网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
Which one of the access control list statements below will deny all telnet connections to subnet 10.10.1.0/24?()
- A、access-list 15 deny telnet any 10.10.1.0 0.0.0.255 eq 23
- B、access-list 115 deny udp any 10.10.1.0 eq telnet
- C、access-list 15 deny tcp 10.10.1.0 255.255.255.0 eq telnet
- D、access-list 115 deny tcp any 10.10.1.0 0.0.0.255 eq 23
- E、access-list 15 deny udp any 10.10.1.0 255.255.255.0 eq 23
参考答案
更多 “Which one of the access control list statements below will deny all telnet connections to subnet 10.10.1.0/24?()A、access-list 15 deny telnet any 10.10.1.0 0.0.0.255 eq 23B、access-list 115 deny udp any 10.10.1.0 eq telnetC、access-list 15 deny tcp 10.10.1.0 255.255.255.0 eq telnetD、access-list 115 deny tcp any 10.10.1.0 0.0.0.255 eq 23E、access-list 15 deny udp any 10.10.1.0 255.255.255.0 eq 23” 相关考题
考题
_______control system is one in which the control action is independent of the output.A.Feed backB.Negative feed backC.Close loopD.Open loop
考题
Which Junos Pulse Access Control Service client provides a built-in viewer to access local logs?()
A. Odyssey Access ClientB. Junos PulseC. Java agentD. Agent less access
考题
Which three types of policies must you configure to allow remote users transparent access to protected resources using IF-MAP Federation between a Junos Pulse Secure Access Service and a Junos Pulse Access Control Service?()A. Session-Export policies on the Junos Pulse Secure Access ServiceB. Session-Export policies on the Junos Pulse Access Control ServiceC. Session-Import policies on the Junos Pulse Secure Access ServiceD. Session-Import policies on the Junos Pulse Access Control ServiceE. Resource access policies on the Junos Pulse Access Control Service
考题
You are receiving reports of possible unauthorized access to resources protected by a firewall enforcer running the Junos OS. You want to verity which users are currently accessing resources through the enforcer.Which command should you use to verify user access on the enforcer?()A. show services unified-access-control authentication-tableB. show auth tableC. show services unified-access-control policiesD. show services unified-access-control captive-portal
考题
Which switching engine enables the access control list lookup to be committed to hardware? ()
A.IETFB.PFCC.ASICD.TCAM
考题
Which one of the following commands will display the placement and direction of an IP access control list on the interfaces of a router?()
A. show interface listB. show ip routeC. show ip interfaceD. show ip interface briefE. show interface
考题
You are securing a network for TestKing and want to apply an ACL (access control list) to an interface of a router. Which one of the following commands would you use?()
A. permit access-list 101 outB. ip access-group 101 outC. apply access-list 101 outD. access-class 101 outE. ip access-list e0 out
考题
Which one of the access control list statements below will deny all telnet connections to subnet 10.10.1.0/24?()
A. access-list 15 deny telnet any 10.10.1.0 0.0.0.255 eq 23B. access-list 115 deny udp any 10.10.1.0 eq telnetC. access-list 15 deny tcp 10.10.1.0 255.255.255.0 eq telnetD. access-list 115 deny tcp any 10.10.1.0 0.0.0.255 eq 23E. access-list 15 deny udp any 10.10.1.0 255.255.255.0 eq 23
考题
Which one of the following is NOT a valid RADIUS packet type?()A、 Access-rejectB、 Access-responseC、 Access-challengeD、 Access-replyE、 Access-accept
考题
You are securing a network for TestKing and want to apply an ACL (access control list) to an interface of a router. Which one of the following commands would you use?()A、permit access-list 101 outB、ip access-group 101 outC、apply access-list 101 outD、access-class 101 outE、ip access-list e0 out
考题
A site administrator is configuring Resource-level access control. Which of the following statements about Resource-level access control are true? Resource-level access control policies:()A、are optionalB、are used to protect data beansC、provide coarse-grained access controlD、never specify a relationship
考题
Which one of the following commands will display the placement and direction of an IP access control list on the interfaces of a router?()A、show interface listB、show ip routeC、show ip interfaceD、show ip interface briefE、show interface
考题
Which switching engine enables the access control list lookup to be committed to hardware? ()A、IETFB、PFCC、ASICD、TCAM
考题
A site administrator is configuring Command-level access control. Which of the following statements about Command-level access control are true? Command level access control policies: ()A、are mandatoryB、specify action group ExecuteCommandActionGroup for Controller commandsC、specify action group ViewCommandActionGroup for View commandsD、specify resource group ControllerCommandResourceGroup for Controller commandsE、specify resource group ViewCommandResourceGroup for View commands
考题
