单选题You want to create an out-of-band management zone and assign the ge-0/0/0.0 interface to that zone.From the [edit] hierarchy, which command do you use to configure this assignment?()A set security zones management interfaces ge-0/0/0.0B set zones funct

题目
单选题
You want to create an out-of-band management zone and assign the ge-0/0/0.0 interface to that zone.From the [edit] hierarchy, which command do you use to configure this assignment?()
A

set security zones management interfaces ge-0/0/0.0

B

set zones functional-zone management interfaces ge-0/0/0.0

C

set security zones functional-zone management interfaces ge-0/0/0.0

D

set security zones functional-zone out-of-band interfaces ge-0/0/0.0


相似考题
更多“You want to create an out-of-band management zone and assign”相关问题
  • 第1题:

    You are designing DNS implemetation Strategy for the new Infrastruce. Which two actions should you perform?()

    • A、Create a Stub Zone in each domain of the root zone.  
    • B、Create a _msdcs subdomain in a new zone on the root domain. 
    • C、Replicate the _msdcs subdomain across the roor domain.  
    • D、Replicate the _msdcs subdomain to the ForestDNS zone applciation partition.  
    • E、Configure a zone transfer of the _msdcs subdomain to secondary zone on all DNS servers in the forest.

    正确答案:B,D

  • 第2题:

    You work as a network administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed.The network as a server named ABC_SR05 that provides DHCP services.You need to create the DHCP scopes to support a subnet that has 800 hosts.You want to minimize the number of unused IP addresses on each subnet. How would you configure DHCP to support these subnets?()

    • A、You should assign the network 172.16.0.0/16.
    • B、You should assign the network 172.16.0.0/17.
    • C、You should assign the network 172.16.0.0/18.
    • D、You should assign the network 172.16.0.0/19.
    • E、You should assign the network 172.16.0.0/20.
    • F、You should assign the network 172.16.0.0/22.

    正确答案:F

  • 第3题:

    Regarding zone types, which statement is true?()

    • A、You cannot assign an interface to a functional zone.
    • B、You can specifiy a functional zone in a security policy.
    • C、Security zones must have a scheduler applied.
    • D、You can use a security zone for traffic destined for the device itself.

    正确答案:D

  • 第4题:

    You work as a database administrator for Certkiller .com. You want to create your database with the automatic undo management feature enable.Which two tasks must you perform to achieve this?()

    • A、Set the UNDO_RETENTION parameter to AUTO.
    • B、Create an initial undo segment in undotablespace.
    • C、Set the UNDO_RETENTION parameter to 900 or more
    • D、Set the initialization parameter UNDO_MANAGEMENT to AUTO
    • E、Set the UNDO_MANAGEMENT parameter to the name of an undotablespace

    正确答案:D,E

  • 第5题:

    You have an Exchange Server 2010 organization.  Your companys compliance policy states that the following occurs when a user leaves the company:.The user account is disabled .The user account and mailbox are deleted after six months  .All e-mail messages in the mailbox are retained for three years  You need to recommend a solution to retain the e-mail messages of users who leave the company.The solution must meet the following requirements: .Ensure that a group named Group1 can manage the process .Minimize disk space required to store the mailbox databases What should you recommend?()

    • A、Assign the Mailbox Search management role to Group1, and then create a retention policy.
    • B、Assign the Mailbox Search management role to Group1, and then create a managed folder mailbox policy.
    • C、Assign the Mailbox Import Export management role to Group1, and then configure Personal Archivesfor each mailbox.
    • D、Assign the Mailbox Import Export management role to Group1, and then instruct Group1 to export mailboxes to personal folder (.pst) files.

    正确答案:D

  • 第6题:

    Your network contains an Active Directory domain named contoso.com. The network contains  client computers that run either Windows Vista or Windows 7. Active Directory Rights  Management Services (AD RMS) is deployed on the network.     You create a new AD RMS template that is distributed by using the AD RMS pipeline. The  template is updated every month.   You need to ensure that all the computers can use the most up-to-date version of the AD RMS  template. You want to achieve this goal by using the minimum amount of administrative effort.     What should you do()

    • A、Upgrade all of the Windows Vista computers to Windows 7.
    • B、Upgrade all of the Windows Vista computers to Windows Vista Service Pack 2 (SP2).
    • C、Assign the Microsoft Windows Rights Management Services (RMS) Client Service Pack 2 (SP2) to all users by usin
    • D、Assign the Microsoft Windows Rights Management Services (RMS) Client Service Pack 2 (SP2) to all computers by

