网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Where do you configure SCREEN options?()
A
zones on which an attack might arrive
B
zones you want to protect from attack
C
interfaces on which an attack might arrive
D
interfaces you want to protect from attack
参考答案
参考解析
解析:
暂无解析
更多 “单选题Where do you configure SCREEN options?()A zones on which an attack might arriveB zones you want to protect from attackC interfaces on which an attack might arriveD interfaces you want to protect from attack” 相关考题
考题
He __ of a city is the fight to protect it from those who attack itA、commandB、captureC、destroyD、defense
考题
Personal firewall is a technology that helps(66)intruders from accessing data on your PC via the Internet or another network, by keeping(67)data from entering or exiting your system.Hackers do not just target national security organizations for(68): They want your tax returns, network passwords, or bank account numbers. And you do not want the FBI kicking in your door because someone hijacked your PC to(69)in the latest denial-of-service attack on the Internet. Now that "always-on" broadband connections such as cable modems and digital subscriber line are becoming more popular, home users are at risk. Fortunately, you can protect your data. Firewalls can block(70)attacks and protect your PC from outside threats.A.allowB.preventC.inviteD.get
考题
You want to create an out-of-band management zone and assign the ge-0/0/0.0 interface to that zone.From the [edit] hierarchy, which command do you use to configure this assignment?()
A. set security zones management interfaces ge-0/0/0.0B. set zones functional-zone management interfaces ge-0/0/0.0C. set security zones functional-zone management interfaces ge-0/0/0.0D. set security zones functional-zone out-of-band interfaces ge-0/0/0.0
考题
Referring to the exhibit, you want to block HTTP access to Web-Server from the subnet where Mal-User is located. All other traffic should be permitted.Which firewall filter configuration do you use?()
A.B.C.D.
考题
You have a firewall filter applied in an inbound direction on a customer interface. You would like this filter to protect your network from a spoofed denial of service attack. Which action should be configured to accomplish your goal?()A. then rejectB. then discardC. then next filterD. then silent-drop
考题
You have a firewall filter containing two terms applied in an inbound direction on a customer interface.You would like this filter to protect your network from a spoofed denial of service attack. Which match criterion should be configured ito identify unwanted packets?()A. from source-portB. from source-addressC. from destination-addressD. from destination-port
考题
You will want two trees about ten feet apart, 选择
Youwillwanttwotreesabouttenfeetapart,from_____tosuspendyourtent.(A)there(C)which(B)them(D)where
考题
You have a firewall filter containing two terms applied in an inbound direction on a customer interface.You would like this filter to protect your network from a spoofed denial of service attack. Which match criterion should be configured ito identify unwanted packets?()A、from source-portB、from source-addressC、from destination-addressD、from destination-port
考题
You are the network consultant from passguide.com. Do you know what attacks are software based attacks that disable your computer and attack user by e-mail? ()A、ExecutableB、TrojanC、VirusD、Worm
考题
You have a firewall filter applied in an inbound direction on a customer interface. You would like this filter to protect your network from a spoofed denial of service attack. Which action should be configured to accomplish your goal?()A、then rejectB、then discardC、then next filterD、then silent-drop
考题
You want to allow all hosts on interface ge-0/0/0.0 to be able to ping the device’s ge-0/0/0.0 IP address.Where do you configure this functionality?()A、[edit interfaces]B、[edit security zones]C、[edit system services]D、[edit security interfaces]
考题
You have a firewall filter containing two terms applied in an inbound direction on a customer interface. You would like this filter to protect your network from a spoofed denial of service attack. What match criterion should be used in the first term of the filter?()A、Source TCP portB、Source IP addressC、Destination TCP portD、Destination IP address
考题
You want to create an out-of-band management zone and assign the ge-0/0/0.0 interface to that zone.From the [edit] hierarchy, which command do you use to configure this assignment?()A、set security zones management interfaces ge-0/0/0.0B、set zones functional-zone management interfaces ge-0/0/0.0C、set security zones functional-zone management interfaces ge-0/0/0.0D、set security zones functional-zone out-of-band interfaces ge-0/0/0.0
考题
Where do you configure SCREEN options?()A、zones on which an attack might arriveB、zones you want to protect from attackC、interfaces on which an attack might arriveD、interfaces you want to protect from attack
考题
Prior to applying SCREEN options to drop traffic, you want to determine how your configuration will affect traffic. Which mechanism would you configure to achieve this objective?()A、the log option for the particular SCREEN optionB、the permit option for the particular SCREEN optionC、the SCREEN option, because it does not drop traffic by defaultD、the alarm-without-drop option for the particular SCREEN option
考题
In which case would you use a FULL OUTER JOIN?()A、Both tables have NULL values.B、You want all unmatched data from one table.C、You want all matched data from both tables.D、You want all unmatched data from both tables.E、One of the tables has more data than the other.F、You want all matched and unmatched data from only one table.
