Which two actions, when taken in combination, will result in an effective network security solution?()A、 develop a policy for securing the networkB、 monitor and test network activities for vulnerabilitiesC、 implement reflexive access listsD、 implement dyn

题目

Which two actions, when taken in combination, will result in an effective network security solution?()

  • A、 develop a policy for securing the network
  • B、 monitor and test network activities for vulnerabilities
  • C、 implement reflexive access lists
  • D、 implement dynamic access lists
  • E、 select and implement a single comprehensive virus protection program

相似考题
参考答案和解析
正确答案:A,B
更多“Which two actions,&#”相关问题
  • 第1题:

    Your wireless network is not listed in the Connect to a network window of your computer. You need to connect to your wireless network.Which two actions should you perform?()

    A.A

    B.B

    C.C

    D.D

    E.E


    参考答案:C, D

  • 第2题:

    The left wing party wants to keep these two actions ________.

    A.combination
    B.combining
    C.combined
    D.combine

    答案:C
    解析:
    题目意为“左翼希望将这两项行动结合起来。”句中two action与combine是被动关系,因此需填动词被动式,故选C。
      

  • 第3题:

    Which two firewall filter actions will terminate the processing and evaluation of a packet?()

    • A、permit
    • B、accept
    • C、deny
    • D、discard

    正确答案:B,D

  • 第4题:

    Which two of the following actions must an OSPF NSF-capable router execute after a supervisor engine switchover?() (Choose two.)

    • A、Re-learn the available OSPF neighbors with neighbor relationship restart
    • B、Send the graceful restart message
    • C、Re-acquire the link state database content for the network
    • D、Re-learn the available OSPF neighbors without neighbor relationship restart

    正确答案:C,D

  • 第5题:

    Firewall filters can perform which two actions?()

    • A、Log packet.
    • B、Count packet.
    • C、Set packet metric.
    • D、Decrement packet TTL.
    • E、Change destination IP address.

    正确答案:A,B

  • 第6题:

    多选题
    For which two actions can you use the TO_DATE function? ()
    A

    convert any date literal to a date

    B

    convert any numeric literal to a date

    C

    convert any date to a character literal

    D

    format 'January 10 1999' for input

    E

    format '10-JAN-99' to 'January 10 1999'


    正确答案: A,D
    解析: 暂无解析

  • 第7题:

    多选题
    Which two policy actions are considered flow control actions?()
    A

    reject

    B

    community add

    C

    next term

    D

    next policy


    正确答案: B,A
    解析: 暂无解析

  • 第8题:

    多选题
    You want to enable resumable space allocation at the instance level.Which two actions would enable resumable space allocation at the instance level? ()(Choose two.)
    A

    issuing the ALTER SYSTEM ENABLE RESUMABLE; statement

    B

    issuing the ALTER SESSION ENABLE RESUMABLE; statement

    C

    modifying the RESUMABLE_TIMEOUT initialization parameter to a nonzero value

    D

    issuing the ALTER SYSTEM SET RESUMABLE_TIMEOUT=; statement


    正确答案: A,B
    解析: 暂无解析

  • 第9题:

    多选题
    Firewall filter policers can perform which two actions?()
    A

    Set the next hop.

    B

    Discard packets.

    C

    Set loss priority.

    D

    Sample packet content.


    正确答案: A,B
    解析: 暂无解析

  • 第10题:

    多选题
    Which two actions protect a resource file from direct HTTP access within a web application?()
    A

    Placing it in the /secure directory

    B

    Placing it in the /WEB-INF directory

    C

    Placing it in the /META-INF/secure directory

    D

    Creating a  element within the deployment descriptor


    正确答案: C,B
    解析: 暂无解析

  • 第11题:

    You need to connect to your computer by using the Remote Desktop Connection client.Which two actions should you perform?()

    A.A

    B.B

    C.C

    D.D

    E.E


    参考答案:A, C

  • 第12题:

    You are designing a strategy to migrate user accounts. Which two actions should you perform? ()

    • A、Change the functional level.
    • B、Create an external trust relationship.
    • C、Run adprep to prepare the research.com forest.
    • D、Run adprep to prepare the research.com domain.

    正确答案:A,B

  • 第13题:

    Which two actions can be configured to allow traffic to traverse an interface when zone-based security isbeing employed?()

    • A、Pass
    • B、Flow
    • C、Allow
    • D、Inspect

    正确答案:A,D

  • 第14题:

    While planning the logical volume design of a new install, Companycom considered using a striped logical volume for performance. They want to be able to extend the logical volume in the future. Which of the following actions will provide this capability?()

    • A、Add additional logical volumes two at a time
    • B、Add additional physical volumes two at a time
    • C、Create a columned striped logical volume using -C option of mklv
    • D、Create an extendable striped logical volume using -E option of mklv

    正确答案:C

  • 第15题:

    多选题
    Which two actions, when taken in combination, will result in an effective network security solution?()
    A

    develop a policy for securing the network

    B

    monitor and test network activities for vulnerabilities

    C

    implement reflexive access lists

    D

    implement dynamic access lists

    E

    select and implement a single comprehensive virus protection program


    正确答案: A,B
    解析: 暂无解析

  • 第16题:

    多选题
    Which two security policy actions are valid?()
    A

    deny

    B

    discard

    C

    reject

    D

    close


    正确答案: B,D
    解析: 暂无解析

  • 第17题:

    多选题
    Which two actions are available in the GUI for creating location awareness rules?()
    A

    WINS server

    B

    DNS server

    C

    IP reachability

    D

    Resolve address


    正确答案: B,D
    解析: 暂无解析

  • 第18题:

    多选题
    You are designing a password management solution to meet the business and technical requirements.  Which two actions should you perform?hich two actions should you perform?()
    A

    Delegate the password management controls to the help desk staff.

    B

    Delegate the password management controls to the Domain Users group.

    C

    Configure the Default Domain Policy to enforce password expiration settings.

    D

    Configure the Default Domain Controller Policy to enforce password expiration settings.


    正确答案: A,C
    解析: 暂无解析

  • 第19题:

    多选题
    What are two valid actions for routing policy?()
    A

    discard

    B

    next policy

    C

    accept

    D

    ignore


    正确答案: C,B
    解析: 暂无解析