网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

For security reasons, an administrator is asked to modify the system to prevent someone from leaving a terminal logged in. To enable a five minute timeout for all users, what would need to be done to accomplish this task?()

  • A、Add the following line to /etc/environment:  TMOUT=300
  • B、Add the following lines to /.profile  TMOUT=5  export TMOUT
  • C、Execute the following command:  chuser -u ALL -a TIMEOUT=5M
  • D、Execute the following command:  chsec -u ALL -a TIMEOUT=600

参考答案

更多 “For security reasons, an administrator is asked to modify the system to prevent someone from leaving a terminal logged in. To enable a five minute timeout for all users, what would need to be done to accomplish this task?()A、Add the following line to /etc/environment:  TMOUT=300B、Add the following lines to /.profile  TMOUT=5  export TMOUTC、Execute the following command:  chuser -u ALL -a TIMEOUT=5MD、Execute the following command:  chsec -u ALL -a TIMEOUT=600” 相关考题
考题 China Calls for Unified International Rules Against Internet CrimeCyber security has always been a serious issue as the Internet industry is ever growing. Nowadays, people can easily connect to the Internet with a simple click of a mouse. But the global network can be easily destroyed by a single leak. The world is facing a difficult situation in keeping web security.Currently, there are no unified international rules for maintaining Internet security. China has called for unified international rules against Internet crime. Last year China and some other countries handed in a draft Code of Conduct on Information Security to the UN.World leaders and experts discussed the possible Internet threats facing the world. They agreed that the only way to deal with Internet security threats was to trust each other and strengthen cooperation. The threats cannot be solved by any one country alone. And for these reasons, countries would have a greater chance of trusting each other in dealing with such threats.Though great efforts were made to issue common regulations for the Internet, few results have been achieved yet. Theres still a long way to go for unified global Internet security rules and regulations.26. Maintaining web security is () for the world.A. easyB. a piece of cakeC. difficult27. There are () to maintain cyberspace security.A. no unified international regulationsB. unified international regulationsC. worldwide unified regulations28. The only way to deal with cyber security threats was to()A. depend on China and the United NationsB. strengthen international cooperation and trust each otherC. ask world leaders and experts for help29.().results have been achieved in terms of common regulations for the Internet.A. A lot ofB. FewC. Good30.()summited a draft Code of Conduct on Information Security.A. China onlyB. The United StatesC. China and some other countries

考题 _______means the level for which appropriate additional protective security measures shall be maintained for a period of time as a result of heightened risk of a security incident.A.Security level 1B.Security level 2C.Security level 3D.Security level 4

考题 Click the Exhibit button.What are two valid reasons for the output shown in the exhibit?() (Choose two.) A. The local Web-filtering daemon is not enabled or is not running.B. The integrated Web-filtering policy server is not reachable.C. No DNS is configured on the SRX Series device.D. No security policy is configured to use Web filtering.

考题 For security reasons a network technician wants to install a Linux based email server, Microsoftweb services, and directory services on different servers.Which of the following technologies would be BEST to reduce hard ware costs?()A. VPN concentratorB. Virtual serversC. WirelessD. Multimode fiber

考题 ASystempadministratorneedstosetthedefaultpasswordlengthforalluserstosixcharacters.Whichofthefollowingfilesneedstobeeditedtoaccomplishthis() A./etc/security/limitsB./etc/security/mkuser.sysC./etc/security/privD./etc/security/user

考题 An operator is asked to shutdown the telnet service for security reasons. What are the appropriate commands to achieve this?() A. comment out telnetd in /etc/services refresh -s inetdB. comment out telnetd in /etc/inetd.conf refresh -s inetdC. comment out telnetd in /etc/rc.tcpip refresh -s telnetdD. comment out telnetd in /etc/inetd.conf refresh -s telnetd

考题 There are many reasons why customers lack sufficient security measures on the network. Which two reasons for insufficient security are typical of the customers today?() A.the use of hosted email services eliminating the need for local securityB.the perceived costs of security solutionsC.the lack of risk analysisD.the lack of threats to their networkE.the belief that free security tools are sufficientF.the desire to avoid unnecessary technologies

考题 For security reasons, the network administrator needs to prevent pings into the corporate networks from hosts outside the internetwork. Which protocol should be blocked with access control lists()。 A.IPB.ICMPC.TCPD.UDP

考题 Which Cisco security tool can best determine it a Cisco ISR router is properly secured? ()A、 Cisco SDM Security AuditB、 Cisco Security MARSC、 Cisco Security Agent MCD、 Cisco Security IntelliShieldE、 CAN