    正确答案:B

  • 第7题:

    Your  company,  A.  Datum  Corporation,  has  a  single  Active  Directory  domain  named  intranet.adatum.com. The domain has two domain controllers that run Windows Server 2008 R2  operating system. The domain controllers also run DNS servers.  The intranet.adatum.com DNS zone is configured as an Active Directoryintegrated zone with the  Dynamic updates setting configured to Secure only.  A new corporate security policy requires that the intranet.adatum.com DNS zone must be updated only by  domain controllers or member servers.  You need to configure the intranet.adatum.com zone to meet the new security policy requirement.  Which two actions should you perform()

    • A、Remove the Authenticated Users account from the Security tab of the intranet.adatum.com DNS zone  properties.
    • B、Assign the SELF Account Deny on Write permission on the Security tab of the intranet.adatum.com  DNS zone properties.
    • C、Assign the server computer accounts the Allow on Write All Properties permission on the Security tab  of the intranet.adatum.com DNS zone properties.
    • D、Assign the server computer accounts the Allow on Create All Child Objects permission on the Security  tab of the intranet.adatum.com DNS zone properties.

    正确答案:A,D

  • 第8题:

    You have an Exchange 2010 organization.You have an administrative user named Admin1.You need to ensure that Admin1 can move mailboxes in the organization.The solution must assign the minimum amount of permissions to Admin1. What should you do?()

    • A、Create a local move request.
    • B、Create a custom Management role.Assign the role to Admin1.
    • C、Add Admin1 to the Organization Management role group.
    • D、Add Admin1 to the Recipient Management security group.

    正确答案:B

  • 第9题:

    多选题
    You work as a database administrator for Certkiller .com. You want to create your database with the automatic undo management feature enable.Which two tasks must you perform to achieve this?()
    A

    Set the UNDO_RETENTION parameter to AUTO.

    B

    Create an initial undo segment in undotablespace.

    C

    Set the UNDO_RETENTION parameter to 900 or more

    D

    Set the initialization parameter UNDO_MANAGEMENT to AUTO

    E

    Set the UNDO_MANAGEMENT parameter to the name of an undotablespace


    正确答案: E,B
    解析: 暂无解析

  • 第10题:

    单选题
    You have an Exchange Server 2010 server that contains a single mailbox database.All users run Microsoft Office Outlook and Outlook Web App.You discover that users cannot restore e-mail messages from the Recover Deleted Items folder.You need to ensure that users can restore e-mail messages from the Recover Deleted Items folder.What should you do?()
    A

    From the Exchange Management Console (EMC), modify the properties of the mailbox database

    B

    From the Exchange Management Console (EMC), modify the properties of the Mailbox server object

    C

    From the Exchange Management Shell, create a management role and then assign the role to all users

    D

    From the Exchange Management Shell, create a retention policy and then assign the policy to all users


    正确答案: C
    解析: 暂无解析

  • 第11题:

    单选题
    You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a management data warehouse that uses the data collector to collect performance data. You intend to maintain the management data. You want to implement a data collection process. The process can gather and upload data in the management data warehouse on different schedules.  What process should you implement?()
    A

    You should create a cached data collection

    B

    You should create an on-demand non-cached data collection 

    C

    You should create a scheduled non-cached data collection 

    D

    You should create two different SQL Agent jobs that are scheduled stimultaneously


    正确答案: D
    解析: 暂无解析

  • 第12题:

    单选题
    You have a long-running process you want to assign to a specific UNDO segment brought online for that express purpose. You are not using automatic UNDO management. What statement can be used for this task? ()
    A

    ALTER DATABASE 

    B

    SET TRANSACTION 

    C

    ALTER ROLLBACK SEGMENT 

    D

    ALTER TABLE


    正确答案: B
    解析: 暂无解析

  • 第13题:

    You want to allow your device to establish OSPF adjacencies with a neighboring device connected to interface ge-0/0/3.0. Interface ge-0/0/3.0 is a member of the HR zone.Under which configuration hierarchy must you permit OSPF traffic?()

    • A、[edit security policies from-zone HR to-zone HR]
    • B、[edit security zones functional-zone management protocols]
    • C、[edit security zones protocol-zone HR host-inbound-traffic]
    • D、[edit security zones security-zone HR host-inbound-traffic protocols]

    正确答案:D

  • 第14题:

    If an existing script is uploaded to the CRS, what does it ask?()

    • A、Do you want to debug the script?  
    • B、Do you want to refresh the script?  
    • C、Do you want to save the application?  
    • D、Do you want to return to Script Management? 

