A.Data interception
B.Virus
C.Trojan horse
D.Denial of service
第1题:
A.REVOKE ALL PRIVILEGES FROM USER tom
B.REVOKE ALL ON EMPLOYEE FROM USER tom
C.REVOKE EXECUTE ON EMPLOYEE FROM USER tom
D.REVOKE PRIVILEGES ON EMPLOYEE FROM USER tom
第2题:
Users of your web application have requested that they should be able to set the duration of their sessions.So for example, one user might want a webapp to stay connected for an hour rather than the webapp’sdefault of fifteen minutes; another user might want to stay connected for a whole day. Furthermore, youhave a special login servlet that performs user authentication and retrieves the User object from the database. You want to augment this code to set up the user’s specified session duration. Which codesnippet in the login servlet will accomplish this goal?()
第3题:
Which of the following statements is used to prevent user TOM from adding and deleting data in table TAB1?()
第4题:
Which of the following statements allows USER1 to take away read access on the table ORG.TAB1 from USER2?()
第5题:
Which of the following statements is used to revoke all DML privileges on table EMPLOYEE from user TOM?()
第6题:
Which two statements are true regarding firewall user authentication?()
第7题:
Your network contains an Active Directory domain named contoso.com. The domain contains 20 computer accounts in an organizational unit (OU) named OU1. A user account named User1 is in an OU named OU2.You are configuring a Group Policy object (GPO) named GPO1. You need to assign User1 the Backup files and directories user right to all of the computer accounts in OU1.Which two actions should you perform?()
第8题:
You have a computer named Computer1 that runs Windows 7. Computer1 has a shared printer. You needto configure Computer1 so that only Administrators are authorized to shut down the computer. What should you do?()
第9题:
User user = // retrieve the User object from the database session.setDurationInterval(user.getSessionDuration());
User user = // retrieve the User object from the database session.setMaxDuration(user.getSessionDuration());
User user = // retrieve the User object from the database session.setInactiveInterval(user.getSessionDuration());
User user=//retrieve the User object from the database session.setDuration(user.getSessionDuratio());
User user = // retrieve the User object from the database session.setMaxInactiveInterval(user.getSessionDuration());
第10题:
When configured for pass-through firewall user authentication, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.
When configured for Web firewall user authentication only, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.
If a JUNOS security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted to perform authentication.
If a JUNOS security device is configured for Web firewall user authentication, new sessions are automatically intercepted to perform authentication.
第11题:
Instruct User2 to add a delegate
Instruct User2 to send a signed e-mail message to User1.
Instruct User1 to send a signed e-mail message to User2.
Instruct User1 to modify the sensitivity settings of the e-mail message
第12题:
An external hard drive connected via eSATA
An external hard drive connected via USB 2.0
An external hard drive connected via serial
A thumb drive connected via USB 2.0
第13题:
A user works daily with video production and needs portable storage which will allow them to transport their work back and forth from home. Taking the users storage and bandwidth requirements into consideration, which of the following would BEST suit the users needs?()
第14题:
Which two statements are true regarding firewall user authentication?() (Choose two.)
第15题:
Which of the following statements allows BOB to revoke access to the SAMPLE database from user TOM?()
第16题:
An administrator has set up serverA and serverB to use the /etc/hosts.equiv file so that applications on serverA can remotely run commands on serverB. Which command will verify if a new user from serverA is trusted on serverB?()
第17题:
What information does the Junos Pulse Access Control Service provide to Security Threat Response Manager (STRM)?()
第18题:
You are designing a strategy for migrating the UNIX user accounts to Active Directory. Which three actions should you perform?()
第19题:
You need to receive an e-mail message whenever a domain user account is locked out. Which tool should you use()
第20题:
Import the user accounts as inetOrgPerson objects.
Import the user accounts into Active Directory by using the Ldifde command-line tool.
Export all user accounts from the UNIX servers to a text file.
Export all user accounts and their passwords from the UNIX servers to a text file. Encrypt this file to achieve extra security.
Assign random passwords to each user object, and securely distribute the password to the users.
Create the same strong password for each user object, and require users to change their passwords at first logon.
第21题:
Firewall user authentication provides another layer of security in a network.
Firewall user authentication provides a means for accessing a JUNOS Software-based security device.
Firewall user authentication enables session-based forwarding.
Firewall user authentication is used as a last resort security method in a network.
第22题:
When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.
When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.
If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .
If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.
第23题:
Data interception
Virus
Trojan horse
Denial of service