You have configured a UTM profile called Block-Spam, which has the appropriate antispam configuration to block undesired spam e-mails.Which configuration would protect an SMTP server in the dmz zone from spam originating in the untrust zone?()A、set securi

题目

You have configured a UTM profile called Block-Spam, which has the appropriate antispam configuration to block undesired spam e-mails.Which configuration would protect an SMTP server in the dmz zone from spam originating in the untrust zone?()

  • A、set security policies from-zone dmz to-zone untrust policy anti-spam then permit application- services utm-policy Block-Spam
  • B、set security policies from-zone untrust to-zone dmz policy anti-spam then permit application- services utm-policy Block-Spam
  • C、set security policies from-zone untrust to-zone dmz policy anti-spam then permit application- services anti-spam-policy
  • D、set security policies from-zone untrust to-zone dmz policy anti-spam then permit application- services Block-Spam

相似考题
更多“You have configured a UTM profil”相关问题
  • 第1题:

    You have just reinstalled a VIP 6-80 in a Cisco 7500 Series router. What must you do to bring up the port adapter interfaces?()

    • A、All interfaces are online by default once the VIP is up and running normally.
    • B、All interfaces must be manually brought online, even those previously configured.
    • C、The previous VIP configuration must be reloaded to bring interfaces online.
    • D、Any interfaces not previously configured must be manually configured and brought online.

    正确答案:D

  • 第2题:

    You are maintaining the SALES database for eSoft Corporation. You have not configured ASMM on the database. You want to know what size of the SGA will provide the best performance.  Which advisor would you use to determine the suitable size of the SGA?()

    • A、 SQL Tuning Advisor
    • B、 Undo Advisor
    • C、 ADDM
    • D、 Memory Advisor

    正确答案:D

  • 第3题:

    You work as a database administrator for Supportcenter.cn. In your production database, the size of Database Buffer Cache needs to be increased immediately for the current as well as future instances of the database. The Oracle instance has been configured to accommodate any changes in the size of the memory structures. At this is production database, you want to accomplish this task with no impact on the user’s connections. Which activity must you have completed before accomplishing this task?()

    • A、You must have started the database instance in restricted mode.
    • B、You must have started the database instance inNORMALmode.
    • C、You must have started the database instance with server parameter file.
    • D、You must have started the database instance but must not have mounted.
    • E、You must have started the database instance but must not have opened.

    正确答案:C

  • 第4题:

    You are designing a remote administration solution that meets business requirements. You need to specify client or server software that will be required. What should you do?()

    • A、Ensure that all client computers have a graphical Telnet client installed
    • B、Ensure that all client computers have the Remote Desktop Connection client software installed
    • C、Ensure that all server computers have RCONSOLE installed and that it is configured to start automatically
    • D、Ensure that all server computers have Remote Administration (HTML) installed

    正确答案:B

  • 第5题:

    You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You are in charge of a server that runs Windows Server 2008. The Web Server(IIS) server role and the FTP Publishing Service role service are installed on the server. You have a newFTP site added to the server. You have to make sure that the new FTP site is available. In order to makesure of this,what action should you perform?()

    • A、In order to make sure of this, the iisreset command should be run on the server.
    • B、In order to make sure of this, a host header file should be configured in the default Web site properties.
    • C、In order to make sure of this, an alternate IP address should be configured in the default Web siteproperties.
    • D、In order to make sure of this, an alternate TCP port should be configured in the FTP site properties.
    • E、In order to make sure of this, an alternate IP address should be configured in the FTP site properties.

    正确答案:D,E

  • 第6题:

    单选题
    You have configured a UTM profile called Block-Spam, which has the appropriate antispam configuration to block undesired spam e-mails.Which configuration would protect an SMTP server in the dmz zone from spam originating in the untrust zone?()
    A

    set security policies from-zone dmz to-zone untrust policy anti-spam then permit application- services utm-policy Block-Spam

    B

    set security policies from-zone untrust to-zone dmz policy anti-spam then permit application- services utm-policy Block-Spam

    C

    set security policies from-zone untrust to-zone dmz policy anti-spam then permit application- services anti-spam-policy

    D

    set security policies from-zone untrust to-zone dmz policy anti-spam then permit application- services Block-Spam


    正确答案: B
    解析: 暂无解析

  • 第7题:

