网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which security mechanism is employed only on the server-side to limit access to resources or components?()
A
authorization
B
data integrity
C
confidentiality
D
authentication
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which security mechanism is employed only on the server-side to limit access to resources or components?()A authorizationB data integrityC confidentialityD authentication” 相关考题
考题
Firewall is a (74) mechanism used by organizations to protect their LANs from the Internet.(74)A. reliableB. stableC. peacefulD. security
考题
When adding a new user and assigning a role, which user role has "read only" rights to theconfiguration and operational states? ()
A.userB.read_onlyC.target_operatorD.security_operator
考题
Firewall is a(74) mechanism used by organizations to protect their LANs from the Internet.A.reliableB.stableC.peacefulD.security
考题
Which of the following is true about Outbound Malware Scanning?() A、 It has its own policy table.B、 It is configured as part of Access Policies.C、 It is configured as part ofIronPort data Security.D、 It only has global configuration.
考题
Which two statements about queuing mechanisms are true? ()A、FIFO queuing is only appropriate for slower serial interfacesB、weighted fair queuing is the default queuing mechanism used for all but slower than E1 rate interfacesC、only one queuing mechanism type can be applied to an interfaceD、weighted fair queuing does not require the configuration of access lists to classify traffic E、flow-based weighted fair queuing provides for queues to be serviced in a round-robin fashion
考题
The PIX Security Appliance feature set is a subset of the ASA Security Appliance feature set. Which two of these features are only supported by an ASA Security Appliance? (Choose two.)()A、 security contextsB、- transparent firewallC、 WebVPND、 Active/Active failoverE、 low latency queuingF、 AIP-SSM intrusion prevention
考题
Which of these statements accurately identifies how Unicast Reverse Path Forwarding can be employed to prevent the use of malformed or forged IP sources addresses?()A、It is applied only on the input interface of a router.B、It is applied only on the output interface of a router.C、It can be configured either on the input or output interface of a router.D、It cannot be configured on a router interface.E、It is configured under any routing protocol process.
考题
Which of the following is true when considering the Server load-balancing design within the E-Commerce Module of the Enterprise Campus network?()A、 Routed mode requires the ACE run OSPF or EIGRPB、 Bridged mode switches a packet between the public and the private subnets when it sees itsMAC address as the destinationC、 Two-armed mode will place the SLB inline to the servers, with different client-side and a server-side VLANsD、 One-armed mode, which uses the same VLAN for the client, the ACE, and the servers, requiresa traffic-diversion mechanism to ensure the traffic return from the server passes though the ACE
考题
Which statement is true about the components of a queuing mechanism?()A、Each subinterface has its own hardware queue and can experience congestion just like its main interfaceB、Hardware queuing is only used if the software queues are experiencing congestion.C、Hardware queues and software queues are not used concurrently.D、The hardware queuing system always uses the FIFO queuing mechanism.
考题
Which two statements about the Wired Equivalent Privacy (WEP) encryption mechanism are true? ()A、the two methods of authentication using the WEP encryption are open and shared keyB、the 802.11 standard defines WEP security using 128-bit keysC、WEP can provide stronger authentication through the use of LEAP, PEAP, or EAP-FASTD、WEP is a scalable encryption solution that uses static keys for authenticationE、WEP security provides only one-way authenticationF、WEPv2 offers improved encryption by replacing the RC4 encryption mechanism with the AES (symmetric block cipher) mechanism
考题
Which security mechanism is employed only on the server-side to limit access to resources or components?()A、 authorizationB、 data integrityC、 confidentialityD、 authentication
考题
When adding a new user and assigning a role, which user role has "read only" rights to theconfiguration and operational states? ()A、userB、read_onlyC、target_operatorD、security_operator
考题
You are employed as a DBA in an organization. You are informed that the record of EMP_NO 1000 is missing from the SCOTT.EMP table. You are required to identify the user who deleted the record, the SQL statement that will undo the deletion, and the transaction ID of the transaction that deleted the employee record. Which feature will you use to perform the tasks?()A、 Only the Flashback TableB、 Both the Flashback Transaction Query and the Flashback Version QueryC、 Only the Flashback DropD、 Only the Flashback Version
考题
Which two actions can be configured to allow traffic to traverse an interface when zone-based security isbeing employed?()A、PassB、FlowC、AllowD、Inspect
考题
You need to configure port security on switch R1. Which two statements are true about this technology? ()A、 Port security can be configured for ports supporting VoIP.B、 With port security configured, four MAC addresses are allowed by default.C、 The network administrator must manually enter the MAC address for each device in order for the switch to allow connectivity.D、Withsecurity configured, only one MAC addresses is allowed by default. E、 Port security cannot be configured for ports supporting VoIP.
