网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Prior to applying SCREEN options to drop traffic, you want to determine how your configuration will affect traffic. Which mechanism would you configure to achieve this objective?()
A

the log option for the particular SCREEN option

B

the permit option for the particular SCREEN option

C

the SCREEN option, because it does not drop traffic by default

D

the alarm-without-drop option for the particular SCREEN option


参考答案

参考解析
解析: 暂无解析
更多 “单选题Prior to applying SCREEN options to drop traffic, you want to determine how your configuration will affect traffic. Which mechanism would you configure to achieve this objective?()A the log option for the particular SCREEN optionB the permit option for the particular SCREEN optionC the SCREEN option, because it does not drop traffic by defaultD the alarm-without-drop option for the particular SCREEN option” 相关考题
考题 You want to test a configured screen value prior to deploying.Which statement will allow you to accomplish this?() A. [edit security screen] user@host# show ids-option untrust-screen { alarm-test-only; }B. [edit security screen] user@host# show ids-option untrust-screen { alarm-without-drop; }C. [edit security screen] user@host# show ids-option untrust-screen { alarm-no-drop; }D. [edit security screen] user@host# show ids-option untrust-screen { test-without-drop; }

考题 Which two statements about the use of SCREEN options are correct? ()(Choose two.) A. SCREEN options offer protection against various attacksB. SCREEN options are deployed prior to route and policy processing in first path packet processingC. SCREEN options are deployed at the ingress and egress sides of a packet flowD. SCREEN options, you must take special care to protect OSPF

考题 You are configuring captive portal on your SRX Series device for guest user access.When would you use the redirect-traffic all command?() A. When you want all unauthenticated traffic to be redirectedB. When you want all clear text traffic to be redirected.C. When you want all authenticated traffic to be redirected.D. When you want all encrypted traffic to be redirected.

考题 Which three advanced permit actions within security policies are valid?() (Choose three.) A. Mark permitted traffic for firewall user authentication.B. Mark permitted traffic for SCREEN options.C. Associate permitted traffic with an IPsec tunnel.D. Associate permitted traffic with a NAT rule.E. Mark permitted traffic for IDP processing.

考题 You want to test a configured screen value prior to deploying.Which statement will allow you to accomplish this?()A、[edit security screen] user@host# show ids-option untrust-screen { alarm-test-only; }B、[edit security screen] user@host# show ids-option untrust-screen { alarm-without-drop; }C、[edit security screen] user@host# show ids-option untrust-screen { alarm-no-drop; }D、[edit security screen] user@host# show ids-option untrust-screen { test-without-drop; }

考题 When should traffic shaping be implemented on Frame Relay PVCs?()A、When you want to drop excess traffic above the CIRB、When there is a speed mismatch between the central site and the remote siteC、When using Frame Relay SVCsD、When over-subscribing the central site linkE、When LLQ is implemented on the Frame Relay PVCF、When Multilink PPP LFI is implemented on the Frame Relay PVC

考题 Which two statements are true regarding trace options on Junos devices?()A、You can see the contents of the log file by entering the show log filename commandB、Trace options will send information to your screen automaticallyC、Trace options are limited to one protocol at a timeD、The file name and set of flags may be specified when enabling trace options

考题 Which two statements about the use of SCREEN options are correct? ()(Choose two.)A、SCREEN options offer protection against various attacksB、SCREEN options are deployed prior to route and policy processing in first path packet processingC、SCREEN options are deployed at the ingress and egress sides of a packet flowD、SCREEN options, you must take special care to protect OSPF

考题 Which two statements about the use of SCREEN options are correct?()A、SCREEN options are deployed at the ingress and egress sides of a packet flow.B、Although SCREEN options are very useful, their use can result in more session creation.C、SCREEN options offer protection against various attacks at the ingress zone of a packet flow.D、SCREEN options examine traffic prior to policy processing, thereby resulting in fewer resouces used formalicious packet processing.

考题 Which three advanced permit actions within security policies are valid?()A、Mark permitted traffic for firewall user authentication.B、Mark permitted traffic for SCREEN options.C、Associate permitted traffic with an IPsec tunnel.D、Associate permitted traffic with a NAT rule.E、Mark permitted traffic for IDP processing.

考题 Prior to applying SCREEN options to drop traffic, you want to determine how your configuration will affect traffic. Which mechanism would you configure to achieve this objective?()A、the log option for the particular SCREEN optionB、the permit option for the particular SCREEN optionC、the SCREEN option, because it does not drop traffic by defaultD、the alarm-without-drop option for the particular SCREEN option

考题 If you want to test if fragmentation is causing problems on the network, which two ping command options are useful?()A、ttlB、sizeC、rapidD、do-not-fragment

考题 You are using the DBVERIFY utility to check the datafiles for any block corruption. You want to write the output of the dbv command to a file not to the screen.  Which parameter of the DBVERIFY utility will you use?()A、 FILEB、 PARFILEC、 LOGFILED、 FEEDBACK

考题 You install Windows 2000 Professional on a new APM-compliant portable computer. You notice that whenever you attempt to shut down the computer, the Windows 2000 shutdown screen remains on the screen as the power remains on. You attempt to shut off the computer by using Power Button, but you want the computer to shut off when Windows 2000 Professional shuts down. What should you do? ()A、Restart the computer, disable APM in the system BIOS, and then restart the computer. B、Restart the computer, use power options in control panel to enable APM, and restart the  computer. C、Restart the computer, use power options in control panel to enable hibernate support, and  then restart the computer. D、Restart the computer, use power options in control panel to create a different power scheme,  and then restart the computer. 

