网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
You need to control SSH, HTTP, and Telnet access to an MX240 router through any interface.You have decided to use a firewall filter. How should you apply the firewall filter?()
A

as an outbound filter on interface fxp0

B

as an outbound filter on interface lo0

C

as an inbound filter on interface fxp0

D

as an inbound filter on interface lo0


参考答案

参考解析
解析: 暂无解析
更多 “单选题You need to control SSH, HTTP, and Telnet access to an MX240 router through any interface.You have decided to use a firewall filter. How should you apply the firewall filter?()A as an outbound filter on interface fxp0B as an outbound filter on interface lo0C as an inbound filter on interface fxp0D as an inbound filter on interface lo0” 相关考题
考题 following code segment.[ServiceContract]public interface ICustomerService{...}public class CustomerService : ICustomerService{...}The service is self-hosted in a console application. Older client applications access the service at http://contoso.com:8080/CustomerService/V1.Newer client applications access the service at http://contoso.com:8080/CustomerService/V2.You need to ensure that any client application can access the service at either address.Which code segment should you use?()A.B.C.D.

考题 You are receiving reports of possible unauthorized access to resources protected by a firewall enforcer running the Junos OS. You want to verity which users are currently accessing resources through the enforcer.Which command should you use to verify user access on the enforcer?()A. show services unified-access-control authentication-tableB. show auth tableC. show services unified-access-control policiesD. show services unified-access-control captive-portal

考题 You‘re the systems administrator at Testing, and you create the following access control lists.You then enter the command ip access-group 101 in to apply access control list 101 to router TK1s e0 interface.Which of the following Telnet sessions will be blocked as a result of your access lists?()A. Telnet sessions from host A to host 5.1.1.10B. Telnet sessions from host A to host 5.1.3.10C. Telnet sessions from host B to host 5.1.2.10D. Telnet sessions from host B to host 5.1.3.8E. Telnet sessions from host C to host 5.1.3.10F. Telnet sessions from host F to host 5.1.1.10

考题 You are trying to deploy a configuration job to an ios access point using the wlse, but the job fails. Which of the following would cause this failure?()A、snmp communitiesB、telnet/ssh user/passwordC、wlccp credentialsD、http user/password

考题 You are trying to deploy a configuration job to an IOS access point using the WLSE, but the jobfails. Which of the following would cause this failure?()A、SNMP communitiesB、Telnet/SSH user/passwordC、WLCCP credentialsD、HTTP user/password

考题 You have configured the "config network webmode enable" command on a Cisco device.  What is the purpose of this command? ()A、To allow HTTP access to the WLAN controllerB、To allow SSH access to the CLI of the WLAN controllerC、To allow SSL access to the CLI of the WLAN controllerD、To allow HTTPS access to the WLAN controllerE、None of the other alternatives apply

考题 You are a technician at TestKing. Your assistant applied an IP access control list to Router TK1. You want to check the placement and direction of the access control list.Which command should you use?()A、show access-listB、show ip access-listC、show ip interfaceD、show interfaceE、show interface list

考题 A customer asks the pSeries technical specialist to recommend which remote access (SSH or Telnet) method to use.  What question should the customer be asked to best determine the proper recommendation?()A、Is there a need for a PKI Management System?B、Is there a need for end-to-end encryption?C、Do they currently have a Kerberos domain in place?D、Which clients are installed on their desktops -- SSH, Telnet or both?

考题 You need to control SSH, HTTP, and Telnet access to an MX240 router through any interface.You have decided to use a firewall filter. How should you apply the firewall filter?()A、as an outbound filter on interface fxp0B、as an outbound filter on interface lo0C、as an inbound filter on interface fxp0D、as an inbound filter on interface lo0

考题 IPS上的SSH和Telnet服务可以同时启用,但HTTP和HTTPS不能同时启用。()

考题 Which commands is necessary to permit SSH or Telnet access to a cisco switch that is otherwiseconfigured for these vty line protocols?()A、transport type allB、transport output allC、transport preferred allD、transport input all

考题 There are 30 managed access points on the wlse.  a radio scan is started but fails. Upon  inspection of the device list in the reports tab, you notice a red indicator on the wds access point. upon inspection of the wds access point through its guid, it is discovered that the security keys are not set up between the wds access point and the wlse. Which of the following is mis configured?()A、snmp communitiesB、telnet/ssh user/passwordC、wlccp credentialsD、http user/password

考题 A system administrator wants to control the HMC from their workstation. Microsoft Windows 2000 is running and the HMC graphical user interface is being used remotely. Which of the following actions will accomplish this task?()A、Use any Windows 2000 to graphically access the HMCB、Load, install, and configure WebSM on the workstationC、Telnet to the HMC using Exceed or a GUI emulator product from the workstationD、Load, install, and configure OpenSSH or SSH on the workstation and access the HMC through the GUI interface

考题 You need to design an e-mail access strategy for remote users. What should you do? () A、 Instruct remote users to connect to their e-mail by using RPCB、 Instruct remote users to connect to Outlook Web Access by using only HTTPSC、 Instruct remote users to connect to the company network by using PPTP connectionsD、 Instruct remote users to connectd to their e-mail by using RPC over HTTP Configure the HTTP servers to require encryption.

