网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
What is the least secure mode of enabling an IMAP server for Cisco Unity Express?()
A

SSL 

B

VPN 

C

Mixed 

D

SMTP 

E

HTTPS

F

Non-SSL


参考答案

参考解析
解析: 暂无解析
更多 “单选题What is the least secure mode of enabling an IMAP server for Cisco Unity Express?()A SSL B VPN C Mixed D SMTP E HTTPSF Non-SSL” 相关考题
考题 Using FTP passive mode, after the client opens thecommand channel (port 21) to the FTP server and requests passive mode, what will be the next step? ()A、 The FTP server sends back an acknowledgment (ACK) to the clientB、 The FTP server allocates a port touse for the data channel and transmit that port number to the clientC、 The FTP server opens the data channel to the client using the port number indicated by the clientD、 The FTP client opens the data channel to the FTP server on Port 20E、 The FTP client opens the datachannel to the FTP server on Port 21

考题 You need to deploy a WSUS server in the branch office that meets the company’s technical requirements.   What should you deploy?()A、an autonomous WSUS server that is configured to download updates from Microsoft UpdateB、an autonomous WSUS server that is configured to download updates from the WSUS server in the main officeC、a WSUS server running in replica mode that is configured to download updates from Microsoft UpdateD、a WSUS server running in replica mode that is configured to download updates from the WSUS server in the main office

考题 If a certificate authority trustpoint is not configured when enabling HTTPS and the remote HTTPS server requires client authentication, connections to the secure HTTP client will fail. Which command must be enabled for correct operation?()A、ip http client secure-ciphersuite 3des-ede-cbc-shaB、ip https max-connections 10C、ip http timeout-policy idle 30 life 120 requests 100D、ip http client secure-trustpoint trustpoint-name

考题 What is the least secure mode of enabling an IMAP server for Cisco Unity Express?()A、SSL B、VPN C、Mixed D、SMTP E、HTTPSF、Non-SSL

考题 A network administrator is explaining VTP configuration to a new technician. What should the network administrator tell the new technician about VTP configuration?()A、A switch in the VTP client mode cannot update its local VLAN database.B、A trunk link must be configured between the switches to forward VTP updates.C、A switch in the VTP server mode can update a switch in the VTP transparent mode.D、A switch in the VTP transparent mode will forward updates that it receives to other switches.E、A switch in the VTP server mode only updates switches in the VTP client mode that have a higher VTP revision number.F、A switch in the VTP server mode will update switches in the VTP client mode regardless of the configured VTP domain membership.

考题 What are three methods to reduce Mysql server exposure to remote connections?()A、Setting — skip-networking when remote connections are not requiredB、Using the sql_mode=STRICT_SECURE after connections are established for encrypted communicationsC、Setting specific GRANT privilege to limit remote authenticationD、Setting – mysql_secure_configuration to enable paranoid modeE、Using SSL when transporting data over remote networks

考题 What does the term application partitioning refer to?()A、The feature of a forms application enabling it to run both in client-server mode and on the Web. B、Storing PL/SQL program units between the Oracle server and the application to make optimal use of available resources. C、The nature of a three-tier architecture, where the form module and processing software reside on an application server. D、The feature of a forms application that is able to use Ethernet, twisted pair, and wireless data connections.

考题 What are the prerequisites for enabling Flashback Database? ()A、 The database must be started in the MOUNT EXCLUSIVE state.B、 The database must have multiplexed control files.C、 The database must be opened by using a text-based parameter file instead of a server parameter file (SPFILE).D、 The database must be in ARCHIVELOG mode.E、 The database must be in the NOMOUNT state.F、 The database must be opened in RESTRICTED mode.

考题 You need to design a solution so that users in the retail outlets can access their e-mail on the Exchange 2003 servers. What should you do?()A、Install an Exchange 2003 server infrastructure that will support POP3 connections from the Internet. Install a user certificate on each client computer at the retail outlets. Instruct the users to sign and encrypt all outbound e-mail messagesB、Install an Exchange 2003 server infrastructure that will support encrypted POP3 connections from the Internet. Configure the client computer in the retail outlets to use an encrypted connection to the POP3 serverC、Install an Exchange 2003 server infrastructure that will support encrypted Microsoft Outlook Web Access connections from the Internet. Instruct all users at the retail outlets to access their e-mail by using Microsoft Internet Explorer 5.5 or later to connect to the secure Microsoft Outlook Web Access serverD、Install an Exchange 2003 server infrastructure that will support encrypted IMAP4 connections from the Internet. Configure the client computers in the retail outlets to use an encrypted connection to the IMAP4 server

考题 You have two stand-alone servers that run Windows Server 2003 Service Pack 2 (SP2). You assign the Secure Server (Require security) IPSec policy to both servers. From Server1, you notice that you cannot access resources on Server2. You need to ensure that you can access resources on Server2. All communications between Server1 and Server2 must be encrypted.  What should you do?()A、On Server1, assign the Client (Respond only) IPSec policy.B、On Server2, assign the Server (Request Security) IPSec Policy.C、On Server1 and Server2, modify the authentication settings in the Secure Server (Require security) IPSec Policy.D、On Server1 and Server2, enable Master Key perfect forward secrecy (PFS) in the Secure Server (Require security) IPSec Policy.

