网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which attribute is used to pass the user role back to the Nexus when remote AAA is enabled?()
A

 Cisco AV-pair

B

 TACACS+ or RADIUS ack frame role attribute

C

 DH-CHAP challenge attribute

D

 privilege level attribute


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which attribute is used to pass the user role back to the Nexus when remote AAA is enabled?()A  Cisco AV-pairB  TACACS+ or RADIUS ack frame role attributeC  DH-CHAP challenge attributeD  privilege level attribute” 相关考题
考题 You create a Web site that is for members only. The behavior of the Web site changes according to the role of the user. The Web site uses the ASP.NET Membership control for creation of user accounts. You need to find out whether a user is a member of a particular role.What should you do?()A. Pass the user names and passwords to Membership.ValidateUser.B. Pass the role names to User.IsInRole.C. Pass the role names to Roles.RoleExists.D. Pass the user names to Membership.GetUser.

考题 You want to restrict access to a role based on the client machine from which the user is accessing the network.Which two role restrictions accomplish this goal? () A. user nameB. password lengthC. certificateD. Host Checker

考题 Which three authentication server types are supported for retrieving user attributes used in role- mapping rules?() A. LDAPB. S/KeyC. TACACS+D. RADIUSE. SiteMinder

考题 From the DX WebUI Dashboard, which steps are used for creating a new admin user? () A. Click Admin Users. Enter username, password, role, account status, and email.B. Click Admin Users. Enter username, password, role, account status, and user class.C. Click Users Manage Users. Enter username, password, role, account status, and user class.D. Click Users Manage Users. Enter username, password, ActiveDirectory domain, account status, and role.

考题 Which of the following is true of an index used to support a UNIQUE constraint?() A.It must have the UNIQUE attribute.B.It cannot be created explicitly by the user.C.It must have the UNIQUE and CLUSTER attributes.D.It must have the UNIQUE WHERE NOT NULL attribute.

考题 When creating a role in a Cisco Nexus 7000 Series Switch, rules are used to define the type of operations that a role will allow the user to perform.  Which two of these parameters cannot be applied as a rule? () A、 port-profileB、 commandC、 access-listD、 feature-groupE、 OID

考题 Which attribute is used to pass the user role back to the Nexus when remote AAA is enabled?()A、 Cisco AV-pairB、 TACACS+ or RADIUS ack frame role attributeC、 DH-CHAP challenge attributeD、 privilege level attribute

考题 When adding a new user and assigning a role, which user role has "read only" rights to theconfiguration and operational states? ()A、userB、read_onlyC、target_operatorD、security_operator

考题 An administrator created a .env file in a user’s home directory to configure a number of custom environment variables for a local application. However, after the user logs out and then logs back into the system, the custom variables are not being set What is the most likely reason that the custom .env file is being ignored?()A、A shell other than ksh is being used by the user.B、The line ’export ENV=$HOME/.env’ is missing from /etc/profile.C、The line ’export ENV=$HOME/.env’ is missing from the user’s .profile.D、The env_profile attribute is not defined for the user within /etc/security/user.

考题 Which three authentication server types are supported for retrieving user attributes used in role- mapping rules?()A、LDAPB、S/KeyC、TACACS+D、RADIUSE、SiteMinder

考题 You want to restrict access to a role based on the client machine from which the user is accessing the network.Which two role restrictions accomplish this goal? ()A、user nameB、password lengthC、certificateD、Host Checker

考题 View the Exhibit to observe the roles assigned to the SL_REP user.  Which statement is true about theassignment of the SELECT_CATALOG_ROLE role to the SL_REP user()A、The user must enable the role explicitly.B、The user can grant the role to other users.C、The user cannot use the role until the DBA enables it explicitly.D、The user can start using the role immediately without any changes

考题 Consider the Mysql Enterprise Audit plugin. Which statement is true when you identify a connection event that has used external authentication?()A、The attribute "STATUS" is set to the string EXTERNAL_AUTHB、The attribute "PRIV_USER" contains the usernameC、The event type that is given in the attribute "NAME" is EXTERNAL_AUTHD、There is no differentiation between native and external authentication eventsE、External authentication is managed through external auditing logsF、The "PROXY_PRIV" user shows a username if external authentication is used

考题 Your network contains an Active Directory forest. The forest schema contains a custom attribute for  user objects.   You need to modify the custom attribute value of 500 user accounts.   Which tool should you use()A、CsvdeB、DsmodC、DsrmD、Ldifde

考题 Which of the following is true of an index used to support a UNIQUE constraint?()A、It must have the UNIQUE attribute.B、It cannot be created explicitly by the user.C、It must have the UNIQUE and CLUSTER attributes.D、It must have the UNIQUE WHERE NOT NULL attribute.