    单选题
    You are managing an Oracle Database 11g database. You want to take the backup of MULT_DATA, a big filetablespace of size 100 TB on tape drive, but you have tapedrives of only 10 GB each.Which method would accomplish the task quickly and efficiently?()
    A

    parallel image copy backup

    B

    backup with MAXPIECESIZE configured for the channel

    C

    parallel backup with MAXPIECESIZE configured for the channel

    D

    intrafile parallel backup


    正确答案: C
    解析: 暂无解析

  • 第8题:

    单选题
    You are maintaining the SALES database for eSoft Corporation. You have not configured ASMM on the database. You want to know what size of the SGA will provide the best performance.  Which advisor would you use to determine the suitable size of the SGA?()
    A

     SQL Tuning Advisor

    B

     Undo Advisor

    C

     ADDM

    D

     Memory Advisor


    正确答案: C
    解析: 暂无解析

  • 第9题:

    单选题
    Which command do you use to display the status of an antivirus database update?()
    A

    show security utm anti-virus status

    B

    show security anti-virus database status

    C

    show security utm anti-virus database

    D

    show security utm anti-virus update


    正确答案: D
    解析: 暂无解析

  • 第10题:

    单选题
    You have configured the flash recovery area to store online redo log files, control files, archived redo logs and RMAN backups. Which of the following files can you successfully delete from the flash recovery area if you want to reclaim the space within it?()
    A

     multiplexed control files

    B

     RMAN obsolete backups

    C

     multiplexed online redo log files

    D

     archived redo logs that have not been copied to tape


    正确答案: D
    解析: 暂无解析

  • 第11题:

    单选题
    You have an Exchange Server 2010 organization with mailbox server in a lab environment.The lab is not connected to internet.You need to verify autodiscover is configured correctly for client connectivity.What will you use?()
    A

    Best practice analyzer

    B

    Remote connectivity analyzer

    C

    Test-MAPIconnectivity cmdlet

    D

    Test-outlookWeb services cmdlet


    正确答案: C
    解析: 暂无解析

  • 第12题:

    单选题
    You work as a network engineer at TestKing.com. TestKing users have noticed extremely slow network performance, intermittent connectivity, and connection loss. After entering the show interfaces command, you notice that the Ethernet interface is configured as 100 Mbps full-duplex and that there is evidence of late collisions. What could be the cause of this problem?()
    A

    duplex mismatch

    B

    a routing loop

    C

    trunking mode mismatch

    D

    improperly configured root bridge

    E

    improperly configured static VLAN


    正确答案: C
    解析: 暂无解析

  • 第13题:

    You have a firewall filter applied in an inbound direction on a customer interface. You would like this filter to protect your network from a spoofed denial of service attack. Which action should be configured to accomplish your goal?()

    • A、then reject
    • B、then discard
    • C、then next filter
    • D、then silent-drop

    正确答案:B

  • 第14题:

    You have configured the flash recovery area to store online redo log files, control files, archived redo logs and RMAN backups. Which of the following files can you successfully delete from the flash recovery area if you want to reclaim the space within it?()

    • A、 multiplexed control files
    • B、 RMAN obsolete backups
    • C、 multiplexed online redo log files
    • D、 archived redo logs that have not been copied to tape

    正确答案:B

  • 第15题:

    You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single site named KingSite1.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging  solution.Company.com has recently configured the mailbox server as members of a database availability group (DAG) with a public folder database. During the course of the business week you receive instruction from Company.com to create a new Active Directory site and install Exchange server in the site whilst ensuring the public folders are stored on servers in both sites. What should you do?()

    • A、You should consider having clustered continuous replication (CCR) configured on two servers in the new site.You should then have the replication settings for all public folder databases modified.
    • B、You should consider having the standby continuous replication (SCR) configured on a server in the new site.You should then have the Enable-StorageGroupCopy cmdlet run from a server in the new site.
    • C、You should consider having a public folder database created on a server in the new site.You should then have the replication settings for all public folders modified.
    • D、You should consider having a public folder database created on a server in the new site.You should then have the set-DatabaseAvailabilityGroup cmdlet run from a server in the new site.

