网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which of the following could be used to restrict access to the local web server to only certain IP addresses?()
A
Create an ACL.
B
Create an application exception.
C
Configure IPSec.
D
Block port 80.
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which of the following could be used to restrict access to the local web server to only certain IP addresses?()A Create an ACL.B Create an application exception.C Configure IPSec.D Block port 80.” 相关考题
考题
Which of the following should be used to restrict access to a wireless network?()
A. Port forwardingB. Enable SSID broadcastC. Wireless encryptionD. Enable DMZ
考题
Which two statements are true regarding the USING clause in table joins?()A、It can be used to join a maximum of three tables B、It can be used to restrict the number of columns used in a NATURAL join C、It can be used to access data from tables through equijoins as well as nonequijoins D、It can be used to join tables that have columns with the same name and compatible data types
考题
Which of the following technologies can be used to remotely gain access to a server console?()A、PS/2 KVMB、LDAPC、VNCD、Remote desktopE、VPN
考题
Which of the following commands could be used to start the Management Console on a workstation running Windows 2000/XP?()A、Start Run MCPB、Start Run MCEC、Start Run MCAD、Start Run MMC
考题
A site administrator is configuring Resource-level access control. Which of the following statements about Resource-level access control are true? Resource-level access control policies:()A、are optionalB、are used to protect data beansC、provide coarse-grained access controlD、never specify a relationship
考题
Which of the following could be used to restrict access to the local web server to only certain IP addresses?()A、 Create an ACL.B、 Create an application exception.C、 Configure IPSec.D、 Block port 80.
考题
Which of the following storage tools could be used to initiate the rebuilding of a failed hard drive?()A、RAID array managementB、CHKDSKC、Monitoring agentsD、Partitioning management
考题
Which of the following would be the BEST way to restrict access to the WAP from certain clients?()A、Disable DHCP serverB、Enable WEP encryptionC、Disable SSID broadcastD、Enable MAC filtering
考题
Physical and logical network diagrams are used for which of the following configuration management goals?()A、Track DHCP distributionB、Compare MAC and IP addressesC、Document Internet access historyD、Identity network devices
考题
Which of the following could be used to prevent an attacker from accessing the master boot drive when attaching a hard drive to another system?()A、BIOS passwordB、Domain membershipC、EFSD、Bitlocker
考题
Which of the following is used to deny or allow access to a wireless router network?()A、SSIDB、SNMPC、IMAPD、MAC filtering
考题
Which of the following utilities could be used to determine a subnet mask?()A、PINGB、NSLOOKUPC、TRACERTD、IPCONFIG
考题
Which of the following would be used to monitor unauthorized access to data files?()A、Performance Log and AlertsB、Event ViewerC、Security Configuration and AnalysisD、IP Security Monitor
考题
An administrator needs to configure a server to restrict mail traffic to an application server for security reasons. Which of the following techniques can be used to manage this?()A、 PATB、 ACLsC、 Subnet maskingD、 Port blocking
考题
Which of the following resources could be used to obtain the latest IBM DS Storage ManagerUser’s Guide?()A、InfoCenter web siteB、Announcement letterC、IBM Redbook web siteD、IBMTechline/Partnerline
考题
Which statements describe the capabilities of the DBMS_NETWORK_ACL_ADMIN package?()A、It can be used to allow the access privilege settings for users but not roles.B、It can be used to allow the access privilege settings for users as well as roles.C、It can be used to control the time interval for which the access privilege is available to a user.D、It can be used to selectively restrict the access for each user in a database to different host computers.E、It can be used to selectively restrict a user's access to different applications in a specific host computer.
考题
Which two statements are true about WHERE and HAVING clauses? ()A、A WHERE clause can be used to restrict both rows and groups.B、A WHERE clause can be used to restrict rows only.C、A HAVING clause can be used to restrict both rows and groups.D、A HAVING clause can be used to restrict groups only.E、A WHERE clause CANNOT be used in a query if the query uses a HAVING clause.F、A HAVING clause CANNOT be used in subqueries.
考题
单选题An administrator needs to configure a server to restrict mail traffic to an application server for security reasons. Which of the following techniques can be used to manage this?()A
PATB
ACLsC
Subnet maskingD
Port blocking
考题
多选题Which of the following technologies can be used to remotely gain access to a server console?()APS/2 KVMBLDAPCVNCDRemote desktopEVPN
考题
多选题Which two statements are true regarding the USING clause in table joins?()AIt can be used to join a maximum of three tablesBIt can be used to restrict the number of columns used in a NATURAL joinCIt can be used to access data from tables through equijoins as well as nonequijoinsDIt can be used to join tables that have columns with the same name and compatible data types
考题
单选题Which of the following storage tools could be used to initiate the rebuilding of a failed hard drive?()A
RAID array managementB
CHKDSKC
Monitoring agentsD
Partitioning management
考题
单选题Which of the following methods can be used to detect block corruption?()A
ANALYZE operationsB
dbvC
SQL queries that access the potentially corrupt blockD
RMANE
All of the above
考题
单选题Which of the following should be used to restrict access to a wireless network?()A
Port forwardingB
Enable SSID broadcastC
Wireless encryptionD
Enable DMZ
考题
单选题On the WLSE, which of the following fault policies would be used to verify that access to thecommand-line interface of the access point is secure?()A
registration errorB
authentication failures thresholdC
HTTP disabledD
Telnet disabled
考题
单选题Which of the following could be used to restrict access to the local web server to only certain IP addresses?()A
Create an ACL.B
Create an application exception.C
Configure IPSec.D
Block port 80.
考题
多选题Which two statements are true about WHERE and HAVING clauses? ()AA WHERE clause can be used to restrict both rows and groups.BA WHERE clause can be used to restrict rows only.CA HAVING clause can be used to restrict both rows and groups.DA HAVING clause can be used to restrict groups only.EA WHERE clause CANNOT be used in a query of the query uses a HAVING clause.FA HAVING clause CANNOT be used in subqueries.
考题
多选题Which statements describe the capabilities of the DBMS_NETWORK_ACL_ADMIN package?()AIt can be used to allow the access privilege settings for users but not roles.BIt can be used to allow the access privilege settings for users as well as roles.CIt can be used to control the time interval for which the access privilege is available to a user.DIt can be used to selectively restrict the access for each user in a database to different host computers.EIt can be used to selectively restrict a user's access to different applications in a specific host computer.
热门标签
最新试卷