考题 You plan to implement a WSUS server in a branch office.You need to recommend a solution for deploying the WSUS server that meets the company's technicalequirements.   What should you include in the recommendation?()A、an autonomous WSUS server that is configured to download updates from Microsoft UpdateB、an autonomous WSUS server that is configured to download updates from the WSUS server in the main officeC、a WSUS server running in replica mode that is configured to download updates from Microsoft UpdateD、a WSUS server running in replica mode that is configured to download updates from the WSUS server  in the main office

考题 You have a Hub Transport server named Server1 that runs Exchange Server 2010.All Exchange users use IMAP4 to retrieve e-mail.You need to ensure that all users can send e-mail by using SMTP.Your solution must not require any modifications to the default connectors. What should you do?()A、Configure IMAP4 clients to send e-mail by using TCP port 25.B、Configure IMAP4 clients to send e-mail by using TCP port 587.C、Create a new Send connector and configure the connector to use port 110.D、Create a new Send connector and configure the connector to use port 143.

考题 You have an Exchange Server 2010 server that has IMAP4 enabled.All users connect to the Exchange server by using an IMAP4 client.You need to verify whether users can send e-mail to the Internet by using the Exchange server. What should you do?()A、From the server, run the Test-ImapConnectivity cmdlet.B、From the server, run the Test-OutlookConnectivity cmdlet.C、From a client, attempt a connection to TCP port 143 by using Telnet.D、From a client, attempt a connection to TCP port 587 by using Telnet.

考题 You need to design a strategy for remote client computer access that meets all business and technical requirements. What should you do?()A、Configure the HTTP virtual server on the Exchange front-end server to require a secure connection. Instruct the sales personnel to use Microsoft Outlook Web Access to connect to the Exchange front-end serverB、Configure the back-end Exchange servers to use static ports for RPC connections. Open the required ports on the firewall. Install Microsoft Outlook 2003 on the portable computers and configure it to connect to the Exchange back-end server using a MAPI connectionC、Configure the Exchange front-end server to require secure connections from IMAP4 client computers. Install Microsoft Outlook 2003 on the portable computers and configure it to use a secure IMAP4 connectionD、Configure the Exchange servers to support RPC over HTTPS. Install Microsoft outlook 2003 on the portable computers and configure it to use RPC over HTTPS

考题 单选题What does the term application partitioning refer to?()A The feature of a forms application enabling it to run both in client-server mode and on the Web. B Storing PL/SQL program units between the Oracle server and the application to make optimal use of available resources. C The nature of a three-tier architecture, where the form module and processing software reside on an application server. D The feature of a forms application that is able to use Ethernet, twisted pair, and wireless data connections.

考题 多选题What are three methods to reduce Mysql server exposure to remote connections?()ASetting — skip-networking when remote connections are not requiredBUsing the sql_mode=STRICT_SECURE after connections are established for encrypted communicationsCSetting specific GRANT privilege to limit remote authenticationDSetting – mysql_secure_configuration to enable paranoid modeEUsing SSL when transporting data over remote networks

考题 单选题You need to deploy a read-only domain controller (RODC) that runs Windows Server 2008. What is the minimal forest functional level that you should use()A Windows Server 2008B Windows Server 2003 Interim modeC Windows 2000 Native modeD Windows Server 2003 Native mode

考题 单选题You plan to implement a WSUS server in a branch office.You need to recommend a solution for deploying the WSUS server that meets the company's technicalequirements.   What should you include in the recommendation?()A an autonomous WSUS server that is configured to download updates from Microsoft UpdateB an autonomous WSUS server that is configured to download updates from the WSUS server in the main officeC a WSUS server running in replica mode that is configured to download updates from Microsoft UpdateD a WSUS server running in replica mode that is configured to download updates from the WSUS server  in the main office

考题 单选题What is the least secure mode of enabling an IMAP server for Cisco Unity Express?()A SSL B VPN C Mixed D SMTP E HTTPSF Non-SSL

考题 多选题What are the prerequisites for enabling Flashback Database? ()AThe database must be started in the MOUNT EXCLUSIVE state.BThe database must have multiplexed control files.CThe database must be opened by using a text-based parameter file instead of a server parameter file (SPFILE).DThe database must be in ARCHIVELOG mode.EThe database must be in the NOMOUNT state.FThe database must be opened in RESTRICTED mode.

