网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
When a non-root user connects to a JUNOS platform and enters a username and password, the user is immediately placed at which level?()
- A、UNIX shell
- B、user level CLI
- C、configuration mode
- D、operational mode
参考答案
更多 “When a non-root user connects to a JUNOS platform and enters a username and password, the user is immediately placed at which level?()A、UNIX shellB、user level CLIC、configuration modeD、operational mode” 相关考题
考题
Which three statements are true about memory buffer allocation by a MySQL Server?()
A.Global buffers such as the InnoDB buffer pool are allocated after the server starts, and are never freedB.Thread buffers are allocated when a client connects, and are freed when the client disconnectsC.Buffers that are needed for certain operation are allocated when the operation starts, and freed when it endsD.User buffers are allocated at server startup and freed when the user is droppedE.All dynamic buffers that are set with a SET GLOBAL statement immediately get allocated globally, and are never freed
考题
Which configuration statement allows local non-root users access to the router only when theRADIUS server is unreachable?()
A.B.C.D.
考题
In enterprises, the gateway is the computer that(71) the traffic from a workstation to the outside network that is serving the Web pages. In homes ,the gateway is the(72) that connects the user to the internet.A.findsB.searchesC.routesD.tracks
考题
Which two statements are true regarding firewall user authentication?() (Choose two.)
A. When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.B. When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.C. If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .D. If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.
考题
When a non-root user connects to a JUNOS platform and enters a username and password, the user is immediately placed at which level?()
A.UNIX shellB.user level CLIC.configuration modeD.operational mode
考题
A non-root user can run rsh commands from serverA to serverB, but attempts to run rsh commands by the root user return with apermission error message.What action will resolve the problem?()
A.Add root user to the /etc/hosts.equiv on serverBB.Create $HOME/.rhosts file for the root user on serverBC.Restart the rshd daemon with root enabled option on serverBD.Add entry to allow root user from serverA to the /etc/hosts.allow on serverB
考题
A virtual (71) network, or VPN, is an encrypted connection over the Internet from a device to a network. The encrypted connection helps ensure that sensitive data is safely (72). It prevents (73) people fromeavesdropping on the traffic and allows the user to conduct work remotely. Traffic on the virtual network is sent securely by establishing an encrypted connection across the Internet known as a (74).A remote access VPN securely connects a device outside the corporate office. A site-to-site VPN connects the corporate office to branch offices over the Internet. Site-to-site VPNs are used when distance makes it impractical to have direct network connections between these offices. Think of site-to-site access as (75) to network.
A.encodedB.encryptedC.storedD.transmitted
考题
Which two statements apply when a user has entered private configuration mode by typing configure private?()A、All users have their own active configuration.B、All users have their own private candidate configuration.C、When a user commits, all nonconflicting changes made by all users are committed.D、When a user commits, only the user's own changes are committed.
考题
In which two conditions are resumable statements suspended?()A、 when a user exceeds the space quotaB、 when a user session is terminatedC、 when a table that is being accessed by the current transaction is not foundD、 when a user manually suspends the statementE、 when the maximum extents of a segment is reached
考题
When a client using the SERVER_ENCRYPT authentication type connects to a server using the SERVER authentication type, what happens?()A、An error will occur.B、Data passed between the client and the server is encrypted.C、User IDs and passwords are passed to the server unencrypted.D、User IDs and passwords are encrypted before they are passed to the server.
考题
Which two statements are true regarding firewall user authentication?() (Choose two.)A、When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.B、When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.C、If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .D、If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.
考题
A user typically connects to the Internet in one of two ways: dedicated access and()access.A、 broadcastingB、 point-to-pointC、 dial-upD、 Internet
考题
When optimizing a standalone point-to-multipoint bridge installation with eight non-root bridges. Which of the following rts threshold and cwmin settings would be correct for the non-root bridges?()A、rts threshold=4000,cwmin=3B、rts threshold=1,cwmin=4C、rts threshold=4000,cwmin=5D、rts threshold=1,cwmin=5
考题
A non-root user can run rsh commands from serverA to serverB, but attempts to run rsh commands by the root user return with a permission error message. What action will resolve the problem?()A、Add root user to the /etc/hosts.equiv on serverB .B、Create $HOME/.rhosts file for the root user on serverB .C、Restart the rshd daemon with root enabled option on serverB .D、Add entry to allow root user from serverA to the /etc/hosts.allow on serverB .
