itgle.com

A network engineer wants to allow a temporary entry for a remote user with a specific usename and password so that the user can access the entire network over the internet.which ACL can be used?()A. reflexiveB. extendedC. standardD. dynamic

题目
A network engineer wants to allow a temporary entry for a remote user with a specific usename and password so that the user can access the entire network over the internet.which ACL can be used?()

A. reflexive

B. extended

C. standard

D. dynamic


相似考题
更多“A network engineer wants to allow a temporary entry for a remote user with a specific usename and password so that the user can access the entire network over the internet.which ACL can be used?() ”相关问题
  • 第1题:

    A network engineer wants to allow a temporary entry for a remote user with a specific usename andpassword so that the user can access the entire network over the internet.which ACL can be used?()

    • A、reflexive
    • B、extended
    • C、standard
    • D、dynamic

    正确答案:D

  • 第2题:

    Your company consists of a single Active Directory domain that is configured in Windows 2000 native mode. All servers run Windows Server 2003 Service Pack 2 (SP2).  You deploy a Routing and Remote Access server to provide VPN access to the network.You need to ensure that only members of a group named Sales can access the network through the VPN. The solution must minimize the administrative effort required to manage remote access.  What should you do?()

    • A、Allow dial-in access for the user accounts of all Sales group members.
    • B、Deny dial-in access for the user accounts of all users except the Sales group members.
    • C、Create a remote access policy and assign the Allow - Remote Access permission. Add the Windows-Groups condition and specify the Sales group.
    • D、Create a remote access policy and assign the Deny - Remote Access permission. Add the Windows-Groups condition and specify all Active Directory groups except for Sales.

    正确答案:C

  • 第3题:

    A network engineer wants to allow a temporary entry for a remote user with a specific usename and password so that the user can access the entire network over the internet.which ACL can be used?()

    • A、reflexive
    • B、extended
    • C、standard
    • D、dynamic

    正确答案:D

  • 第4题:

    You are configuring a new Catalyst switch that you want to manage remotely from workstations on other network segments within your enterprise.Which of the following are required to allow remote management of the switch over IP?()

    • A、The switch name must match the workgroup name of the local network.
    • B、The switch must be configured with an IP address and default gateway.
    • C、The remote workstations must have access to the management VLAN of the switch.
    • D、CDP must be enabled on the switch so that it can be located by other devices on the network.

    正确答案:B,C

  • 第5题:

    Which statements describe the capabilities of the DBMS_NETWORK_ACL_ADMIN package?()

    • A、It can be used to allow the access privilege settings for users but not roles.
    • B、It can be used to allow the access privilege settings for users as well as roles.
    • C、It can be used to control the time interval for which the access privilege is available to a user.
    • D、It can be used to selectively restrict the access for each user in a database to different host computers.
    • E、It can be used to selectively restrict a user's access to different applications in a specific host computer.

    正确答案:B,C,D

  • 第6题:

    The human resources department has informed you that two new temporary part-time employees will join your company next week. You are required to set up a workstation that will be used bythese employees. They do not need access to the network but they will need to access an HP LaserJet printer attached to the local computer. You install Windows 2000 Professional and format the hard disk using NTFS. What type of user account should you create for them?()

    • A、No account. They can use the built-in guest account.
    • B、No Account. They can use the built-in Administrator account.
    • C、Local user account
    • D、Domain user account

    正确答案:C

  • 第7题:

    多选题
    You are configuring a new Catalyst switch that you want to manage remotely from workstations on other network segments within your enterprise.Which of the following are required to allow remote management of the switch over IP?()
    A

    The switch name must match the workgroup name of the local network.

    B

    The switch must be configured with an IP address and default gateway.

    C

    The remote workstations must have access to the management VLAN of the switch.

    D

    CDP must be enabled on the switch so that it can be located by other devices on the network.


