网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
What mechanism does a system use to compare the security labels of a subject and an object?系统使用什么机制来比较的主体和客体的安全标识?()
A

Security Module.安全模块

B

Validation Module.验证模块

C

Clearance Check.声明检查

D

Reference Monitor.引用监视器


参考答案

参考解析
解析: 暂无解析
更多 “单选题What mechanism does a system use to compare the security labels of a subject and an object?系统使用什么机制来比较的主体和客体的安全标识?()A Security Module.安全模块B Validation Module.验证模块C Clearance Check.声明检查D Reference Monitor.引用监视器” 相关考题
考题 What painter does Red compare Andy to?() A.ManetB.Da VinciC.RembrandtD.Monet

考题 如果发现有人休克,保安应怎么处置?A.How does a security deal with the person if he finds he lost his consciousness?B.What does a security hold a person if he finds he lost his consciousness?C.How does a security handle the person if he finds he is injured?D.What will a security deal with the person if he finds a man involved in a case?

考题 You are hosting a Windows Communication Foundation (WCF) service at http://www.contoso.com for a law enforcement agency.The agency adds operations to support sending biometric fingerprint data via non-buffered streaming.The service data is routed between intermediaries. The WCF binding you are using by default does not support encryption.You need to ensure that the fingerprint data is not disclosed when passed over the network. What should you do?()A. Use basicHttpBinding with message security to https://www.contoso.comB. Use basicHttpBinding with transport security to https://www.contoso.comC. Use wsHttpBinding with message security to https://www.contoso.comD. Use wsHttpBinding with transport security to http://www.contoso.com

考题 When controlling the virtual router assignment for a PPP over ATM client, which mechanism does the router use first?() A. profileB. domain mapC. DHCP serverD. RADIUS server

考题 By default, which PPP mechanism does the ERX Edge Router use to monitor the session for a PPP over ATM client?() A. pingB. helloC. get requestD. echo request

考题 What mechanism does a system use to compare the security labels of a subject and an object?系统使用什么机制来比较的主体和客体的安全标识?()A、Security Module.安全模块B、Validation Module.验证模块C、Clearance Check.声明检查D、Reference Monitor.引用监视器

考题 A p5 595 does not have any device connected to it for backup. What AIX method should be used to backup each of the LPAR environments and have a quick recovery path?()A、Use savevg and copy to an NFS filesystemB、Create a mksysb on an NFS exported filesystemC、Use tar to copy system over network with a pipeD、Create mksysb on an NFS exported NIM filesystem

考题 Which mechanism does External BGP use to prevent the formation of routing loops?()A、AS pathB、Split horizonC、Poison reverseD、Unicast RPF check

考题 You need to design a method to standardize and deploy a baseline security configuration for servers. You solution must meet business requirements. What should you do?()A、Create a script that installs the Hisecdc.inf security templateB、Use a GPO to distribute and apply the Hisec.inf security templateC、Use the System Policy Editor to configure each server’s security settingsD、Use a GPO to distribute and apply a custom security template

考题 A system does not have a nameserver defined for IP address resolution. What file does AIX use to determine the IP address of a remote system?()A、/etc/hostsB、/etc/namesC、/etc/rc.tcpipD、/etc/resolv.conf

考题 A system administrator created a /etc/exports file on server "Alpha" and entered a filesystem to be exported to server "Bravo." However, the remote servers are unable to mount the filesystems. What does the system administrator need to do?()A、Use the exportfs command on server "Alpha" to export the filesystemB、Use the showmount command on server "Bravo" to import the filesystemC、Use the startsrc command on server "Bravo" to refresh the NFS daemonsD、Use the chfs command on server "Alpha" to change the filesystem type to NFS

考题 By default, which PPP mechanism does the ERX Edge Router use to monitor the session for a PPP over ATM client?()A、pingB、helloC、get requestD、echo request

考题 You are auditing some events on your Windows 2000 Professional computer. You make changes in the system time of this computer. Under what event will this log be generated in the event viewer? ()A、Privilege UseB、Object UseC、Security Settings UseD、System Use

考题 You are a network administrator for your company. The network contains a perimeter network. The perimeter network contains four Windows Server 2003, Web Edition computers that are configured as a Network Load Balancing cluster.   The cluster hosts an e-commerce Web site that must be available 24 hours per day. The cluster is located in a physically secure data center and uses an Internet-addressable virtual IP address. All servers in the cluster are configured with the Hisecws.inf template.   You need to implement protective measures against the cluster’s most significant security vulnerability.   What should you do?  ()A、 Use Encrypting File System (EFS) for all files that contain confidential data stored on the cluster.B、 Use packet filtering on all inbound traffic to the cluster.C、 Use Security Configuration and Analysis regularly to compare the security settings on all servers in the cluster with the baseline settings.D、 Use intrusion detection on the perimeter network.

