IBM(000-215)

多选题A site administrator is configuring Command-level access control. Which of the following statements about Command-level access control are true? Command level access control policies: ()Aare mandatoryBspecify action group ExecuteCommandActionGroup for 

题目
多选题
A site administrator is configuring Command-level access control. Which of the following statements about Command-level access control are true? Command level access control policies: ()
A

are mandatory

B

specify action group ExecuteCommandActionGroup for Controller commands

C

specify action group ViewCommandActionGroup for View commands

D

specify resource group ControllerCommandResourceGroup for Controller commands

E

specify resource group ViewCommandResourceGroup for View commands

如果没有搜索结果,请直接 联系老师 获取答案。
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which of the following objects contains control structures that are considered the bound form of SQL statements?()

A.UDT

B.Trigger

C.Package

D.Access plan


参考答案:C

第2题:

As a network administrator, you have been instructed to prevent all traffic originating on the LAN from entering the R2 router. Which the following command would implement the access list on the interface of the R2 router?()

A.access-list 101 in

B.access-list 101 out

C.ip access-group 101 in

D.ip access-group 101 out


参考答案:C

第3题:

When configuring resource access policies in a Junos Pulse Access Control Service device, which entry is permitted when defining the specific resources?()

A. Hostname

B. fully qualified domain name

C. IP address

D. address book entry


参考答案:C

第4题:

A user cannot access files on /deps/it directory, the administrator verifies permissions are set rw-------for the directory.  Which of the following actions need to be performed to only grant read access to the user on the IT directory?()

  • A、 Set folder permissions to 760.
  • B、 Set folder permissions to 770.
  • C、 Set folder permissions to modify.
  • D、 Set folder permissions to full control.

正确答案:A

第5题:

You are securing a network for TestKing and want to apply an ACL (access control list) to an interface of a router. Which one of the following commands would you use?()

  • A、permit access-list 101 out
  • B、ip access-group 101 out
  • C、apply access-list 101 out
  • D、access-class 101 out
  • E、ip access-list e0 out

正确答案:B

第6题:

You‘re the systems administrator at Testing, and you create the following access control lists.You then enter the command "ip access-group 101 in" to apply access control list 101 to router TK1s e0 interface.Which of the following Telnet sessions will be blocked as a result of your access lists?()

A. Telnet sessions from host A to host 5.1.1.10

B. Telnet sessions from host A to host 5.1.3.10

C. Telnet sessions from host B to host 5.1.2.10

D. Telnet sessions from host B to host 5.1.3.8

E. Telnet sessions from host C to host 5.1.3.10

F. Telnet sessions from host F to host 5.1.1.10


参考答案:D, F

第7题:

Which of the following objects contains control structures that are considered the bound form of SQL statements?()

  • A、UDT
  • B、Trigger
  • C、Package
  • D、Access plan

正确答案:C

第8题:

Which three types of policies must you configure to allow remote users transparent access to protected resources using IF-MAP Federation between a Junos Pulse Secure Access Service and a Junos Pulse Access Control Service?()

A. Session-Export policies on the Junos Pulse Secure Access Service

B. Session-Export policies on the Junos Pulse Access Control Service

C. Session-Import policies on the Junos Pulse Secure Access Service

D. Session-Import policies on the Junos Pulse Access Control Service

E. Resource access policies on the Junos Pulse Access Control Service


参考答案:A, D, E

第9题:

Which of the following answer choices are correct characteristics of named access list?()

  • A、You can delete individual statements in a named access list
  • B、Named access lists require a numbered range from 1000 to 1099.
  • C、Named access lists must be specified as standard or extended.
  • D、You can use the ip access-list command to create named access lists.
  • E、You cannot delete individual statements in a named access list.
  • F、You can use the ip name-group command to apply named access lists.

正确答案:A,C,D

第10题:

A site administrator is configuring Resource-level access control.  Which of the following statements about Resource-level access control are true? Resource-level access control policies:()

  • A、are optional
  • B、are used to protect data beans
  • C、provide coarse-grained access control
  • D、never specify a relationship

正确答案:A,B

更多相关问题