网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
You are attempting to secure a MySQL server by using SSL encryption. On starting MySQL, you get this error: 130123 10:38:02 [ERROR] mysqld: unknown option '—ssl' What is the cause of the error?()
- A、The — ssl level was not specified
- B、The server was not started with the – enable–ssl-plugin option
- C、— ssl is not a valid server option
- D、The mysqld binary was not compiled with SSL support
- E、The server's SSL certificate was invalid
参考答案
更多 “ You are attempting to secure a MySQL server by using SSL encryption. On starting MySQL, you get this error: 130123 10:38:02 [ERROR] mysqld: unknown option '—ssl' What is the cause of the error?()A、The — ssl level was not specifiedB、The server was not started with the – enable–ssl-plugin optionC、— ssl is not a valid server optionD、The mysqld binary was not compiled with SSL supportE、The server's SSL certificate was invalid” 相关考题
考题
The packing of goods offered does not meet our standards. Could you use packing which is secure ()breakage?A、uponB、ofC、atD、from
考题
After attempting to telnet into a router, you are denied and you receive the error message "password required, but none set." What configuration changes will allow telnet access into this router?()
A.B.C.D.
考题
If you are unable to stop a diesel engine by any other means,you should ______.A.Discharge a CO2 extinguisher in the air inletB.Pull off the distributor capC.Secure the jacket waterD.Secure the starting air supply valve
考题
Before using a fixed CO2 system to fight an engine room fire, you must ______.A.secure the engine room ventilationB.secure the machinery in the engine roomC.evacuate all engine room personnelD.All of the above
考题
If you saw flames aboard a vessel but could see the vessel was not on fire, you would known that the ______.A.crew was trying to get warmB.vessel required immediate assistanceC.vessel was attempting to attract the attention of a pilot boatD.vessel was being illuminated for identification by aircraft
考题
This recommendation letter will ensure you an interview.A:guarantee
B:offer
C:prove
D:secure
考题
You are a network technician at Certpaper.com. Which description is correct when you have generated RSA keys on your Cisco router to prepare for secure device management?()A、You must then specify the general-purpose key size used for authentication with the crypto key generaters a general-keys modulus command.B、You must then zeroize the keys to reset secure shell before configuring other parameters.C、All vty ports are automatically enabled for SSH to provide secure management.D、The SSH protocol is automatically enabled.
考题
When configuring more than one archival site, which statement is true?()A、The system will first attempt the transfer using the URL configured lastB、The system will transfer the configuration to each archival siteC、The system will not transfer to a secondary site unless the previous site failsD、The system will transfer using secure copy protocl (SCP) before attempting FTP
考题
Of the threats discussed below, what is the main advantage of using Cisco Secure Desktop which is part of the Cisco ASA VPN solution?()A、 Secure desktop will create a completely separate computing environment thatwill be deleted when you are done.This ensures that no confidential data has been left on the shared/public computer.B、 Secure desktop is used to protect access to your registry and systemfiles when browsing to SSL/VPN protectedpages.C、 Secure Desktop ensures that an SSLprotected password cannotbe exploitedby a man in the middle attackusing a spoofed certificate.D、 Secure desktop hardens the operating system of the machines you are using at the time secure desktop islaunched.
考题
You are charged with implementing a secure wireless installation which will provide Internet access to client devices but will not allow communications between wireless clients. In addition toimplementing PSPF or peer-to-peer blocking on the wireless side. Which of the following actionsshould you perform on the wired infrastructure?()A、Implement a Cisco Secure IPS sensor.B、Implement 802.1X on the switch ports.C、Take no action, you have achieved your goal.D、Implement a protected port on the access switches.
考题
You have a single Active Directory directory service domain. All client computers run either Windows Vista or Windows XP. You create and configure a Group Policy object (GPO) named Secure Client Computer. You need to ensure that the Secure Client Computer GPO is automatically applied to current and future Windows XP client computers. What should you do?()A、 Create a WMI filter that limits the scope of the Secure Client Computer GPO to the Windows XP operating system. Link the WMI filter to the GPO. Link the GPO to the domain.B、 Create a global security group that contains all of the Windows XP client computers. Edit the permissions of the Secure Client Computer GPO to allow the global security group the Read and Apply Group Policy permissions. Link the Secure Client Computer GPO to the domain.C、 Use the Delegation of Control Wizard at the domain level, and delegate the Generate Resultant Set of policy (Planning) right to the Windows XP client computers. Link the Secure Client Computer GPO to the domain.D、 Use the Delegation of Control Wizard at the domain level, and delegate the Generate Resultant Set of policy (Logging) right to the Windows XP client computers. Link the Secure Client Computer GPO to the domain.