考题
Which two statements apply when a user has entered private configuration mode by typing configure private? ()A、All users have their own active configurationB、All users have their own private candidate configurationC、When a user commits, all nonconflicting changes made by all users are commitedD、When a user commits, only the user's own changes are commited
考题
Which two statements apply when a user has entered private configuration mode by typing configure private?()A、All users have their own active configurationB、All users have their own private candidate configurationC、When a user commits, all non conflicting changes made by all users are commitedD、When a users commits, only the user's own changes are commited
考题
In which scenario do you use the Flashback Database feature?()A、 when a table is dropped and you restore it from the Recycle BinB、 when a user’s schema is dropped and you recover the user’s schemaC、 when some incorrect data is inserted in the table and you retrieve the table to a state that was at a certain timestampD、 when a row of a table is updated frequently and committed, and you view all the versions of the row within a specific duration
考题
Which three statements are true about memory buffer allocation by a MySQL Server?()A、Global buffers such as the InnoDB buffer pool are allocated after the server starts, and are never freedB、Thread buffers are allocated when a client connects, and are freed when the client disconnectsC、Buffers that are needed for certain operation are allocated when the operation starts, and freed when it endsD、User buffers are allocated at server startup and freed when the user is droppedE、All dynamic buffers that are set with a SET GLOBAL statement immediately get allocated globally, and are never freed
考题
Your company has an Exchange Server 2010 organization. A user named User1 is configured as a Delegate for a user named User2. You need to ensure that User1 can add User2 in the From field when sending email messages. Messages that contain User2 in the From field must display User2 as the message sender when recipients receive the messages. What should you do()? A、Remove User1 as a delegate, and then grant User1 Send As permissions to User2¯s mailboxB、Remove User1 as a delegate, and then grant User1 Send on Behalf permissions to User2¯s mailboxC、Create a Sharing policy, and then grant User1 Modify permissions to User2¯s mailboxD、Create a Sharing policy, and then grant User1 Full Mailbox permissions to User2¯s mailbox
考题
单选题In which scenario do you use the Flashback Database feature?()A
when a table is dropped and you restore it from the Recycle BinB
when a user’s schema is dropped and you recover the user’s schemaC
when some incorrect data is inserted in the table and you retrieve the table to a state that was at a certain timestampD
when a row of a table is updated frequently and committed, and you view all the versions of the row within a specific duration
考题
单选题What happens when Host Checker is configured to perform checks every "0" minutes? ()A
Host Checker is disabled.B
Host Checker will perform continous checks.C
Host Checker will perform checks when user logs out.D
Host Checker will perform checks when user first logs in.
考题
单选题You have an Exchange Server 2010 organization.A user named User1 connects to his mailbox by using Microsoft Office Outlook.User1 reports that he is unable to send encrypted e-mail messages to an external recipient named User2.You verify that User1 and User2 have e-mail encryption certificates.You need to ensure that User1 can send encrypted e-mail messages to User2.What should you do first?()A
Instruct User2 to add a delegateB
Instruct User2 to send a signed e-mail message to User1.C
Instruct User1 to send a signed e-mail message to User2.D
Instruct User1 to modify the sensitivity settings of the e-mail message
考题
单选题When a non-root user connects to a JUNOS platform and enters a username and password, the user is immediately placed at which level?()A
UNIX shellB
user level CLIC
configuration modeD
operational mode
考题
多选题Which three statements are true about memory buffer allocation by a MySQL Server?()AGlobal buffers such as the InnoDB buffer pool are allocated after the server starts, and are never freedBThread buffers are allocated when a client connects, and are freed when the client disconnectsCBuffers that are needed for certain operation are allocated when the operation starts, and freed when it endsDUser buffers are allocated at server startup and freed when the user is droppedEAll dynamic buffers that are set with a SET GLOBAL statement immediately get allocated globally, and are never freed
考题
单选题When optimizing a standalone point-to-multipoint bridge installation with eight non-root bridges,which of the following RTS threshold and CWmin settings would be correct for the non-root bridges?()A
RTS threshold = 4000, CWmin = 3B
RTS threshold = 1, CWmin = 4C
RTS threshold = 4000, CWmin = 5D
RTS threshold = 1, CWmin = 5
考题
单选题If a parent organization is not specified when registering a user, which organization will the user be a member of?()A
Buyer OrganizationB
Default OrganizationC
No OrganizationD
Root OrganizationE
Seller Organization
考题
单选题You configure Outlook Web App (OWA) to require SSL.A user named User1 reports that when she connects to OWA, she receives a Web site security certificate warning message.You need to prevent User1 from receiving the warning message when she connects to OWA. What should you do?()A
On User1’s computer, install the erver’s root certificate into the Trusted Root CertificatioAuthorities store.B
On the Client Access server, install the server’s root certificate into the Trusted RooCertification Authorities store.C
From the Exchange Management Console (EMC), assign an Outlook Web App mailbox policy to User1.D
From the Exchange Management Console (EMC), open owa (Default Web Site) Properties. Configure the logon format to use the user principal name (UPN).
热门标签
最新试卷