考题 What are two reasons that a network administrator would use access lists (Choose two.)()。A、to control vty access into a routerB、to control broadcast traffic through a routerC、to filter traffic as it passes through a routerD、to filter traffic that originates from the routerE、to replace passwords as a line of defense against security incursions

考题 What are two reasons that a network administrator would use access lists? (Choose two.) ()。A、to control vty access into a router  B、to control broadcast traffic through a router  C、to filter traffic as it passes through a router  D、to filter traffic that originates from the router  E、to replace passwords as a line of defense against security incursions 

考题 What are three valid reasons to assign ports to VLANs on a switch? ()A、to make VTP easier to implementB、to isolate broadcast trafficC、to increase the size of the collision domainD、to allow more devices to connect to the networkE、to logically group hosts according to functionF、to increase network security

考题 There are many reasons why customers lack sufficient security measures on the network. Which two reasons for insufficient security are typical of the customers today?()A、the use of hosted email services eliminating the need for local securityB、the perceived costs of security solutionsC、the lack of risk analysisD、the lack of threats to their networkE、the belief that free security tools are sufficientF、the desire to avoid unnecessary technologies

考题 For security reasons a network technician wants to install a Linux based email server, Microsoft web services, and directory services on different servers. Which of the following technologies would be BEST to reduce hard ware costs?()A、VPN concentratorB、Virtual serversC、WirelessD、Multimode fiber

考题 An administrator needs to configure a server to restrict mail traffic to an application server for security reasons.  Which of the following techniques can be used to manage this?()A、 PATB、 ACLsC、 Subnet maskingD、 Port blocking

考题 An operator is asked to shutdown the telnet service for security reasons. What are the appropriate commands to achieve this?()A、comment out telnetd in /etc/services refresh -s inetdB、comment out telnetd in /etc/inetd.conf refresh -s inetdC、comment out telnetd in /etc/rc.tcpip refresh -s telnetdD、comment out telnetd in /etc/inetd.conf refresh -s telnetd

考题 For security reasons, an administrator is asked to modify the system to prevent someone from  leaving a terminal logged in.  Which of the following options would enable a five minute timeout for all users()A、Add the following line to /etc/environment: TMOUT=300B、Add the following lines to /.profile TMOUT=5 export TMOUTC、Run the following command: chuser -u ALL -a TIMEOUT=5MD、Run the following command: chsec -u ALL -a TIMEOUT=600

考题 单选题()means the person on board the ship, accountable to the master, designated by the Company as responsible for the security of the ship, including implementation and maintenance of the ship security plan and for liaison with the company security officer and port facility security officers.A Ship security officerB Company security officerC Port facility security officerD PSC officer

考题 单选题An administrator needs to configure a server to restrict mail traffic to an application server for security reasons.  Which of the following techniques can be used to manage this?()A  PATB  ACLsC  Subnet maskingD  Port blocking

考题 单选题()means the person designated as responsible for the development, implementation, revision and maintenance of the port facility security plan and for liaison with the ship security officers and company security officers.A Ship security officerB Company security officerC Port facility security officerD PSC officer

考题 单选题() means the person designated by the Company for ensuring that a ship security assessment is carried out; that a ship security plan is developed, submitted for approval, and thereafter implemented and maintained and for liaison with port facility security officers and the ship security officer.A Ship security officerB Company security officerC Port facility security officerD PSC officer

考题 单选题The ship security assessment is an essential and integral part of the process of developing and updating()A the ship security planB the company security planC the port security planD the national security plan

考题 多选题What are three valid reasons to assign ports to VLANs on a switch?()Ato make VTP easier to implementBto isolate broadcast trafficCto increase the size of the collision domainDto allow more devices to connect to the networkEto logically group hosts according to functionFto increase network security

考题 单选题For security reasons, the network administrator needs to prevent pings into the corporate networks from hosts outside the internetwork. Which protocol should be blocked with access control lists?()A IPB ICMPC TCPD UDP

考题 单选题Which operational mode command displays all active IPsec phase 2 security associations?()A show ike security-associationsB show ipsec security-associationsC show security ike security-associationsD show security ipsec security-associations

考题 多选题There are many reasons why customers lack sufficient security measures on the network. Which two reasons for insufficient security are typical of the customers today?()Athe desire to avoid unnecessary technologiesBthe belief that free security tools are sufficientCthe perceived costs of security solutionsDthe use of hosted email services eliminating the need for local securityEthe lack of threats to their networkFthe lack of risk analysis

考题 单选题What does SSO stand for regarding ship security?()A Ship security officeB Ship security officerC Ship security operatorD Ship safety office