    正确答案:B

  • 第15题:

    You want to create a new optimized database for your transactional production environment to be used by a financial application. While creating the database, you want the Oracle software to take care of all basic settings to optimize the database performance. Which method would you use to achieve this objective?()

    • A、Use the CREATE DATABASE .. command to create the database with Oracle-managed files. 
    • B、Use the Database Configuration Assistant (DBCA) to create the database with Oracle-managed files. 
    • C、Use Enterprise Manager to create a new database with the Online Transaction Processing (OLTP) option. 
    • D、Use Database Configuration Assistant (DBCA) to create the database with Transaction Processing template. 
    • E、Use the CREATE DATABASE .. command to create the database with Automatic Storage Management (ASM) file system.

    正确答案:D

  • 第16题:

    You are the network administrator for your company. Your network consists of a single Active   Directory domain. Three security groups named Accountants, Processors, and Management are located in an organizational unit (OU) named Accounting. All of the user accounts that belong to these three  groups are also in the Accounting OU. You create a Group Policy object (GPO) and link it to the  Accounting OU. You configure the GPO to disable the display options under the User Configuration  section of the GPO. You need to achieve the following goals: You need to ensure that the GPO applies to  all user accounts that are members of the Processors group. You need to prevent the GPO fromapplying  to any user account that is a member of the Accountants group. You need to prevent the GPO from  applying to any user account that is a member of the Management group, unless the user account is also  a member of the Processors group. What should you do?()

    • A、 Modify the discretionary access control list (DACL) settings of the GPO to assign the Accountants and Management security groups the Deny - Read and the Deny - Apply Group Policy permissions. Modify the DACL of the GPO to assign the users who are in both the Accountants and Management security groups the Allow - Read and the Allow - Apply Group Policy permissions.
    • B、 Modify the discretionary access control list (DACL) settings of the GPO to assign the Accountants and Management security groups the Deny - Read and the Deny - Apply Group Policy permissions. Create a new security group named Mixed that contains all the user accounts from the Processors group and the specific user accounts from the Management group to which you want the GPO to apply. Modify the DACL of the GPO to assign the Mixed security group the Allow - Read and the Allow - Apply Group Policy permissions.
    • C、 Modify the discretionary access control list (DACL) settings of the GPO to assign the Accountants security group the Deny - Read and the Deny - Apply Group Policy permissions. Modify the DACL settings of the GPO to remove the Authenticated Users special group. Modify the DACL settings of the GPO to add the Processors group and assign the Allow - Read and the Allow - Apply Group Policy permissions.
    • D、 Modify the discretionary access control list (DACL) settings of the GPO to assign the Accountants security group the Deny - Read and the Allow - Apply Group Policy permissions. Modify the DACL settings of the GPO to assign the Management security group the Deny - Read and the Deny - Apply Group Policy permissions.

    正确答案:C

  • 第17题:

    You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. The server hosts databases for several mission-critical applications. Microsoft SQL Server Management Studio executes queries and it has some effect. Now you intend to limit the effect by using the Resource Governor. You must make sure that queries initiated through SQL Server Management Studio is less than 20 percent of CPU utilization, besides this, you must make sure that queries initiated by the mission-critical applications can consume 100 percent of CPU utilization when required. So what action should you perform to achieve this goal? ()

    • A、You should alter the default resource pool and set the MAX_CPU_PERCENT option to 80. Then assign this resource pool to the workload group used by SQL Server Management Studio. 
    • B、First, you should create a new resource pool and set the MAX_CPU_PERCENT option to 20. Then assign this resource pool to the workload group used by SQL Server Management Studio. 
    • C、You should alter the default resource pool and set the MAX_CPU_PERCENT option to 20. Then assign this resource pool to the workload group used by the mission-critical applications. 
    • D、First, you should create a new resource pool and set the MAX_CPU_PERCENT option to 80. Then assign this resource pool to the workload group used by the mission-critical applications.

