网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

Which of the following security features are enabled by default after creating an instance?()

  • A、Password Invalidation
  • B、Login Timeout
  • C、Cross Site Scripting Protection
  • D、Access Logging

参考答案

更多 “Which of the following security features are enabled by default after creating an instance?()A、Password InvalidationB、Login TimeoutC、Cross Site Scripting ProtectionD、Access Logging” 相关考题
考题 You are working on an existing Web site. You need to secure the Web site by redirecting all users to the logon page, Login.aspx. After logging on, users must be sent back to the page that they originally requested.Which code segment should you use?()A.B.C.D.

考题 Which of the following is enabled in the BIOS that will prompt a user to enter their password every time the laptop performs a POST?() A. Power User accessB. Power on passwordC. Administrative passwordD. User profile access

考题 This graphic shows the results of an attempt to open a Telnet connection to router ACCESS1 from router Remote27. Which of the following command sequences will correct this problem? () A. ACCESS1(config)# line console 0 ACCESS1(config-line)# password ciscoB. Remote27(config)# line console 0 Remote27(config-line)# login Remote27(config-line)# password ciscoC. ACCESS1(config)# line vty 0 4 ACCESS1(config-line)# login ACCESS1(config-line)# password ciscoD. Remote27(config)# line vty 0 4 Remote27(config-line)# login Remote27(config-line)# password ciscoE. ACCESS1(config)# enable password ciscoF. Remote27(config)# enable password cisco

考题 After creating backups of critical system and user data, which of the following is the BEST location to store the backups?()A、In the supply closet so anyone can access them if neededB、Near the server for easy access to restore filesC、Locked in a cabinet in the IT Manager’s officeD、At a secure off-site storage facility

考题 Which of the following is enabled in the BIOS that will prompt a user to enter their password every time the laptop performs a POST?()A、Power User accessB、Power on passwordC、Administrative passwordD、User profile access

考题 Which of the following is NOT a security feature relating to user accounts?()A、Some commands can be password protected requiring logged in customers to re-enter their password.B、A user account can be disabled automatically, after a specified number of invalid login attempts.C、An account can have multiple valid passwords at the same time, any of which can be used to access the account.D、The password policy feature can allow the system to require passwords to include a minimum number of numeric characters.E、Logged in customers can be logged off of the system after a specified period of inactivity.

考题 In computer security, AAA stands for authentication, authorization and accounting. Which optionabout the AAA authentication enable default group radius enable command is correct?()A、If the radius server returns an error, the enable password will be usedB、If the radius server returns a ’failed’ message, the enable password will be usedC、The command login authentication group will associate the AM authentication to a specifiedinterfaceD、If the group database is unavailable, the radius server will be used

考题 An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot.  Which of the following is the FIRST thing the administrator should check?()A、 Default gatewayB、 The ports on the switchC、 Port security on the servers switch portD、 Ethernet cable

考题 An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot. Which of the following is the FIRST thing the administrator should check?()A、Default gatewayB、The ports on the switchC、Port security on the server's switch portD、Ethernet cable

考题 Which of the following statements best describes error logging?()A、Syslogd creates error log entries in the system error log. B、The default error log is stored in /var/adm/ras/error.log. C、All entries in the error log are related to software problems. D、Error logging is automatically enabled during system initialization.

考题 A System p administrator needs to set the default password length for all users to six characters.  Which of the following files needs to be edited to accomplish this ()A、/etc/security/limitsB、/etc/security/mkuser.sysC、/etc/security/privD、/etc/security/user

考题 The root id is set so that direct login is disabled.  Information must be reviewed relating to when root access was obtained.  In which of the following files is this information located?()A、 /var/adm/sulog B、 /var/adm/wtmp C、 /etc/security/user D、 /etc/security/failedlogin

考题 Company.com has encountered a problem on the HMC, which requires access to the root shell on the HMC. Which of the following is necessary to access the root userid on the HMC?()A、Enable remote commands on the HMC Configuration menu,then use ssh to login to theHMC,enter su - rootB、Login to the HMC as hscpe and run pesh,using a temporary password from IBM Support,afterward, enter su - rootC、Login to the HMC as hscroot,then run pesh,using a temporary password from IBM Support, afterward,enter su - rootD、Enable remote commands on the HMC Configuration menu,then telnet in as hscroot,entersu - root

考题 Which of the following instance configuration information does not come with a default value, and must be provided by the installer?()A、Instance nameB、Merchant keyC、Database nameD、Site Admin IDE、Security port numbers for the administration tools

考题 Which statement is true when logging in using the WebUI? ()A、Port 80 for HTTP is enabled by default.B、Port 443 for HTTPS is enabled by default.C、Port 8090 for HTTP is enabled by default.D、Both HTTP and HTTPS are enabled using their standard port values.