考题
In which scenario will you use the Flashback Version Query feature?()A、 when you want to restore a table that has been dropped from the Recycle BinB、 when you want to identify the transaction ID of the transaction that deleted some important records from a tableC、 when you want to recover the schema of a dropped userD、when you want to restore a dropped tablespace
考题
You are the administrator of a network supporting Windows 2000 Professional computers. You want to configure Tom’s computer to run the Magnifier each time he logs on to his computer. Which two interfaces can you use?()A、Utility ManagerB、Accessibility WizardC、Accessibility Options icon in Control PanelD、Users and Passwords icon in Control Panel
考题
单选题You have a firewall filter containing two terms applied in an inbound direction on a customer interface.You would like this filter to protect your network from a spoofed denial of service attack. Which match criterion should be configured ito identify unwanted packets?()A
from source-portB
from source-addressC
from destination-addressD
from destination-port
考题
单选题You have a firewall filter containing two terms applied in an inbound direction on a customer interface. You would like this filter to protect your network from a spoofed denial of service attack. What match criterion should be used in the first term of the filter?()A
Source TCP portB
Source IP addressC
Destination TCP portD
Destination IP address
考题
单选题You have a firewall filter applied in an inbound direction on a customer interface. You would like this filter to protect your network from a spoofed denial of service attack. Which action should be configured to accomplish your goal?()A
then rejectB
then discardC
then next filterD
then silent-drop
考题
单选题Prior to applying SCREEN options to drop traffic, you want to determine how your configuration will affect traffic. Which mechanism would you configure to achieve this objective?()A
the log option for the particular SCREEN optionB
the permit option for the particular SCREEN optionC
the SCREEN option, because it does not drop traffic by defaultD
the alarm-without-drop option for the particular SCREEN option
考题
单选题You want to create an out-of-band management zone and assign the ge-0/0/0.0 interface to that zone.From the [edit] hierarchy, which command do you use to configure this assignment?()A
set security zones management interfaces ge-0/0/0.0B
set zones functional-zone management interfaces ge-0/0/0.0C
set security zones functional-zone management interfaces ge-0/0/0.0D
set security zones functional-zone out-of-band interfaces ge-0/0/0.0
考题
单选题You want to administer your PROD database from a remote host machine using a Web-enabled interface. Which Oracle tool would you use to accomplish this task efficiently without using command-line interfaces?()A
SQL*PlusB
iSQL*PlusC
Management ServerD
Management RepositoryE
Oracle Enterprise Manager 10g Database Control
考题
单选题You must configure a SCREEN option that would protect your device from a session table flood.Which configuration meets this requirement?()A
AB
BC
CD
D
考题
单选题In which scenario will you use the Flashback Version Query feature?()A
when you want to restore a table that has been dropped from the Recycle BinB
when you want to identify the transaction ID of the transaction that deleted some important records from a tableC
when you want to recover the schema of a dropped userD
when you want to restore a dropped tablespace
考题
单选题You want to allow all hosts on interface ge-0/0/0.0 to be able to ping the device’s ge-0/0/0.0 IP address.Where do you configure this functionality?()A
[edit interfaces]B
[edit security zones]C
[edit system services]D
[edit security interfaces]
热门标签
最新试卷