    正确答案:B

  • 第18题:

    You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a management data warehouse that uses the data collector to collect performance data. You intend to maintain the management data. You want to implement a data collection process. The process can gather and upload data in the management data warehouse on different schedules.  What process should you implement?() 

    • A、You should create a cached data collection
    • B、You should create an on-demand non-cached data collection 
    • C、You should create a scheduled non-cached data collection 
    • D、You should create two different SQL Agent jobs that are scheduled stimultaneously

    正确答案:A

  • 第19题:

    You network consists of an Active Directory forest named contoso.com. All servers run Windows Server 2008. All domain controllers are configured as DNS servers. The contoso.com DNS zone is stored in the ForestDnsZones Active Directory application partition. You have a member server that contains a standard primary DNS zone for dev.contoso.com. You need to ensure that all domain controllers can resolve names for dev.contoso.com. What should you do()

    • A、Create a NS record in the contoso.com zone.
    • B、Create a delegation in the contoso.com zone.
    • C、Create a standard secondary zone on a Global Catalog server.
    • D、Modify the properties of the SOA record in the contoso.com zone.

    正确答案:B

  • 第20题:

    You are the network administrator for Wingtip Toys. The network consists of a single Active Directory domain named wingtiptoys.com. The Active Directory-integrated DNS zone named wingtiptoys.com is replicated to all domain controllers. Only domain controllers have the DNS service installed.The network management department requires all hosts in the manufacturing division to be registered in the DNS namespace manufacturing.wingtiptoys.com. The manufacturing.wingtiptoys.com namespace does not exist on any of the DNS servers.You need to add support for the manufacturing.wingtiptoys.com namespace to all the existing DNS servers. To reduce administrative overhead, you want to find a solution that will not require reconfiguration if DNS servers are added to the domain in the future.  What should you do?()

    • A、Create a subdomain named manufacturing in the wingtiptoys.com zone.
    • B、Create a delegation named manufacturing in the wingtiptoys.com zone.
    • C、Create a stub zone for manufacturing.wingtiptoys.com.
    • D、Create a primary zone for manufacturing.wingtiptoys.com that is not Active Directory-integrated.

    正确答案:A

  • 第21题:

    单选题
    You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. The server hosts databases for several mission-critical applications. Microsoft SQL Server Management Studio executes queries and it has some effect. Now you intend to limit the effect by using the Resource Governor. You must make sure that queries initiated through SQL Server Management Studio is less than 20 percent of CPU utilization, besides this, you must make sure that queries initiated by the mission-critical applications can consume 100 percent of CPU utilization when required. So what action should you perform to achieve this goal? ()
    A

    You should alter the default resource pool and set the MAX_CPU_PERCENT option to 80. Then assign this resource pool to the workload group used by SQL Server Management Studio. 

    B

    First, you should create a new resource pool and set the MAX_CPU_PERCENT option to 20. Then assign this resource pool to the workload group used by SQL Server Management Studio. 

    C

    You should alter the default resource pool and set the MAX_CPU_PERCENT option to 20. Then assign this resource pool to the workload group used by the mission-critical applications. 

    D

    First, you should create a new resource pool and set the MAX_CPU_PERCENT option to 80. Then assign this resource pool to the workload group used by the mission-critical applications.


    正确答案: D
    解析: 暂无解析

  • 第22题:

    单选题
    You want to allow your device to establish OSPF adjacencies with a neighboring device connected to interface ge-0/0/3.0. Interface ge-0/0/3.0 is a member of the HR zone.Under which configuration hierarchy must you permit OSPF traffic?()
    A

    [edit security policies from-zone HR to-zone HR]

    B

    [edit security zones functional-zone management protocols]

    C

    [edit security zones protocol-zone HR host-inbound-traffic]

    D

    [edit security zones security-zone HR host-inbound-traffic protocols]


    正确答案: D
    解析: 暂无解析

  • 第23题:

    单选题
    You want to create an out-of-band management zone and assign the ge-0/0/0.0 interface to that zone.From the [edit] hierarchy, which command do you use to configure this assignment?()
    A

    set security zones management interfaces ge-0/0/0.0

    B

    set zones functional-zone management interfaces ge-0/0/0.0

    C

    set security zones functional-zone management interfaces ge-0/0/0.0

    D

    set security zones functional-zone out-of-band interfaces ge-0/0/0.0


    正确答案: B
    解析: 暂无解析

  • 第24题:

    单选题
    You want to create a security policy allowing traffic from any host in the Trust zone to hostb.example.com(172.19.1.1) in the Untrust zone. How do you create this policy?()
    A

    Specify the IP address (172.19.1.1/32) as the destination address in the policy.

    B

    Specify the DNS entry (hostb.example.com.) as the destination address in the policy.

    C

    Create an address book entry in the Trust zone for the 172.19.1.1/32 prefix and reference this entry in the policy.

    D

    Create an address book entry in the Untrust zone for the 172.19.1.1/32 prefix and reference this entry in the policy


    正确答案: C
    解析: 暂无解析