考题 Your company uses Windows Update to download and install security updates on client computers. When Microsoft releases a security update, you have the following requirements:   Establish which client computers require the security update.   Identify what changes will occur as a result of the security update.  Identify which applications might be affected by the security update.    You need to select the appropriate tool to detect application-compatibility issues.   What should you do?()A、Use the Inventory Collector.B、Use the Setup Analysis Tool.C、Use the Update Compatibility Evaluator.D、Use the Windows Compatibility Evaluator.

考题 You need to recommend changes to the infrastructure to ensure that DFS meets the company’s  security requirements.   What should you include in the recommendation?()A、Upgrade DFS2 to Windows Server 2008 R2.B、Implement access-based enumeration (ABE).C、Implement Authentication Mechanism Assurance.D、Configure the DFS namespace to use Windows Server 2008 mode.

考题 A user named Marie uses a Windows 2000 Professional computer named Client1 to process payroll records. Marie reports that she can no longer run her financial applications. You determine that file permissions have been applied incorrectly to her computer. You want to configure Client1 to have the same security configuration and file permission settings that were applied when the computer was installed.  What should you do?()A、Grant usersFull Controlpermission to the C drive and all child foldersB、Use the Recovery Console to restore system filesC、Use Security Configuration and Analysis to apply the Secure security template to Client1D、Use Security Configuration and Analysis to apply the Default security template to Client 1

考题 You have a server that runs Windows Server 2003 Service Pack 2 (SP2).You need to compare the current security settings of the server to a security template. Which tool should you use?()A、Security Templates snap-in B、Group Policy Management Console C、Security Configuration and Analysis snap-in D、Microsoft Baseline Security Analyzer (MBSA)

考题 You upgrade your computer from Windows NT Workstation to a Windows 2000 Professional computer. Your computer is a member of justtalks.com domain. Prior to this upgrade your computer was configured by a system policy to require at-least a 12 alphanumeric character password. After the upgrade your computer will not apply security policy. What should you do?()A、Use secedit.exe to refresh the security policy.B、Use the local computer policy to configure the local security policy.C、Use security configuration and analysis to support the security files as a .pol file.D、Use computer management to configure the security policy setting.

考题 An on-premise application is exposed to external users through a Windows Communication Framework (WCF) service endpoint registered in the Windows Azure AppFabric Service Bus.  You need to recommend an approach for providing transport-level security that maximizes performance and minimizes bandwidth requirements.  What should you recommend?()A、 Use reliable messaging.  Use HTTP for message delivery.B、 Use binary message encoding.  Use TCP for message delivery.C、 Use Plain Old XML (POX) messages.  Use TCP for message delivery.D、 Use Message Transmission Optimization Mechanism (MTOM) message encoding. Use HTTPS formessage delivery

考题 单选题You are a network administrator for your company. The network contains a perimeter network. The perimeter network contains four Windows Server 2003, Web Edition computers that are configured as a Network Load Balancing cluster.   The cluster hosts an e-commerce Web site that must be available 24 hours per day. The cluster is located in a physically secure data center and uses an Internet-addressable virtual IP address. All servers in the cluster are configured with the Hisecws.inf template.   You need to implement protective measures against the cluster’s most significant security vulnerability.   What should you do?  ()A  Use Encrypting File System (EFS) for all files that contain confidential data stored on the cluster.B  Use packet filtering on all inbound traffic to the cluster.C  Use Security Configuration and Analysis regularly to compare the security settings on all servers in the cluster with the baseline settings.D  Use intrusion detection on the perimeter network.

考题 单选题Which mechanism does External BGP use to prevent the formation of routing loops?()A AS pathB Split horizonC Poison reverseD Unicast RPF check

考题 单选题When controlling the virtual router assignment for a PPP over ATM client, which mechanism does the router use first?()A profileB domain mapC DHCP serverD RADIUS server

考题 单选题A system does not have a nameserver defined for IP address resolution. What file does AIX use to determine the IP address of a remote system?()A /etc/hostsB /etc/namesC /etc/rc.tcpipD /etc/resolv.conf

考题 单选题What language does International NAVTEX use?()A RussianB FrenchC EnglishD German

考题 单选题Companycom purchased a new p5 570 without a HMC. The customer does not know how to power the full frame/system off since there does not appear to be an on/off button. What can be done to accomplish this task?()A Telnet into the machine and do a shutdown -FrB Log into ASMI as Administrator and use ASMI menusC Log into the service processor using WebSM and use ASMI menusD Use the off button which is located to the left below the LEDs

考题 单选题What does SSO stand for regarding ship security?()A Ship security officeB Ship security officerC Ship security operatorD Ship safety office