    正确答案:C

  • 第16题:

    You have a Microsoft Internet Security and Accelerator (ISA) 2006 server that provides all Internet accessfor your company.  You have two Mailbox servers configured in a database availability group (DAG), two Client Accessservers, and two Hub Transport servers.  You need to recommend changes to the environment to ensure that users can access Outlook Web App(OWA) from the Internet if any single server fails.  What should you recommend?()

    • A、Configure a Client Access server array.
    • B、Deploy a second ISA server and create an ISA server array.
    • C、Implement Windows Network Load Balancing for the Client Access servers.
    • D、Deploy two Edge Transport servers that are configured to use EdgeSync synchronization.

    正确答案:B

  • 第17题:

    单选题
    You have just configured the network interface on systemA . The following information is  From systemB, you test the network connectivity by sending ICMP ECHO_REQUEST packets to  systemA. The following message is displayed: no answer from systemA  What is most likely the problem?()
    A

     The interface is not plumbed.

    B

     The interface is not configured.

    C

     The interface does not have valid routes configured.

    D

     The interface is not marked as


    正确答案: B
    解析: 暂无解析

  • 第18题:

    多选题
    You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You are in charge of a server that runs Windows Server 2008. The Web Server(IIS) server role and the FTP Publishing Service role service are installed on the server. You have a newFTP site added to the server. You have to make sure that the new FTP site is available. In order to makesure of this,what action should you perform?()
    A

    In order to make sure of this, the iisreset command should be run on the server.

    B

    In order to make sure of this, a host header file should be configured in the default Web site properties.

    C

    In order to make sure of this, an alternate IP address should be configured in the default Web siteproperties.

    D

    In order to make sure of this, an alternate TCP port should be configured in the FTP site properties.

    E

    In order to make sure of this, an alternate IP address should be configured in the FTP site properties.


    正确答案: B,D
    解析: 暂无解析

  • 第19题:

    单选题
    You are managing an Oracle Database 11g database. You want to take the backup of MULT_DATA, a big file tablespace of size 100 TB on tape drive, but you have tapedrives of only 10 GB each.  Which method would accomplish the task quickly and efficiently?()
    A

     parallel image copy backup

    B

     backup with MAXPIECESIZE configured for the channel

    C

     parallel backup with MAXPIECESIZE configured for the channe

    D

     intrafile parallel backup


    正确答案: B
    解析: 暂无解析

  • 第20题:

    单选题
    You are maintaining the database of a company. The listener process, listener1, is configured for remote access. You have issued the following command:   LSNRCTL>STATUS listener1   Which information will NOT be displayed when you issue the above command?()
    A

     whether the password is set in the listener or a file or not

    B

     the number of client connections the service handler has refused

    C

     the information will be displayed whether the instance can accept connections or not

    D

     the protocol addresses on which the listener is configured to listen


    正确答案: D
    解析: 暂无解析

  • 第21题:

    单选题
    You have a wireless access point that is configured to use Advanced Encryption Standard (AES) security. Apre-shared key is not configured on the wireless access point. You need to connect a computer that runsWindows 7 to the wireless access point.  Which security setting should you select for the wirelessconnection?()
    A

    802.1x

    B

    WPA-Personal

    C

    WPA2-Enterprise

    D

    WPA2-Personal


    正确答案: D
    解析: 暂无解析

  • 第22题:

    单选题
    You have finished physically installing an access point on the ceiling at your officE.At a minimum, which paramenter must be configured on the access point in order to allow a wireless client to operate on it?()
    A

    AES

    B

    PSK

    C

    SSID

    D

    TKIP

    E

    WEP


    正确答案: D
    解析: 暂无解析

  • 第23题:

    单选题
    You have configured the system to purge mailboxes after 8 days of being deleted. You need to receive a notification when the mailboxes are purged. What should you do?()
    A

    Start a data collector

    B

    Start an event viewer subscription

    C

    Add a task to the application event log

    D

    Modify the properties of the mailbox database


    正确答案: D
    解析: 暂无解析

  • 第24题:

    单选题
    You work as an Exchange Administrator for TechWorld Inc.The company has a Windows 2008 Active Directory-based contains an Exchange Server 2010 organization.You have deployed Hub Transport server, Client Access server, Unti Mailbox server in the messaging organization.You have not deployed any Edge Transport server in the messaging c following servers can be used to receive and send mail traffic to the Internet?()
    A

    Server configured with the Client Access server role.

    B

    Server configured with the Hub Transport role.

    C

    Server configured with the Mailbox role.

    D

    Server configured with the Unified Messaging server role.


    正确答案: C
    解析: 暂无解析