考题 多选题Which three advanced permit actions within security policies are valid?()AMark permitted traffic for firewall user authentication.BMark permitted traffic for SCREEN options.CAssociate permitted traffic with an IPsec tunnel.DAssociate permitted traffic with a NAT rule.EMark permitted traffic for IDP processing.

考题 多选题Which three advanced permit actions within security policies are valid?() (Choose three.)AMark permitted traffic for firewall user authentication.BMark permitted traffic for SCREEN options.CAssociate permitted traffic with an IPsec tunnel.DAssociate permitted traffic with a NAT rule.EMark permitted traffic for IDP processing.

考题 单选题You are configuring captive portal on your SRX Series device for guest user access.When would you use the redirect-traffic all command?()A When you want all unauthenticated traffic to be redirectedB When you want all clear text traffic to be redirected.C When you want all authenticated traffic to be redirected.D When you want all encrypted traffic to be redirected.

考题 多选题When should traffic shaping be implemented on Frame Relay PVCs?()AWhen you want to drop excess traffic above the CIRBWhen there is a speed mismatch between the central site and the remote siteCWhen using Frame Relay SVCsDWhen over-subscribing the central site linkEWhen LLQ is implemented on the Frame Relay PVCFWhen Multilink PPP LFI is implemented on the Frame Relay PVC

考题 单选题You have a computer that runs Windows 7. You generate a System Diagnostic Report and receive thefollowing warning message: The Graphics rating for the system is poor and may be the cause of performance problems. You need to increase the graphics performance of the computer without modifyingthe current hardware or drivers.  What should you do?()A From Personalization, modify the screen saver.B From Indexing Options, modify the Advanced options.C From Performance Options, modify the visual effects.D From Performance Options, modify the processor scheduling.

考题 单选题You want to drop the TBS1 tablespace from your database.  You also want to delete the corresponding data files automatically, and not have to do it manually.  What should you do?()A Use the DROP DATAFILE command.B Use the DROP TABLESPACE command.C Ensure that all database files are Oracle Managed Files before using the DROP TABLESPACE command.D Ensure that the DB_FILE_CREATE_DEST initialization parameter is set before using the DROP TABLESPACE command.

考题 多选题Which two statements are true regarding IDP?()AIDP can be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.BIDP cannot be used in conjunction with other JUNOS Software security features such as SCREEN options, zones, and security policy.CIDP inspects traffic up to the Presentation layer.DIDP inspects traffic up to the Application layer.

考题 单选题You are using the DBVERIFY utility to check the datafiles for any block corruption. You want to write the output of the dbv command to a file not to the screen.  Which parameter of the DBVERIFY utility will you use?()A  FILEB  PARFILEC  LOGFILED  FEEDBACK

考题 单选题An important tablespace of your database is dropped by mistake. You use the Flashback Database feature to retrieve the tablespace. You perform the following steps to retrieve the tablespace:   1. You log on to Enterprise Manager as SYSDBA.    2. You select the maintenance screen.    3. You choose Perform Recovery option on the maintenance screen.    4. You choose Whole Database in the Object Type drop-down list Perform Recovery: Type screen. 5. You choose Recover to Current Time from the Operation Type on the Perform Recovery: Type screen.    6. You provide the Host Credentials for a database user. on the Perform Recovery: Type screen.    7. You click the continue button.    An information screen appears saying that the database is unavailable. What is this information screen?()A Recovery ManagerB Recovery WindowC Recovery WizardD Enterprise Manager Home Page

考题 单选题Prior to applying SCREEN options to drop traffic, you want to determine how your configuration will affect traffic. Which mechanism would you configure to achieve this objective?()A the log option for the particular SCREEN optionB the permit option for the particular SCREEN optionC the SCREEN option, because it does not drop traffic by defaultD the alarm-without-drop option for the particular SCREEN option

考题 多选题Which three statements are true regarding IDP?()AIDP cannot be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.BIDP inspects traffic up to the Application layer.CIDP searches the data stream for specific attack patterns.DIDP inspects traffic up to the Presentation layer.EIDP can drop packets, close sessions, prevent future sessions, and log attacks for review by network administrators when an attack is detected.

考题 多选题Which two statements about the use of SCREEN options are correct?()ASCREEN options are deployed at the ingress and egress sides of a packet flow.BAlthough SCREEN options are very useful, their use can result in more session creation.CSCREEN options offer protection against various attacks at the ingress zone of a packet flow.DSCREEN options examine traffic prior to policy processing, thereby resulting in fewer resouces used formalicious packet processing.

考题 多选题Which two statements about the use of SCREEN options are correct? ()(Choose two.)ASCREEN options offer protection against various attacksBSCREEN options are deployed prior to route and policy processing in first path packet processingCSCREEN options are deployed at the ingress and egress sides of a packet flowDSCREEN options, you must take special care to protect OSPF

考题 单选题Where do you configure SCREEN options?()A zones on which an attack might arriveB zones you want to protect from attackC interfaces on which an attack might arriveD interfaces you want to protect from attack