CMS专题

多选题A site administrator is configuring Resource-level access control.  Which of the following statements about Resource-level access control are true? Resource-level access control policies:()Aare optionalBare used to protect data beansCprovide coarse-gra

题目
多选题
A site administrator is configuring Resource-level access control.  Which of the following statements about Resource-level access control are true? Resource-level access control policies:()
A

are optional

B

are used to protect data beans

C

provide coarse-grained access control

D

never specify a relationship

如果没有搜索结果,请直接 联系老师 获取答案。
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which two practices help secure the configuration utilities on wireless access points from unauthorized access? (Choose two.)()

  • A、assigning a private IP address to the AP
  • B、changing the default SSID value
  • C、configuring a new administrator password
  • D、changing the mixed mode setting to single mode
  • E、configuring traffic filtering

正确答案:B,C

第2题:

A network administrator is configuring ACLs on a cisco router, to allow affic from hosts on networks 192.168.146.0,192.168.147.0,192.168.148.0 and 192.168.149.0 only.Which two ACL statements when combined are the best for accomplishing the task?()

  • A、access-list 10 permit ip 192.168.147.0 0.0.0.255.255
  • B、access-list 10 permit ip 192.168.149.0 0.0.0.255.255
  • C、access-list 10 permit ip 192.168.146.0 0.0.0.0.255
  • D、access-list 10 permit ip 192.168.146.0 0.0.1.255
  • E、access-list 10 permit ip 192.168.148.0 0.0.1.255
  • F、access-list 10 permit ip 192.168.146.0 255.255.255.0

正确答案:D,E

第3题:

An administrator is configuring one server to monitor hardware level information on a second Windows server.Which of the following should be setup on the Windows server to allow the monitoring server to access this information?()

A. WMI

B. RIS

C. DNS

D. SNMP

E. SMTP


参考答案:A, D

第4题:

An administrator is configuring one server to monitor hardware level information on a second Windows server.Which of the following should be setup on the Windows server to allow the monitoring server to access this information?()

  • A、WMI
  • B、RIS
  • C、DNS
  • D、SNMP
  • E、SMTP

正确答案:A,D

第5题:

The Company security administrator wants to prevent VLAN hopping on the network.  What is one  method that can be used to do this?  ()

  • A、 Attacks are prevented by utilizing the port-security feature.
  • B、 An end station attempts to gain access to all VLANs by transmitting Ethernet frames in the  802.1q encapsulation.
  • C、 Configuring an interface with the switchport mode dynamic command will prevent VLAN  hopping.
  • D、 An end station attempts to redirect VLAN traffic by transmitting Ethernet frames in the 802.1q  encapsulation.
  • E、 Configuring an interface with the "switchport mode access" command will prevent VLAN  hopping.

正确答案:B,E

第6题:

What is the key objective of the plan phase?()

  • A、Identify the activities involved in installing and configuring equipment at a customer’s site or sites
  • B、Describe the day-to-day activities required to support, manage, and monitor a newly implemented system
  • C、Access current network readiness, site readiness, and operational readiness in preparation for designing a solution proposal
  • D、Gain an understanding of high-level business and technical requirements

正确答案:C

第7题:

A site administrator is configuring Resource-level access control.  Which of the following statements about Resource-level access control are true? Resource-level access control policies:()

  • A、are optional
  • B、are used to protect data beans
  • C、provide coarse-grained access control
  • D、never specify a relationship

正确答案:A,B

第8题:

A network administrator is configuring ACLs on a cisco router, to allow affic from hosts on networks 192.168.146.0,192.168.147.0,192.168.148.0 and 192.168.149.0 only.Which two ACL statements when combined are the best for accomplishing the task?()

A.access-list 10 permit ip 192.168.147.0 0.0.0.255.255

B.access-list 10 permit ip 192.168.149.0 0.0.0.255.255

C.access-list 10 permit ip 192.168.146.0 0.0.0.0.255

D.access-list 10 permit ip 192.168.146.0 0.0.1.255

E.access-list 10 permit ip 192.168.148.0 0.0.1.255

F.access-list 10 permit ip 192.168.146.0 255.255.255.0


参考答案:D, E

第9题:

Which of the following topology situations would be a qood candidate for configuring DMVPN()

  • A、Extranet VPN
  • B、Managed overlay VPN topology
  • C、Hub-and-spoke VPN topology
  • D、Central-site VPN topology
  • E、Full mesh VPN topology
  • F、Remote-access VPN topology

正确答案:E

第10题:

An administrator has just installed a web server for the companys Internet site. After bringing the system online, customers notify the administrator that they cannot connect to the server. The administrator tests the web server from a workstation and can access the website. The customers continue to report issues.  Which of the following is the MOST likely reason for this?()

  • A、 The servers firewall is misconfigured.
  • B、 The server’s timeout feature is set incorrectly.
  • C、 The web server was not installed properly.
  • D、 The company firewall is misconfigured.

正确答案:D

更多相关问题