级安全策略必需的组件?()A、Sensitivity Labels for subjects objects and a "system high" evaluation.对主体和客体实施敏感性标识以及对其进行系统高的评价B、Security Clearances for subjects Security Labels for objects and Mandatory Access Control.对主体和客体安全标识的安全许可以及强制访问控制C、Sensitivity Labels for only objects and Mandatory Access Control.只针对客体的敏感性标识和强制访问控制D、Sensitivity Labels for subjects objects and Discretionary Access Control.对主体及客体的敏感性表情和自主访问控制
考题
What is one reason you might recommend a solution using only autonomous access points to a customer? ()A、 The customer requires Layer 3 roaming.B、 The customer requires immediate wire line integration with a catalyst 6500 switch.C、 The customer needs an outdoor-ready access point.D、 The customer wants the option to migrate to LWAPP.
考题
Which two pieces of information are needed when declaring the web resource collection in the deployment descriptor?()A、 the URL pattern that requires authorizationB、 the HTTP methods that require authorizationC、 the users allowed access to the web resourceD、 the J2EE roles allowed access to the web resourceE、 the authentication mechanism required by the web resource
考题
You are installing a new deployment of the Junos Pulse Access Control Service. In your environment, you have VoIP handsets that support 802.1X authentication with EAP-MD5.Which deployment constraint must you consider?()A、EAP-MD5 is not supported by the Junos Pulse Access Control ServiceB、EAP-MD5 requires passwords to be stored in an encrypted format.C、EAP-MD5 requires passwords to be stored in a clear text format.D、EAP-MD5 performs a real time hash of the handset's MAC address.
考题
Which two statements best describe the wireless security standard that is defined by WPA (Choose two.)()。A、It specifies use of a static encryption key that must be changed frequently to enhance securityB、It requires use of an open authentication methodC、It specifies the use of dynamic encryption keys that change each time a client establishes a connectionD、It requires that all access points and wireless devices use the same encryption keyE、It includes authentication by PSK
考题
LOCATION UPDATE的原因值有()A、Normal location updatingB、Peroid updatingC、IMSI attachD、GPRS AttachE、Power on
考题
Which statement regarding 802.1X is true?()A、802.1X is simple to implement on any workstation.B、802.1X requires access-lists to allow IP voice traffic across.C、Authentication is initiated when the workstation connects to an Ethernet port.D、802.1X requires HTTP access to initiate authentication.
考题
On a Series 1010 lightweight access point, the alarm LED is flashing red, and all other LEDs are off. What is the lightweight access point indicating?()A、It has lost contact with controller.B、Its IP address already exists.C、It requires a code upgrade.D、It is operating normally.
考题
Which two statements about a wireless repeater topology are true?()A、A wireless repeater is an access point that is not connected to the wired LAN.B、The repeater feature is only available in lightweight access point topologies.C、The SSID of the root access point must be configured on the repeater access point.D、This topology requires a 10 - 15 percent overlap between a wired access point and the wireless repeater.E、This topology requires a 15 - 25 percent overlap between a wired access point and the wireless repeater.F、To avoid interference, the repeater access point must use a different channel from what the root access point uses.
考题
Mandatory Access requires that sensitivity labels be attached to all objects. Which of the following would be designated as objects on a MAC system?强制访问控制需要敏感性标识被标识在所有客体,以下哪一个将在访问控制系统上标识为一个客体?()A、users, windows, and programs.用户,窗口,以及程序B、files, directories, and print queue文件、 目录和打印队列C、devices, processes, I/O pipe, and sockets.设备,进程,输入输出通道以及接口D、files, directories, processes, and sockets.文件、目录,进程,以及接口
考题
A class design requires that a member variable cannot be accessible directly outside the class. Which modifier should be used to obtain the access control?() A、 publicB、 no modifierC、 protectedD、 private
考题
Your corporate network has a member server named RAS1 that runs Windows Server 2008 R2. You configure RAS1 to use the Routing and Remote Access Services (RRAS).The companys remote access policy allows members of the Domain Users group to dial in to RAS1. The company issues smart cards to all employees.You need to ensure that smart card users are able to connect to RAS1 by using a dial-up connection.What should you do?()A、Install the Network Policy Server (NPS) server role on RAS1.B、Create a remote access policy that requires users to authenticate by using SPAP.C、Create a remote access policy that requires users to authenticate by using EAP-TLS.D、Create a remote access policy that requires users to authenticate by using MS-CHAP v2.