考题
An administrator needs to update the anti-virus, security patches, BIOS, and the web server software on a production system. Which of the following is the BEST method to accomplish this?()A、Update anti-virus, security patches, BIOS software, and then the web software.B、Update the web software, security patches, anti-virus, and then the BIOS.C、Update security patches, BIOS, web software, and then the anti-virus.D、The order does not matter, only one change at a time should be done.
考题
Which security mechanism can be directed through the element in a web deployment descriptor()?A、 authorizationB、 data integrityC、 confidentialityD、 authentication
考题
You need to design a security strategy for the DHCP servers in the Seattle office. Which two actions should you perform?()A、Disable all unnecessary services on each DHCP serverB、Modify the discretionary access control lists (DACLs) in Active Directory so that only members of the Enterprise Admins security group can authorize additional DHCP serversC、Use an IPSec policy that allows only the packets necessary for DHCP and domain membership for each DHCP serverD、Install a digital certificate for SSL on each DHCP server
考题
单选题Which the security mechanism uses the concept of a realm?()A
authorizationB
data integrityC
confidentialityD
authentication
考题
单选题You are employed as a DBA in an organization. You are informed that the record of EMP_NO 1000 is missing from the SCOTT.EMP table. You are required to identify the user who deleted the record, the SQL statement that will undo the deletion, and the transaction ID of the transaction that deleted the employee record. Which feature will you use to perform the tasks?()A
Only the Flashback TableB
Both the Flashback Transaction Query and the Flashback Version QueryC
Only the Flashback DropD
Only the Flashback Version
考题
单选题Which statement is true about the components of a queuing mechanism?()A
Each subinterface has its own hardware queue and can experience congestion just like its main interfaceB
Hardware queuing is only used if the software queues are experiencing congestion.C
Hardware queues and software queues are not used concurrently.D
The hardware queuing system always uses the FIFO queuing mechanism.
考题
单选题Which of the following is true when considering the Server load-balancing design within the E-Commerce Module of the Enterprise Campus network?()A
Routed mode requires the ACE run OSPF or EIGRPB
Bridged mode switches a packet between the public and the private subnets when it sees itsMAC address as the destinationC
Two-armed mode will place the SLB inline to the servers, with different client-side and a server-side VLANsD
One-armed mode, which uses the same VLAN for the client, the ACE, and the servers, requiresa traffic-diversion mechanism to ensure the traffic return from the server passes though the ACE
考题
多选题The PIX Security Appliance feature set is a subset of the ASA Security Appliance feature set. Which two of these features are only supported by an ASA Security Appliance? (Choose two.)()Asecurity contextsB- transparent firewallCWebVPNDActive/Active failoverElow latency queuingFAIP-SSM intrusion prevention
考题
多选题Which two statements about queuing mechanisms are true? ()AFIFO queuing is only appropriate for slower serial interfacesBweighted fair queuing is the default queuing mechanism used for all but slower than E1 rate interfacesConly one queuing mechanism type can be applied to an interfaceDweighted fair queuing does not require the configuration of access lists to classify trafficEflow-based weighted fair queuing provides for queues to be serviced in a round-robin fashion
考题
单选题Which security mechanism can be directed through the element in a web deployment descriptor()?A
authorizationB
data integrityC
confidentialityD
authentication
考题
单选题Which security mechanism uses the concept of a realm?()A
AuthorizationB
Data integrityC
ConfidentialityD
Authentication
考题
单选题Which of these statements accurately identifies how Unicast Reverse Path Forwarding can be employed to prevent the use of malformed or forged IP sources addresses?()A
It is applied only on the input interface of a router.B
It is applied only on the output interface of a router.C
It can be configured either on the input or output interface of a router.D
It cannot be configured on a router interface.E
It is configured under any routing protocol process.
热门标签
最新试卷