考题 Your network contains an Exchange Server 2010 server.  You need to plan a mailbox sharing solution for the organization to meets the following requirements: .Ensure that assistants can read and modify the e-mail messages of their managers .Ensure that assistants can impersonate their managers when they send e-mail messages  What should you include in the plan?()A、Full Access and Send As permissionsB、Full Access and send on behalf of permissionsC、Role Based Access Control (RBAC) assignments and Send As permissionsD、Role Based Access Control (RBAC) assignments and send on behalf of permissions

考题 Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 client computers.   You are planning to deploy Windows 7 Enterprise to the client computers.   You need to design a custom image that will enable users to connect to a Telnet server.   What should you do?()A、 Configure Windows Firewall to allow the Telnet program through Windows Firewall before capturing the image.B、 Change User Account Control settings before capturing the image.C、 Turn on the Telnet Server feature in the image.D、 Turn on the Telnet Client feature in the image.

考题 单选题A customer asks the pSeries technical specialist to recommend which remote access (SSH or Telnet) method to use.  What question should the customer be asked to best determine the proper recommendation?()A Is there a need for a PKI Management System?B Is there a need for end-to-end encryption?C Do they currently have a Kerberos domain in place?D Which clients are installed on their desktops -- SSH, Telnet or both?

考题 多选题You are designing a service that will use the Windows Azure AppFabric Service Bus.  You need to recommend an approach for controlling access to the service by using the Windows Azure AppFabric Access Control Service. Which two actions should you recommend?()AConfigure the service to not require authentication.BConfigure the service to require a relay access token.CSpecify message security for all communications between clients and the service.DSpecify transport security for allcommunications between clients and the service.

考题 单选题You are a help desk technician for your company. Stefan and Irene are software developers for the company. Stefan is developing a Web application on his Windows XP Professional computer. The computer is named Stefan132.  All client computers use Microsoft Internet Explorer 6. 0 or later as their Web browser. When Irene types http://Stefan132 in the Address bar of her Web browser, she cannot access the Web application. However, Stefan can access the Web application by typing http://localhost or http://Stefan132 in the Address bar of his Web browser. He can also access resources on the company network. When you run the Ping command on your computer, you cannot connect to Stefan’s computer. When you attempt to access http://Stefan132 from your computer, Internet Explorer displays “DNS or Server Error.” You need to ensure that Irene can access the Web application on Stefan’s computer. First, you establish a Remote Assistance connection to Stefan’s computer. What should you do next on Stefan’s computer?()A Run the IPconfig /renew command. B Stop and then restart the World Wide Web Publishing service. C Ensure that the Everyone group has Allow - Full Control permission on the Inetpub folder. D In the properties of the Local Area Connection connection, allow a Windows Firewall exception for port 80.

考题 单选题Your network consists of a single Active Directory domain. You have a Web server named server1.contoso.com that runs Windows Server 2003 Service Pack 2 (SP2). Users access a Web site on Server1 by using the URL http://server1.contoso.com.  Users also access the Web site on Server1 by using the URL http://192.168.1.10. You need to configure DNS to enable users to access the Web site by using the URL http://www.contoso.com. The solution must prevent the need to manually update DNS if the IP address of Server1 changes. Which type of resource record should you create in DNS?()A alias (CNAME)B host (A)C host (AAAA)D host information (HINFO)

考题 单选题You need to control SSH. HTTP, and Telnet access to an MX240 router through any interface. You have decided to use a firewall filter. How should you apply the firewall filter?()A as an outbound filter on interface fxp0B as an outbound filter on interface lo0C as an inbound filter on interface fxp0D as an inbound filter on interface lo0

考题 单选题You have configured the "config network webmode enable" command on a Cisco device.  What is the purpose of this command? ()A To allow HTTP access to the WLAN controllerB To allow SSH access to the CLI of the WLAN controllerC To allow SSL access to the CLI of the WLAN controllerD To allow HTTPS access to the WLAN controllerE None of the other alternatives apply

考题 判断题IPS上的SSH和Telnet服务可以同时启用,但HTTP和HTTPS不能同时启用。()A 对B 错

考题 单选题Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 client computers.   You are planning to deploy Windows 7 Enterprise to the client computers.   You need to design a custom image that will enable users to connect to a Telnet server.   What should you do?()A  Configure Windows Firewall to allow the Telnet program through Windows Firewall before capturing the image.B  Change User Account Control settings before capturing the image.C  Turn on the Telnet Server feature in the image.D  Turn on the Telnet Client feature in the image.

考题 单选题You are receiving reports of possible unauthorized access to resources protected by a firewall enforcer running the Junos OS. You want to verity which users are currently accessing resources through the enforcer.Which command should you use to verify user access on the enforcer?()A show services unified-access-control authentication-tableB show auth tableC show services unified-access-control policiesD show services unified-access-control captive-portal

考题 单选题You are a technician at TestKing. Your assistant applied an IP access control list to Router TK1. You want to check the placement and direction of the access control list.Which command should you use?()A show access-listB show ip access-listC show ip interfaceD show interfaceE show interface list

考题 单选题Your network contains a domain-based namespace named DFS1. DFS1 has Windows 2008 Server mode enabled. You need to ensure that only files and folders in DFS1 that users have permissions to access are displayed. What should you do?()A Disable referrals.B Modify the system access control list.C Enable access-based enumeration (ABE).D Modify the discretionary access control list.

考题 单选题You need to control SSH, HTTP, and Telnet access to an MX240 router through any interface.You have decided to use a firewall filter. How should you apply the firewall filter?()A as an outbound filter on interface fxp0B as an outbound filter on interface lo0C as an inbound filter on interface fxp0D as an inbound filter on interface lo0