多选题Which two statements apply to policy scheduling?() (Choose two.)AAn individual policy can have only one scheduler applied.BYou must manually configure system-time updates.CMultiple policies can use the same scheduler.DPolicies that do not have schedule

题目
多选题
Which two statements apply to policy scheduling?() (Choose two.)
A

An individual policy can have only one scheduler applied.

B

You must manually configure system-time updates.

C

Multiple policies can use the same scheduler.

D

Policies that do not have schedulers are not active.


相似考题
更多“多选题Which two statements apply to policy scheduling?() (Choose two.)AAn individual policy can have only one scheduler applied.BYou must manually configure system-time updates.CMultiple policies can use the same scheduler.DPolicies that do not have schedule”相关问题
  • 第1题:

    Which two statements apply to policy scheduling?() (Choose two.)

    A. An individual policy can have only one scheduler applied.

    B. You must manually configure system-time updates.

    C. Multiple policies can use the same scheduler.

    D. Policies that do not have schedulers are not active.


    参考答案:A, C

  • 第2题:

    Your corporate security policy requires that a user performing attacks must have limited network access and activities until an administrator can investigate.In the admin GUI, which sensor event policy action must you configure in "Configuration" >"Sensors" >"Sensor Event Policies" >[rule name] to accomplish this?()

    A. Ignore

    B. Replace users role

    C. Terminate user session

    D. Disable user account


    参考答案:B

  • 第3题:

    Which two statements regarding firewall user authentication client groups are true?() (Choose two.)

    • A、A client group is a list of clients associated with a group.
    • B、A client group is a list of groups associated with a client.
    • C、Client groups are referenced in security policy in the same manner in which individual clients are referenced.
    • D、Client groups are used to simplify configuration by enabling firewall user authentication without security policy.

    正确答案:B,C

  • 第4题:

    Which two statements are true about the security-related tags in a valid Java EE deployment descriptor?()

    • A、Every  tag must have at least one  tag.
    • B、A  tag can have many  tags.
    • C、A given  tag can apply to only one  tag.
    • D、A given  tag can contain from zero to many  tags.
    • E、It is possible to construct a valid  tag such that,for a given resource,no user rolescan access that resource.

    正确答案:B,E

  • 第5题:

    Users can define policy to control traffic flow between which two components? ()(Choose two.)

    • A、from a zone to the router itself
    • B、from a zone to the same zone
    • C、from a zone to a different zone
    • D、from one interface to another interface

    正确答案:B,C

  • 第6题:

    Which two statements are true regarding the system-default security policy [edit security policies default-policy]?()(Choose two.)

    • A、Traffic is permitted from the trust zone to the untrust zone.
    • B、Intrazone traffic in the trust zone is permitted.
    • C、All traffic through the device is denied.
    • D、The policy is matched only when no other matching policies are found.

    正确答案:C,D

  • 第7题:

    Which two statements regarding the Policy Framework in Enterprise Manager (EM) are correct?()

    • A、Policy violations are prioritized as High, Medium, or Informational by category 
    • B、Policies can be disabled completely, or flagged as ignored, for the specified target 
    • C、Policies can be flagged as ignored, but never completely disabled, for the specified target
    • D、Policy violations must be corrected, otherwise the database will shut down until corrective action occurs

    正确答案:A,B

  • 第8题:

    Which two statements are true about a job chain?()

    • A、 A job chain can contain a nested chain of jobs
    • B、 The jobs in a job chain cannot have more than one dependency
    • C、 A job of the CHAIN type can be run using event-based or time-based schedules
    • D、 The jobs in a job chain can be executed only by using the events generated by the Scheduler

    正确答案:A,C

  • 第9题:

    多选题
    Which two statements are true about a job chain?()
    A

    A job chain can contain a nested chain of jobs

    B

    The jobs in a job chain cannot have more than one dependency

    C

    A job of the CHAIN type can be run using event-based or time-based schedules

    D

    The jobs in a job chain can be executed only by using the events generated by the Scheduler


    正确答案: A,D
    解析: 暂无解析

  • 第10题:

    多选题
    Which two statements are true about the security-related tags in a valid Java EE deployment descriptor?()
    A

    Every  tag must have at least one  tag.

    B

    A  tag can have many  tags.

    C

    A given  tag can apply to only one  tag.

    D

    A given  tag can contain from zero to many  tags.

    E

    It is possible to construct a valid  tag such that,for a given resource,no user rolescan access that resource.


    正确答案: D,A
    解析: 暂无解析

  • 第11题:

    多选题
    Which two statements regarding firewall user authentication client groups are true?() (Choose two.)
    A

    A client group is a list of clients associated with a group.

    B

    A client group is a list of groups associated with a client.