In a Junos Pulse Access Control Service firewall enforcement configuration, what is the purpose of the source IP policy?()A、to specify the destination addresses to which access is permittedB、to specify the source address permitted to access the resourceC、to specify the services to which access is permittedD、to inform the enforcer to expect policy information from the Junos Pulse Access Control Service
考题
单选题Which one of the following commands will display the placement and direction of an IP access control list on the interfaces of a router?()A
show interface listB
show ip routeC
show ip interfaceD
show ip interface briefE
show interface
考题
单选题ou need to configure fine-grained access control to external network resources from within your database. You create an access control list (ACL) using the DBMS_NETWORK_ACL_ADMIN package. Which statement is true regarding the ACL created?()A
It is a list of remote database links stored in the XML file that are available to the users of the database.B
It is a list of users and network privileges stored in the XML file according to which a group of users can connect to one or more hosts.C
It is a list of users and network privileges stored in the data dictionary according to which a group of users can connect to one or more hosts.D
It is the list of the host names or the IP addresses stored in the data dictionary that can connect to your database through PL/SQL network utility packages such as UTL_TCP.
考题
多选题Which three types of policies must you configure to allow remote users transparent access to protected resources using IF-MAP Federation between a Junos Pulse Secure Access Service and a Junos Pulse Access Control Service?()ASession-Export policies on the Junos Pulse Secure Access ServiceBSession-Export policies on the Junos Pulse Access Control ServiceCSession-Import policies on the Junos Pulse Secure Access ServiceDSession-Import policies on the Junos Pulse Access Control ServiceEResource access policies on the Junos Pulse Access Control Service
考题
多选题A site administrator is configuring Resource-level access control. Which of the following statements about Resource-level access control are true? Resource-level access control policies:()Aare optionalBare used to protect data beansCprovide coarse-grained access controlDnever specify a relationship
考题
多选题What are two use cases enabled by IF-MAP Federation?()AUsers authenticated to one Junos Pulse Access Control Service can transparently access resources protected by another Junos Pulse Access Control Service.BUsers authenticated to a Junos Pulse Access Control Service can transparently access resources protected by a Junos Pulse Secure Access Service.CRemote access users authenticated to a Junos Pulse Secure Access Service can transparently access resources protected by a Junos Pulse Access Control Service.DRemote access users authenticated to one Junos Pulse Secure Access Service can transparently access resources protected by another Junos Pulse Secure Access Service.
考题
单选题You are receiving reports of possible unauthorized access to resources protected by a firewall enforcer running the Junos OS. You want to verity which users are currently accessing resources through the enforcer.Which command should you use to verify user access on the enforcer?()A
show services unified-access-control authentication-tableB
show auth tableC
show services unified-access-control policiesD
show services unified-access-control captive-portal
考题
单选题In a Junos Pulse Access Control Service firewall enforcement configuration, what is the purpose of the source IP policy?()A
to specify the destination addresses to which access is permittedB
to specify the source address permitted to access the resourceC
to specify the services to which access is permittedD
to inform the enforcer to expect policy information from the Junos Pulse Access Control Service
考题
单选题You are a technician at TestKing. Your assistant applied an IP access control list to Router TK1. You want to check the placement and direction of the access control list.Which command should you use?()A
show access-listB
show ip access-listC
show ip interfaceD
show interfaceE
show interface list
考题
单选题Which one of the following is NOT a valid RADIUS packet type?()A
Access-rejectB
Access-responseC
Access-challengeD
Access-replyE
Access-accept
考题
单选题Which Junos Pulse Access Control Service client provides a built-in viewer to access local logs?()A
Odyssey Access ClientB
Junos PulseC
Java agentD
Agent less access
考题
单选题() control system is one in which the control action is independent of the output.A
Feed backB
Negative feed backC
Close loopD
Open loop
考题
单选题You are securing a network for TestKing and want to apply an ACL (access control list) to an interface of a router. Which one of the following commands would you use?()A
permit access-list 101 outB
ip access-group 101 outC
apply access-list 101 outD
access-class 101 outE
ip access-list e0 out
热门标签
最新试卷