单选题You need to configure fine-grained access control to external network resources from within your database. You create an access control list (ACL) using the DBMS_NETWORK_ACL_ADMIN package. Which statement is true regarding the ACL created?()A It is a l

题目
单选题
You need to configure fine-grained access control to external network resources from within your database. You create an access control list (ACL) using the DBMS_NETWORK_ACL_ADMIN package. Which statement is true regarding the ACL created?()
A

It is a list of remote database links stored in the XML file that are available to the users of the database.

B

It is a list of users and network privileges stored in the XML file according to which a group of users can connect to one or more hosts.

C

It is a list of users and network privileges stored in the data dictionary according to which a group of users can connect to one or more hosts.

D

It is the list of the host names or the IP addresses stored in the data dictionary that can connect to your database through PL/SQL network utility packages such as UTL_TCP.

参考答案和解析
正确答案: C
解析: 暂无解析
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

You are a technician at TestKing. Your assistant applied an IP access control list to Router TK1. You want to check the placement and direction of the access control list.Which command should you use?()

A. show access-list

B. show ip access-list

C. show ip interface

D. show interface

E. show interface list


参考答案:C

第2题:

You are securing a network for TestKing and want to apply an ACL (access control list) to an interface of a router. Which one of the following commands would you use?()

  • A、permit access-list 101 out
  • B、ip access-group 101 out
  • C、apply access-list 101 out
  • D、access-class 101 out
  • E、ip access-list e0 out

正确答案:B

第3题:

You have a firewall enforcer receiving resource access policies from a Junos Pulse Access Control Service. You are using Network and Security Manager (NSM) for configuration management on that firewall. The firewall can also be configured using its built-in command-line interface (CLI) or Web-based user interface (WebUI).To avoid conflicting configurations, which two interfaces must you use to configure the firewall enforcer?()

A. CLI

B. WebUI

C. NSM

D. Junos Pulse Access Control Service


参考答案:C, D

第4题:

When using RADIUS as an external authentication method for 802.1X authentication for the Junos Pulse Access Control Service, what must you do to ensure that the RADIUS authentication works properly?()

  • A、Configure IP helper to forward the authentication requests from the clients to the external RADIUS server
  • B、Configure the supplicant as anexternal authentication server
  • C、Configure RADIUS proxy on the realm
  • D、Specify the correct RADIUS port 389 on the Junos Pulse Access Control Service

正确答案:C

第5题:

ou need to configure fine-grained access control to external network resources from within your database. You create an access control list (ACL) using the DBMS_NETWORK_ACL_ADMIN package.  Which statement is true regarding the ACL created?()

  • A、 It is a list of remote database links stored in the XML file that are available to the users of the database.
  • B、 It is a list of users and network privileges stored in the XML file according to which a group of users can connect to one or more hosts.
  • C、 It is a list of users and network privileges stored in the data dictionary according to which a group of users can connect to one or more hosts.
  • D、 It is the list of the host names or the IP addresses stored in the data dictionary that can connect to your database through PL/SQL network utility packages such as UTL_TCP.

正确答案:B

第6题:

You are securing a network for TestKing and want to apply an ACL (access control list) to an interface of a router. Which one of the following commands would you use?()

A. permit access-list 101 out

B. ip access-group 101 out

C. apply access-list 101 out

D. access-class 101 out

E. ip access-list e0 out


参考答案:B

第7题:

You are a technician at TestKing. Your assistant applied an IP access control list to Router TK1. You want to check the placement and direction of the access control list.Which command should you use?()

  • A、show access-list
  • B、show ip access-list
  • C、show ip interface
  • D、show interface
  • E、show interface list

正确答案:C

第8题:

You configure a Group Policy Object for the Marketing organizational unit (OU) to prevent users from accessing My Network Places and from running System in Control Panel. You want the Managers domain local group to be able to access My Network Places, but you still want to prevent them from running System in Control Panel.

What should you do?

A.Add the managers group to the access control list of the GPO. Disable the permission of the managers group to read and apply the group policy.

B.Add the managers group to the access control list of the GPO. Deny the permission of the managers group to read and apply the group policy.

C.Create a second GPO in the OU. Add the managers group to the access control list. Allow the managers group to apply the group policy. Deny the authenticated users group permission to read and apply group policy. Configure the new GPO to deny the ability to run System in Control Panel. Give the original GPO a higher priority than the new GPO.

D.Create a second GPO in the OU. Add the managers group to the access control list. Allow the managers group to read and apply the group policy. Disable the permission of the authenticated user group to read and apply the group policy. Configure the new GPO to allow access to My Network Places. Give the new GPO a higher priority than the original GPO.


正确答案:D
解析:Explanation:InthisscenarioweneedtocreateasecondGPOandapplyitonlytotheManagers.WemustallowaccesstoMyNetworkPlacesinthenewGPO.ThenwegivetheGPOhigherprioritythantheoriginalone.Incorrectanswers:A:WestillrequiretheoriginalGPOtoapplytothemanagers,aswewanttopreventthemfromrunningSysteminControlPanel.ThereforeweshouldnotdisablethepermissionofthemanagersgrouptoreadandapplytheGroupPolicy,asthiswillresultintheGPOnotbeingappliedtotheManagers.B:WestillrequiretheoriginalGPOtoapplytothemanagers,aswewanttopreventthemfromrunningSysteminControlPanel.ThereforeweshouldnotdenythepermissionofthemanagersgrouptoreadandapplytheGroupPolicy,asthiswillresultintheGPOnotbeingappliedtotheManagers.C:WeneedtoallowtheManagersaccesstoMyNetworkPlaces.ThatmustbeconfiguredinthesecondGPO.

第9题:

Which statement best describes configuring access control lists to control Telnet traffic destined to therouter itself?()

  • A、The ACL applied to the vty lines has no in or out option like ACL being applied to an interface.
  • B、The ACL is applied to the Telnet port with the ip access-group command.
  • C、The ACL must be applied to each vty line individually.
  • D、The ACL should be applied to all vty lines in the in direction to prevent an unwanted user from connecting to an unsecured port.

正确答案:D

第10题:

You have three classes of users on your network: employee, contractor, and IT administrator. You configure the Junos Pulse Access Control Service to assign roles to each user class and require that a specific wireless SSID be preconfigured for the Odyssey Access Client based on the role. Which configuration method should you use to satisfy this scenario?()

  • A、Create a "Settings Update file" in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under "User Roles" > "Agent" > "Odyssey Settings" > "Preconfigured Installer".
  • B、Configure a wired adapter and assign the required SSID under "User Roles" > "Agent" > "Odyssey Settings".
  • C、Create a script in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under "User Roles" > "Agent" > "Odyssey Settings" > "Preconfigured Installer".
  • D、Create a "Preconfiguration file" in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under "User Roles" > "Agent" > "Odyssey Settings" > "Preconfigured Installer".

正确答案:A,B,D

更多相关问题