考题 Examine the command: SQL ALTER USER skd ACCOUNT LOCK; Which two statements are true after the command is executed()A、The SKD user cannot log in to the database instance.B、The objects owned by the SKD user are not accessible to any user.C、The other users can access the objects owned by the SKD user, on which they have access.D、The password for the SKD user expires and the user is forced to change the password at the next log in

考题 Your database initialization parameter file has the following entry:   SEC_MAX_FAILED_LOGIN_ATTEMPTS=3   Which statement is true regarding this setting?()A、 It drops the connection after the specified number of login attempts fail for any user.B、 It is enforced only if the password profile is enabled for the user.C、 It locks the user account after the specified number of attempts.D、 It drops the connection after the specified number of login attempts fail only for users who have the SYSDBA privilege.

考题 Examine the command: SQL ALTER USER skd ACCOUNT LOCK; Which two statements are true after the command is executed()A、The SKD user cannot log in to the database instance.B、The objects owned by the SKD user are not accessible to any user.C、The other users can access the objects owned by the SKD user, on which they have access.D、The password for the SKD user expires and the user is forced to change the password at the next log in.

考题 Which statement is true regarding this setting?()A、It drops the connection after the specified number of login attempts fail for any user.B、It is enforced only if the password profile is enabled for the user. C、It locks the user account after the specified number of attempts. D、It drops the connection after the specified number of login attempts fail only for users who have the SYSDBA privilege.

考题 You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of two SQL Server 2008 instance. The two instances are respectively named InstanceA and InstanceB. There is a database named Dworks on InstanceA. You move the Dworks database to InstanceB. A user use a SQL Server login named Mary to access the database on InstanceA with the password "Tk@87#34". On InstanceB, you create the same SQL Server login. The user tries to use the SQL Server login Mark to access the Dworks database on InstanceB. But the user gets an error message, according to the indication of the message, the access to the Dworks database has been denied. You must make sure that the user can access the Dworks database on InstanceB successfully.  So on InstanceB, which Transact-SQL statements should you execute?()  A、USE AdventureWorks;ALTER USER Mary WITH LOGIN = Mary; B、USE AdventureWorks;ALTER LOGIN Mary ENABLE; C、USE AdventureWorks;ALTER LOGIN Mary WITH PASSWORD = "Tk@87#34" UNLOCK; D、USE AdventureWorks;ALTER LOGIN Mary WITH DEFAULT_DATABASE = AdventureWorks;

考题 单选题After creating backups of critical system and user data, which of the following is the BEST location to store the backups?()A In the supply closet so anyone can access them if neededB Near the server for easy access to restore filesC Locked in a cabinet in the IT Manager’s officeD At a secure off-site storage facility

考题 单选题A System p administrator needs to set the default password length for all users to six characters.  Which of the following files needs to be edited to accomplish this ()A /etc/security/limitsB /etc/security/mkuser.sysC /etc/security/privD /etc/security/user

考题 单选题You are the administrator of a Microsoft Windows Server 2003 computer named SQL1. SQL1 runs SQL Server 2005 and is a member of a Microsoft Active Directory domain named Contoso.com. The domain is configured with all of the default settings. Several members of the information security team have requested access to SQL1. The information security team uses the Microsoft Windows XP Professional, Linux, and Macintosh operating systems to perform vulnerability assessments. The information security team members ask you to create two new logon accounts for their use. They would like the logon accounts to have the following user names and passwords: User name/password for first account: pentest/P@ssw0rdUser name/password for second account: hacktest/password You need to provide the information security team with the requested access to SQL1.  Which Transact-SQL script should you use?()A CREATE LOGIN pentestWITH PASSWORD = 'P@ssw0rd' CREATE LOGIN hacktestWITH PASSWORD = 'password'B CREATE LOGIN pentestWITH PASSWORD = 'P@ssw0rd' CREATE LOGIN hacktestWITH PASSWORD = 'password',CHECK_POLICY = OFFC CREATE LOGIN pentestWITH PASSWORD = 'P@ssw0rd' CREATE LOGIN hacktestWITH PASSWORD = 'password'[HASHED]D CREATE LOGIN [CONTOSO/pentest]FROM WINDOWS CREATE LOGIN [CONTOSO/hacktest]FROM WINDOWS 

考题 单选题Which statement is true regarding this setting?()A It drops the connection after the specified number of login attempts fail for any user.B It is enforced only if the password profile is enabled for the user. C It locks the user account after the specified number of attempts. D It drops the connection after the specified number of login attempts fail only for users who have the SYSDBA privilege.

考题 单选题An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot.  Which of the following is the FIRST thing the administrator should check?()A  Default gatewayB  The ports on the switchC  Port security on the servers switch portD  Ethernet cable

考题 单选题Which of the following security features are enabled by default after creating an instance?()A Password InvalidationB Login TimeoutC Cross Site Scripting ProtectionD Access Logging

考题 单选题Which of the following statements best describes error logging?()A Syslogd creates error log entries in the system error log. B The default error log is stored in /var/adm/ras/error.log. C All entries in the error log are related to software problems. D Error logging is automatically enabled during system initialization.