考题 单选题You have two stand-alone servers that run Windows Server 2003 Service Pack 2 (SP2). You assign the Secure Server (Require security) IPSec policy to both servers. From Server1, you notice that you cannot access resources on Server2.You need to ensure that you can access resources on Server2. All communications between Server1 and Server2 must be encrypted. What should you do?()A On Server1, assign the Client (Respond only) IPSec policy. B On Server2, assign the Server (Request Security) IPSec Policy. C On Server1 and Server2, modify the authentication settings in the Secure Server (Require security) IPSec Policy. D On Server1 and Server2, enable Master Key perfect forward secrecy (PFS) in the Secure Server (Require security) IPSec Policy. 

考题 单选题A new employee needs access to a SQL Server 2005 database that is located on a server named SQL1. You create a login named ajones by using the following Transact-SQL statement. CREATE LOGIN ajones WITH PASSWORD = ’SQLServer$1’ The new employee reports that when he logs in, he receives the following error message: "Login failed. The user is not associated with a trusted SQL Server connection." You need to resolve the error and allow the new employee to gain access to SQL1. What should you do?()A Change the SQL Server security mode from Windows Authentication mode to SQL Server and Windows authentication mode.B Change the SQL Server security mode from SQL Server and Windows Authentication mode to Windows authentication mode.C Ensure that the login name is created with square brackets ([]).D Give the login access to a specific database by using the CREATE USER Transact-SQL statement.

考题 多选题What are two important guidelines to follow when implementing VTP?()ACDPmust be enabled on all switches in theVTP management domain.BAll switches in the VTPdomain must run the same version of VTP.CWhen using secure mode VTP, only configure management domain passwords onVTP servers.DEnablingVTP pruning on a server willenable the feature for the entire management domain.EUse of theVTPmulti-domain feature should be restricted to migration and temporary implementation.

考题 单选题You develop a Windows Communication Foundation (WCF) service that uses basic authentication for client credentials. This service is currently configured to use message security. The service is hosted on a server in workgroup mode.Users report that their passwords are stolen when they use public computers.You need to ensure that messages are secure and users are authenticated.You prevent the service from being called over HTTP through Microsoft Internet Information Services (IIS) configuration. What should you do next?()A Use the transport security mode and specify None for transport client credential type.B Use the transportWithMessageCredential security mode and specify Basic for the transport client credential type.C Use the message security mode and specify Basic for the transport client credential type.D Use the transportWithMessageCredential security mode and specify None for the transport client credential type.

考题 单选题You need to deploy a WSUS server in the branch office that meets the company’s technical requirements.   What should you deploy?()A an autonomous WSUS server that is configured to download updates from Microsoft UpdateB an autonomous WSUS server that is configured to download updates from the WSUS server in the main officeC a WSUS server running in replica mode that is configured to download updates from Microsoft UpdateD a WSUS server running in replica mode that is configured to download updates from the WSUS server in the main office

考题 单选题Using FTP passive mode, after the client opens thecommand channel (port 21) to the FTP server and requests passive mode, what will be the next step? ()A  The FTP server sends back an acknowledgment (ACK) to the clientB  The FTP server allocates a port touse for the data channel and transmit that port number to the clientC  The FTP server opens the data channel to the client using the port number indicated by the clientD  The FTP client opens the data channel to the FTP server on Port 20E  The FTP client opens the datachannel to the FTP server on Port 21

考题 单选题You need to recommend an update management strategy for the Chicago campus that meets the  company’s technical requirements. What should you recommend?()A Deploy a WSUS server in replica mode,and then configure the servers reporting rollup settingsB Deploy a WSUS server in replica mode,and then configure the serverse-mail notification settings.C Deploy a WSUS server in autonomous mode,and then configure the servers reporting rollup settingsD Deploy a WSUS server in autonomous mode,and then configure the servers e-mail notification  settings.

考题 多选题You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003.The network contains a Web server named Server1 that runs IIS 6.0 and hosts a secure Web site. The Web site is accessible from the intranet, as well as from the Internet. All users must authenticate when they connect to Server1. All users on the Internet must use a secure protocol to connect to the Web site. Users on the intranet do not need to use a secure protocol.You need verify that all users are using a secure protocol to connect to Server1 from the Internet.   What are two possible ways to achieve this goal?()AMonitor the events in the application log on Server1.BMonitor the events in the security log on Server1.CMonitor the Web server connections on Server1 by using a performance log.DMonitor network traffic to Server1 by using Network Monitor.EMonitor the IIS logs on Server1.