CMS专题

多选题A site administrator is configuring Command-level access control. Which of the following statements about Command-level access control are true? Command level access control policies: ()Aare mandatoryBspecify action group ExecuteCommandActionGroup for 

题目
多选题
A site administrator is configuring Command-level access control. Which of the following statements about Command-level access control are true? Command level access control policies: ()
A

are mandatory

B

specify action group ExecuteCommandActionGroup for Controller commands

C

specify action group ViewCommandActionGroup for View commands

D

specify resource group ControllerCommandResourceGroup for Controller commands

E

specify resource group ViewCommandResourceGroup for View commands

参考答案和解析
正确答案: D,C
解析: 暂无解析
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

A network administrator is configuring ACLs on a cisco router, to allow affic from hosts on networks 192.168.146.0,192.168.147.0,192.168.148.0 and 192.168.149.0 only.Which two ACL statements when combined are the best for accomplishing the task?()

A.access-list 10 permit ip 192.168.147.0 0.0.0.255.255

B.access-list 10 permit ip 192.168.149.0 0.0.0.255.255

C.access-list 10 permit ip 192.168.146.0 0.0.0.0.255

D.access-list 10 permit ip 192.168.146.0 0.0.1.255

E.access-list 10 permit ip 192.168.148.0 0.0.1.255

F.access-list 10 permit ip 192.168.146.0 255.255.255.0


参考答案:D, E

第2题:

What is the key objective of the plan phase?()

  • A、Identify the activities involved in installing and configuring equipment at a customer’s site or sites
  • B、Describe the day-to-day activities required to support, manage, and monitor a newly implemented system
  • C、Access current network readiness, site readiness, and operational readiness in preparation for designing a solution proposal
  • D、Gain an understanding of high-level business and technical requirements

正确答案:C

第3题:

Your company has a mix of employees and contractors. Contractor usernames always begin with"con-"; employee usernames never begin with "con-". You need to give employees access to allresources and give contractors access to a limited set of resources. Employee and contractor roles have been created with the appropriate access privileges, and the realm is set to merge settings for all assigned roles.Which role mapping ruleset would result in the correct access privileges being assigned?()

A. username="*" -> Employee-role Stop username="con-*" -> Contractor-role

B. username="*" -> Employee-role username="con-*" -> Contractor-role Stop

C. username="con-*" -> Contractor-role Stop username="*" -> Employee-role

D. username="con-*" -> Contractor-role username="*" -> Employee-role Stop


参考答案:C

第4题:

Which of the following topology situations would be a qood candidate for configuring DMVPN()

  • A、Extranet VPN
  • B、Managed overlay VPN topology
  • C、Hub-and-spoke VPN topology
  • D、Central-site VPN topology
  • E、Full mesh VPN topology
  • F、Remote-access VPN topology

正确答案:E

第5题:

A site administrator is configuring Resource-level access control.  Which of the following statements about Resource-level access control are true? Resource-level access control policies:()

  • A、are optional
  • B、are used to protect data beans
  • C、provide coarse-grained access control
  • D、never specify a relationship

正确答案:A,B

第6题:

Which two practices help secure the configuration utilities on wireless access points from unauthorized access? (Choose two.)()

  • A、assigning a private IP address to the AP
  • B、changing the default SSID value
  • C、configuring a new administrator password
  • D、changing the mixed mode setting to single mode
  • E、configuring traffic filtering

正确答案:B,C

第7题:

A network administrator is configuring ACLs on a cisco router, to allow affic from hosts on networks 192.168.146.0,192.168.147.0,192.168.148.0 and 192.168.149.0 only.Which two ACL statements when combined are the best for accomplishing the task?()

  • A、access-list 10 permit ip 192.168.147.0 0.0.0.255.255
  • B、access-list 10 permit ip 192.168.149.0 0.0.0.255.255
  • C、access-list 10 permit ip 192.168.146.0 0.0.0.0.255
  • D、access-list 10 permit ip 192.168.146.0 0.0.1.255
  • E、access-list 10 permit ip 192.168.148.0 0.0.1.255
  • F、access-list 10 permit ip 192.168.146.0 255.255.255.0

正确答案:D,E

第8题:

An administrator is configuring one server to monitor hardware level information on a second Windows server.Which of the following should be setup on the Windows server to allow the monitoring server to access this information?()

A. WMI

B. RIS

C. DNS

D. SNMP

E. SMTP


参考答案:A, D

第9题:

The Company security administrator wants to prevent VLAN hopping on the network.  What is one  method that can be used to do this?  ()

  • A、 Attacks are prevented by utilizing the port-security feature.
  • B、 An end station attempts to gain access to all VLANs by transmitting Ethernet frames in the  802.1q encapsulation.
  • C、 Configuring an interface with the switchport mode dynamic command will prevent VLAN  hopping.
  • D、 An end station attempts to redirect VLAN traffic by transmitting Ethernet frames in the 802.1q  encapsulation.
  • E、 Configuring an interface with the "switchport mode access" command will prevent VLAN  hopping.

正确答案:B,E

第10题:

An administrator is configuring one server to monitor hardware level information on a second Windows server.Which of the following should be setup on the Windows server to allow the monitoring server to access this information?()

  • A、WMI
  • B、RIS
  • C、DNS
  • D、SNMP
  • E、SMTP

正确答案:A,D

更多相关问题