考题
Your corporate network has a member server named RAS1 that runs Windows Server 2008. You configure RAS1 to use the Routing and Remote Access Service (RRAS) The companys remote access policy allows members of the Domain Users group to dial in to RAS1. The company issues smart cards to all employees. You need to ensure that smart card users are able to connect to RAS1 by using a dial-up connection. What should you do?()A、 Install the Network Policy Server (NPS) on the RAS1 serverB、 Create a remote access policy that requires users to authenticate by using SPAPC、 Create a remote access policy that requires users to authenticate by using EAP-TLSD、 Create a remote access policy that requires users to authenticate by using MS-CHAP v2
考题
单选题In Mandatory Access Control, sensitivity labels contain what information?在强制访问控制中,敏感性标识包含什么信息?()A
the item's classification对象的分类B
the item's classification and category set对象的分类和类别设置C
the item's classification, category set and compartment set对象的分类、 分类设置和隔间设置D
the item's classification and its compartment对象的分类以及它的间隔
考题
单选题Which of the following are necessary components of a Multi-Level Security Policy?下列哪一项是多级安全策略必需的组件?()A
Sensitivity Labels for subjects objects and a system high evaluation.对主体和客体实施敏感性标识以及对其进行系统高的评价B
Security Clearances for subjects Security Labels for objects and Mandatory Access Control.对主体和客体安全标识的安全许可以及强制访问控制C
Sensitivity Labels for only objects and Mandatory Access Control.只针对客体的敏感性标识和强制访问控制D
Sensitivity Labels for subjects objects and Discretionary Access Control.对主体及客体的敏感性表情和自主访问控制
考题
单选题On a cisco 1000 series controller-based access point,the alarm led is flashing red,but the other leds are off. What is this access point indicating?()A
its ip address already exists.B
it is operating normally.C
it requires a code upgrade.D
it has lost contact with the controller.
考题
单选题Typical ADSL broadband Internet access requires a username and password to be entered on end-userPC connected to the ADSL modem in order for the end user to gain access to the Internet.if a Cisco ADSLrouter is used instead of an ADSL modem,what functionality is required on the Cisco ADSL router so theend-user connected to the Cisco ADSL router can access the Internet without entering a username andpassword?()A
PPPoAB
Route Bridge Encapsulation(RBE)C
PPPoE clientD
Integrated Routing and Bridging(IRB)E
AAA
考题
单选题You are installing a new deployment of the Junos Pulse Access Control Service. In your environment, you have VoIP handsets that support 802.1X authentication with EAP-MD5.Which deployment constraint must you consider?()A
EAP-MD5 is not supported by the Junos Pulse Access Control ServiceB
EAP-MD5 requires passwords to be stored in an encrypted format.C
EAP-MD5 requires passwords to be stored in a clear text format.D
EAP-MD5 performs a real time hash of the handset's MAC address.
考题
多选题You administer a network containing SRX Series firewalls. New policy requires that you implement MAG Series devices to provide access control for end users. The policy requires that the SRX Series devices dynamically enforce security policy based on the source IP address of the user. The policy also requires that the users communicate with protected resources using encrypted traffic. Which two statements are true?()AThe endpoints can use agentless access.BEncrypted traffic flows between the endpoint and the enforcer.CEncrypted traffic flows between the endpoint and the protected resourceDThe endpoints can use the Odyssey Access Client.
考题
单选题A corporation is not concerned about wireless use by Teleworkers. Authentication for any application first requires access via a web browser to a protected site. Given these requirements, choose the appropriate security feature to use to enforce the security policy.()A
Authentication ProxyB
802.1X C
Context-Based Access ControlD
Intrusion Detection SystemE
Stateful firewall
考题
单选题A class design requires that a member variable cannot be accessible directly outside the class. Which modifier should be used to obtain the access control?()A
publicB
no modifierC
protectedD
private
考题
多选题Which two statements about a wireless repeater topology are true?()AA wireless repeater is an access point that is not connected to the wired LAN.BThe repeater feature is only available in lightweight access point topologies.CThe SSID of the root access point must be configured on the repeater access point.DThis topology requires a 10 - 15 percent overlap between a wired access point and the wireless repeater.EThis topology requires a 15 - 25 percent overlap between a wired access point and the wireless repeater.FTo avoid interference, the repeater access point must use a different channel from what the root access point uses.
考题
单选题A design requires 100 access points with high channel bandwidth and disabled lower data rates.How are the data rates set on the Cisco WLC and Cisco WCS?()A
per SSIDB
per access pointC
globallyD
per WLAN and radio
考题
单选题On a series 1010 lightweight access point, the alarm led is flashing red, and all other leds are off. What is the lightweight access point indicating?()A
it has lost contact with controller.B
its ip address already exists.C
it requires a code upgrade.D
it is operating normally.
热门标签
最新试卷