考题 单选题You are the administrator of a Junos Pulse Access Control Service implementation. You must restrict authenticated users connected from the branch offices to a few specific resources within the data center. However, when the authenticated users are connected at the corporate office, they are allowed more access to the data center resources. You have created two roles with different levels of access and are trying to determine the best way of controlling when a user is mapped to a specific role. Having the user prompted to manually select their role is possible, but you want to automate the process. Which configuration solves this problem?()A Implement a RADIUS request attribute policy to assist with realm selection and create different role-mapping rules for the user in each realm.B Implement a directory/attribute server on the realm and set up this server to determine by group membership the proper role to which a user should be mapped.C Reorder the role-mapping rules to allow for the more open role to be mapped first and then enable the stop processing rules when this rule matches function on this role.D Implement a Host Checker policy on the realm that determines the geographic location of the device and restricts the user based on the results of the policy.

考题 多选题If Host Checker restrictions are applied at the role level and the "Allow access to the role if any ONE of the select policies is passed" option is unchecked, which two statements are true?()AAll roles are evaluated together.BEach role is evaluated separately.CClients must pass all policies to access the role.DClients will pass as long as one policy is accepted.

考题 多选题In your multitenant container database (CDB) containing same pluggable databases (PDBs), you execute the following commands in the root container: Which two statements are true?()AThe C # # ROLE1 role is created in the root database and all the PDBs.BThe C # # ROLE1 role is created only in the root database because the container clause is not used.CPrivileges are granted to the C##A_ADMIN user only in the root database.DPrivileges are granted to the C##A_ADMIN user in the root database and all PDBs.EThe statement for granting a role to a user fails because the CONTAINER clause is not used.

考题 单选题Which of the following is true of an index used to support a UNIQUE constraint?()A It must have the UNIQUE attribute.B It cannot be created explicitly by the user.C It must have the UNIQUE and CLUSTER attributes.D It must have the UNIQUE WHERE NOT NULL attribute.

考题 单选题View the Exhibit to observe the roles assigned to the SL_REP user.  Which statement is true about theassignment of the SELECT_CATALOG_ROLE role to the SL_REP user()A The user must enable the role explicitly.B The user can grant the role to other users.C The user cannot use the role until the DBA enables it explicitly.D The user can start using the role immediately without any changes

考题 单选题A user is reporting that their computer is making strange noises and randomly powers off. Which of the following tools would MOST likely be used to troubleshoot this problem?()A POST diagnostic cardB Power supply testerC Loop back plugD Cable tester

考题 单选题Consider the Mysql Enterprise Audit plugin. Which statement is true when you identify a connection event that has used external authentication?()A The attribute STATUS is set to the string EXTERNAL_AUTHB The attribute PRIV_USER contains the usernameC The event type that is given in the attribute NAME is EXTERNAL_AUTHD There is no differentiation between native and external authentication eventsE External authentication is managed through external auditing logsF The PROXY_PRIV user shows a username if external authentication is used

考题 单选题The DBA is defining role for users. Which of the following is not an acceptable method for defining a default role?()A ALTER USER DEFAULT ROLE ALLB ALTER USER DEFAULT ROLE ALL EXCEPT ROLE_1C ALTER USER DEFAULT ROLE NONED ALTER USER DEFAULT ROLE NONE EXCEPT ROLE_1

考题 多选题When creating a role in a Cisco Nexus 7000 Series Switch, rules are used to define the type of operations that a role will allow the user to perform.  Which two of these parameters cannot be applied as a rule? ()Aport-profileBcommandCaccess-listDfeature-groupEOID

考题 单选题From the DX WebUI Dashboard, which steps are used for creating a new admin user? ()A Click Admin Users. Enter username, password, role, account status, and email.B Click Admin Users. Enter username, password, role, account status, and user class.C Click Users Manage Users. Enter username, password, role, account status, and user class.D Click Users Manage Users. Enter username, password, ActiveDirectory domain, account status, and role.

考题 单选题When adding a new user and assigning a role, which user role has "read only" rights to theconfiguration and operational states? ()A userB read_onlyC target_operatorD security_operator

考题 单选题Which attribute is used to pass the user role back to the Nexus when remote AAA is enabled?()A  Cisco AV-pairB  TACACS+ or RADIUS ack frame role attributeC  DH-CHAP challenge attributeD  privilege level attribute

考题 多选题Which three authentication server types are supported for retrieving user attributes used in role- mapping rules?()ALDAPBS/KeyCTACACS+DRADIUSESiteMinder