Users can defineQ

题目

Users can define policy to control traffic flow between which two components?()

  • A、from a zone to the device itself
  • B、from a zone to the same zone
  • C、from a zone to a different zone
  • D、from one interface to another interface
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

On the Internet, users can share( )and communicate with each other.

A.process B.tasks C.resources D.documents


正确答案:C

第2题:

A user in the op_storage group logs onto the DS GUI and goes to the User Administration panel.  Which users can be seen and what actions can be performed()

  • A、the user can see all other users, including those in the Admin group, but can modify only the user accounts in theOp_volume and Monitor group
  • B、the user can see all the users except those in the Admin group, but can only modify the user’s own account
  • C、the user can see only the user’s own account, and cannot modify it
  • D、the user can see only the user’s own account, and can change the password only

正确答案:D

第3题:

WWW is popular for its multimedia transmission and friendly(71). Although the speed of network has been improved considerably in recent years, the rapid(72)of using the Internet, the inherited character of delay in the network and the Request/Response working mode of WWW still make the Internet traffic very(73)and give no guarantee on the Quality of Service. Because HTTP has no states, the web server cannot know the users' demand and the users' requests cannot be predicted Taking advantage of a cache mechanism and the time locality of WWW accesses, the browser can preserve the documents ever accessed in the local machine. By this means, for the documents in the local cache, the browser does not need to send the requests to the remote server or to receive the whole responses from the remote one Pre-fetching uses the space locality of accesses First, the users' access requests are predicted according to the users' current request. Secondly, the expected pages are fetched into the local cache when the user is brow sing the current page. Finally, the users can access these pages downloaded from the local cache. And this can reduce the access delay to some degrees. Pre-fetching is one kind of active caches that can cache the pages which are still not requested by the user. The application of pre-fetching technology in the web can greatly reduce the waiting time after users have sent their requests. This paper brings forward an intelligent technique of web pre-fetching, which can speed up fetching web pages. In this technique, we use a simplified WWW data model to represent the data in the cache of web browser to mine the association rules. We store these rules in a knowledge base so as to(74)the user's actions. In the client sides, the agents are responsible for mining the users' interest and pre-fetching the web pages, which are based on the interest association repository. Therefore it is(75)for the users to speed up the browsing.

A.interactive

B.interaction

C.interactivity

D.infection


正确答案:C

第4题:

Which statements describe the capabilities of the DBMS_NETWORK_ACL_ADMIN package?()

  • A、It can be used to allow the access privilege settings for users but not roles.
  • B、It can be used to allow the access privilege settings for users as well as roles.
  • C、It can be used to control the time interval for which the access privilege is available to a user.
  • D、It can be used to selectively restrict the access for each user in a database to different host computers.
  • E、It can be used to selectively restrict a user's access to different applications in a specific host computer.

正确答案:B,C,D

第5题:

Which of the following network protocols is needed to ensure that users can type in a FQDN instead of the IP address?()

  • A、DNS
  • B、FTP
  • C、WINS
  • D、IMAP4

正确答案:A

第6题:

Which of the following is true about the following share access properties? ()

  • A、 +managers will be resolved as a Winbind group.  
  • B、 The timo and taki users can manipulate files regardless of the file system permissions.  
  • C、 +managers will be resolved as a Unix group.  
  • D、 +managers is a builtin default Samba group.  
  • E、 The "admin users" can be applied only to print shares.

正确答案:B,C

第7题:

Which of the following is true regarding NetWare Directory Services (NDS) configuration?()

  • A、Remote users can access the tree through dial-in connections.
  • B、Mobile users do not require changing the NDS name context.
  • C、Remote users do not require a special NDS object entry.
  • D、There are no differences between mobile users and remote users.

正确答案:A

第8题:

What are two use cases enabled by IF-MAP Federation?()

A. Users authenticated to one Junos Pulse Access Control Service can transparently access resources protected by another Junos Pulse Access Control Service.

B. Users authenticated to a Junos Pulse Access Control Service can transparently access resources protected by a Junos Pulse Secure Access Service.

C. Remote access users authenticated to a Junos Pulse Secure Access Service can transparently access resources protected by a Junos Pulse Access Control Service.

D. Remote access users authenticated to one Junos Pulse Secure Access Service can transparently access resources protected by another Junos Pulse Secure Access Service.


参考答案:A, C

第9题:

Which of the following roles can use the Organization Administration Console to create and modify users in their organization?()

  • A、Buyer Administrator
  • B、Site Administrator
  • C、Seller
  • D、Seller Administrator
  • E、Store Administrator

正确答案:A,B,D

第10题:

You are unable to move the Unified Job Scheduler occupant from the SYSAUX tablespace to the USERS tablespace. What could be the reason?()

  • A、None of the SYSAUX occupants can be relocated.
  • B、The USERS tablespace is a bigfile tablespace (BFT).
  • C、The united Job Scheduler occupant cannot be relocated.
  • D、The SYSAUX occupants can be relocated to the SYSTEM tablespace only.

正确答案:C

更多相关问题