    C

    Client groups are referenced in security policy in the same manner in which individual clients are referenced.

    D

    Client groups are used to simplify configuration by enabling firewall user authentication without security policy.


    正确答案: D,A
    解析: 暂无解析

  • 第12题:

    多选题
    Which two statements are true regarding the system-default security policy [edit security policies default-policy]?()(Choose two.)
    A

    Traffic is permitted from the trust zone to the untrust zone.

    B

    Intrazone traffic in the trust zone is permitted.

    C

    All traffic through the device is denied.

    D

    The policy is matched only when no other matching policies are found.


    正确答案: C,A
    解析: 暂无解析

  • 第13题:

    Which two statements are true regarding the system-default security policy [edit security policies default-policy]?()(Choose two.)

    A. Traffic is permitted from the trust zone to the untrust zone.

    B. Intrazone traffic in the trust zone is permitted.

    C. All traffic through the device is denied.

    D. The policy is matched only when no other matching policies are found.


    参考答案:C, D

  • 第14题:

    Users can define policy to control traffic flow between which two components? ()(Choose two.)

    A. from a zone to the router itself

    B. from a zone to the same zone

    C. from a zone to a different zone

    D. from one interface to another interface


    参考答案:B, C

  • 第15题:

    Which two statements apply to policy scheduling?() (Choose two.)

    • A、An individual policy can have only one scheduler applied.
    • B、You must manually configure system-time updates.
    • C、Multiple policies can use the same scheduler.
    • D、Policies that do not have schedulers are not active.

    正确答案:A,C

  • 第16题:

    Your corporate security policy requires that a user performing attacks must have limited network access and activities until an administrator can investigate.In the admin GUI, which sensor event policy action must you configure in "Configuration" > "Sensors" > "Sensor Event Policies" > [rule name] to accomplish this?()

    • A、Ignore
    • B、Replace users role
    • C、Terminate user session
    • D、Disable user account

    正确答案:B

  • 第17题:

    Which two statements are true with regard to policy ordering? ()(Choose two.)

    • A、The last policy is the default policy, which allows all traffic.
    • B、The order of policies is not important.
    • C、New policies are placed at the end of the policy list.
    • D、The insert command can be used to change the order.

    正确答案:C,D

  • 第18题:

    Regarding zone types, which statement is true?()

    • A、You cannot assign an interface to a functional zone.
    • B、You can specifiy a functional zone in a security policy.
    • C、Security zones must have a scheduler applied.
    • D、You can use a security zone for traffic destined for the device itself.

    正确答案:D

  • 第19题:

    Which two statements are true about a job chain? ()(Choose two.)

    • A、A job chain can contain a nested chain of jobs.
    • B、The jobs in a job chain cannot have more than one dependency.
    • C、A job of the CHAIN type can be run using event-based or time-based schedules.
    • D、The jobs in a job chain can be executed only by using the events generated by the Scheduler

    正确答案:A,C

  • 第20题:

    多选题
    Which two statements are true about a job chain? ()(Choose two.)
    A

    A job chain can contain a nested chain of jobs.

    B

    The jobs in a job chain cannot have more than one dependency.

    C

    A job of the CHAIN type can be run using event-based or time-based schedules.

    D

    The jobs in a job chain can be executed only by using the events generated by the Scheduler


    正确答案: B,A
    解析: 暂无解析

  • 第21题:

    多选题
    Which two statements are true with regard to policy ordering? ()(Choose two.)
    A

    The last policy is the default policy, which allows all traffic.

    B

    The order of policies is not important.

    C

    New policies are placed at the end of the policy list.

    D

    The insert command can be used to change the order.


    正确答案: C,D
    解析: 暂无解析

  • 第22题:

    多选题
    Which two statements apply to policy scheduling?() (Choose two.)
    A

    An individual policy can have only one scheduler applied.

    B

    You must manually configure system-time updates.

    C

    Multiple policies can use the same scheduler.

    D

    Policies that do not have schedulers are not active.


    正确答案: D,A
    解析: 暂无解析

  • 第23题:

    多选题
    Which two statements correctly describe the relation between a data file and the logical database structures()
    A

    An extent cannot spread across data files.

    B

    A segment cannot spread across data files.

    C

    A data file can belong to only one tablespace.

    D

    A data file can have only one segment created in it.

    E

    A data block can spread across multiple data files as it can consist of multiple operating system (OS)blocks


    正确答案: B,C
    解析: 暂无解析

  • 第24题:

    多选题
    Users can define policy to control traffic flow between which two components? ()(Choose two.)
    A

    from a zone to the router itself

    B

    from a zone to the same zone

    C

    from a zone to a different zone

    D

    from one interface to another interface


    正确答案: D,C
    解析: 暂无解析