考题
Which protocols would you want to use for secure VPN ?()A、EAPB、ChapC、Ms-ChapD、PPTPE、PAPF、SPAP
考题
You have two stand-alone servers that run Windows Server 2003 Service Pack 2 (SP2). You assign the Secure Server (Require security) IPSec policy to both servers. From Server1, you notice that you cannot access resources on Server2. You need to ensure that you can access resources on Server2. All communications between Server1 and Server2 must be encrypted. What should you do?()A、On Server1, assign the Client (Respond only) IPSec policy.B、On Server2, assign the Server (Request Security) IPSec Policy.C、On Server1 and Server2, modify the authentication settings in the Secure Server (Require security) IPSec Policy.D、On Server1 and Server2, enable Master Key perfect forward secrecy (PFS) in the Secure Server (Require security) IPSec Policy.
考题
单选题What is the main consideration when deciding to invest in shares?A
how much you pay for the sharesB
how quickly you can make a profitC
how willing you are to take risksD
how financially secure you are
考题
单选题You are attempting to secure a MySQL server by using SSL encryption. On starting MySQL, you get this error: 130123 10:38:02 [ERROR] mysqld: unknown option '—ssl' What is the cause of the error?()A
The — ssl level was not specifiedB
The server was not started with the – enable–ssl-plugin optionC
— ssl is not a valid server optionD
The mysqld binary was not compiled with SSL supportE
The server's SSL certificate was invalid
考题
单选题If you saw flames aboard a vessel but could see the vessel was not on fire,you would know that the().A
crew was trying to get warmB
vessel required immediate assistanceC
vessel was attempting to attract the attention of a pilot boatD
vessel was being illuminated for identification by aircraft
考题
单选题What is the main consideration when deciding to invest in shares?A
How much you pay for the shares.B
How quickly you can make a profit.C
How willing you are to take risks.D
How financially secure you are.
考题
单选题Which protocols would you want to use for secure VPN ?()A
EAPB
ChapC
Ms-ChapD
PPTPE
PAPF
SPAP
考题
单选题Of the threats discussed below, what is the main advantage of using Cisco Secure Desktop which is part of the Cisco ASA VPN solution?()A
Secure desktop will create a completely separate computing environment thatwill be deleted when you are done.This ensures that no confidential data has been left on the shared/public computer.B
Secure desktop is used to protect access to your registry and systemfiles when browsing to SSL/VPN protectedpages.C
Secure Desktop ensures that an SSLprotected password cannotbe exploitedby a man in the middle attackusing a spoofed certificate.D
Secure desktop hardens the operating system of the machines you are using at the time secure desktop islaunched.
考题
单选题You have two stand-alone servers that run Windows Server 2003 Service Pack 2 (SP2). You assign the Secure Server (Require security) IPSec policy to both servers. From Server1, you notice that you cannot access resources on Server2.You need to ensure that you can access resources on Server2. All communications between Server1 and Server2 must be encrypted. What should you do?()A
On Server1, assign the Client (Respond only) IPSec policy. B
On Server2, assign the Server (Request Security) IPSec Policy. C
On Server1 and Server2, modify the authentication settings in the Secure Server (Require security) IPSec Policy. D
On Server1 and Server2, enable Master Key perfect forward secrecy (PFS) in the Secure Server (Require security) IPSec Policy.
考题
单选题You have a public computer that runs Windows XP Professional. All users log on to the computer by using the same user account. You log on to the computer by using the local administrator account and attempt to access a secure Web site. You discover that you have automatically logged on to the secure Web site by using the credential of another user. You need to connect to the secure Web site by using your own credentials. What should you do?()A
Run ipconfig /flushdns at the command prompt. B
Reset the password for the local administrator user account. C
From the Internet Options in Internet Explorer, clear the AutoComplete history.D
From the Internet Options in Internet Explorer, delete the Temporary Internet Files.
考题
单选题You are docking a vessel starboard side to with the assistance of two tugs.You are attempting to hold the vessel off by operating both tugs at right angles to the vessel and at full power.You must ensure that().A
steerageway is not taken offB
the bow doesn't close the dock firstC
the bow closes the dock firstD
the ship has no headway at the time
考题
单选题You are a network technician at Certpaper.com. Which description is correct when you have generated RSA keys on your Cisco router to prepare for secure device management?()A
You must then specify the general-purpose key size used for authentication with the crypto key generaters a general-keys modulus command.B
You must then zeroize the keys to reset secure shell before configuring other parameters.C
All vty ports are automatically enabled for SSH to provide secure management.D
The SSH protocol is automatically enabled.
考题
单选题How do you treat someone suffering from electrical shock after you secure the source?()A
check for respirationB
check for pulseC
treat for shockD
All of the above
考题
单选题You should make()your house or flat is secure.A
sureB
certainC
understandingD
knowledge
热门标签
最新试卷