are mandatory
specify action group ExecuteCommandActionGroup for Controller commands
specify action group ViewCommandActionGroup for View commands
specify resource group ControllerCommandResourceGroup for Controller commands
specify resource group ViewCommandResourceGroup for View commands
第1题:
A.UDT
B.Trigger
C.Package
D.Access plan
第2题:
As a network administrator, you have been instructed to prevent all traffic originating on the LAN from entering the R2 router. Which the following command would implement the access list on the interface of the R2 router?()
A.access-list 101 in
B.access-list 101 out
C.ip access-group 101 in
D.ip access-group 101 out
第3题:
A. Hostname
B. fully qualified domain name
C. IP address
D. address book entry
第4题:
A user cannot access files on /deps/it directory, the administrator verifies permissions are set rw-------for the directory. Which of the following actions need to be performed to only grant read access to the user on the IT directory?()
第5题:
You are securing a network for TestKing and want to apply an ACL (access control list) to an interface of a router. Which one of the following commands would you use?()
第6题:
You‘re the systems administrator at Testing, and you create the following access control lists.You then enter the command "ip access-group 101 in" to apply access control list 101 to router TK1s e0 interface.Which of the following Telnet sessions will be blocked as a result of your access lists?()
A. Telnet sessions from host A to host 5.1.1.10
B. Telnet sessions from host A to host 5.1.3.10
C. Telnet sessions from host B to host 5.1.2.10
D. Telnet sessions from host B to host 5.1.3.8
E. Telnet sessions from host C to host 5.1.3.10
F. Telnet sessions from host F to host 5.1.1.10
第7题:
Which of the following objects contains control structures that are considered the bound form of SQL statements?()
第8题:
Which three types of policies must you configure to allow remote users transparent access to protected resources using IF-MAP Federation between a Junos Pulse Secure Access Service and a Junos Pulse Access Control Service?()
A. Session-Export policies on the Junos Pulse Secure Access Service
B. Session-Export policies on the Junos Pulse Access Control Service
C. Session-Import policies on the Junos Pulse Secure Access Service
D. Session-Import policies on the Junos Pulse Access Control Service
E. Resource access policies on the Junos Pulse Access Control Service
第9题:
Which of the following answer choices are correct characteristics of named access list?()
第10题:
A site administrator is configuring Resource-level access control. Which of the following statements about Resource-level access control are true? Resource-level access control policies:()