    正确答案: D,B
    解析: 暂无解析

  • 第8题:

    单选题
    A user is unable to access the company website on a laptop. A network technician verifies that theuser can access other Internet pages. According to network troubleshooting methodology, which of the following steps should be taken NEXT?()
    A

    Remotely connect to the user's laptop and review the network configuration settings

    B

    Ping the web server from inside the network to ensure it is still up and running.

    C

    Check to make sure the company's website is accessible from the Internet.

    D

    Ensure the Ethernet cable is securely plugged into the user's laptop


    正确答案: B
    解析: 暂无解析

  • 第9题:

    单选题
    Your company consists of a single Active Directory domain that is configured in Windows 2000 native mode. All servers run Windows Server 2003 Service Pack 2 (SP2). You deploy a Routing and Remote Access server to provide VPN access to the network.You need to ensure that only members of a group named Sales can access the network through the VPN. The solution must minimize the administrative effort required to manage remote access.  What should you do?()
    A

    Allow dial-in access for the user accounts of all Sales group members. 

    B

    Deny dial-in access for the user accounts of all users except the Sales group members. 

    C

    Create a remote access policy and assign the Allow - Remote Access permission. Add the Windows-Groups condition and specify the Sales group. 

    D

    Create a remote access policy and assign the Deny - Remote Access permission. Add the Windows-Groups condition and specify all Active Directory groups except for Sales.


    正确答案: B
    解析: 暂无解析

  • 第10题:

    单选题
    The human resources department has informed you that two new temporary part-time employees will join your company next week. You are required to set up a workstation that will be used bythese employees. They do not need access to the network but they will need to access an HP LaserJet printer attached to the local computer. You install Windows 2000 Professional and format the hard disk using NTFS. What type of user account should you create for them?()
    A

    No account. They can use the built-in guest account.

    B

    No Account. They can use the built-in Administrator account.

    C

    Local user account

    D

    Domain user account


    正确答案: D
    解析: 暂无解析

  • 第11题:

    单选题
    A system administrator wants to configure 802.1X on an Ethernet switch to enable access to specific parts of the network based on group memberships.How can the administrator accomplish this goal?()
    A

    Configure roles based on departments and assign access based on source IP address.

    B

    Configure roles based on the user's manager and assign access based on the user's MAC address

    C

    Configure roles based on group memberships and assign a specific VLAN to the role.

    D

    Configure roles based on RADIUS request attribute and assign a specific VLAN to the role.


    正确答案: D
    解析: 暂无解析

  • 第12题:

    多选题
    Which statements describe the capabilities of the DBMS_NETWORK_ACL_ADMIN package?()
    A

    It can be used to allow the access privilege settings for users but not roles.

    B

    It can be used to allow the access privilege settings for users as well as roles.

    C

    It can be used to control the time interval for which the access privilege is available to a user.

    D

    It can be used to selectively restrict the access for each user in a database to different host computers.

    E

    It can be used to selectively restrict a user's access to different applications in a specific host computer.


    正确答案: D,B
    解析: 暂无解析

  • 第13题:

    Which of the following is NOT a security feature relating to user accounts?()

    • A、Some commands can be password protected requiring logged in customers to re-enter their password.
    • B、A user account can be disabled automatically, after a specified number of invalid login attempts.
    • C、An account can have multiple valid passwords at the same time, any of which can be used to access the account.
    • D、The password policy feature can allow the system to require passwords to include a minimum number of numeric characters.
    • E、Logged in customers can be logged off of the system after a specified period of inactivity.

    正确答案:C

  • 第14题:

    A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()

    • A、BPDU
    • B、Port security
    • C、RSTP
    • D、STP
    • E、VTP
    • F、Blocking mode

    正确答案:B

  • 第15题:

    Which two statements are true about the Cisco Classic (CBAC) IOS Firewall set?()

    • A、It can be used to block bulk encryption attacks
    • B、It can be used to protect against denial of service attacks
    • C、Traffic originating from the router is considered trusted, so it is not inspected
    • D、Based upon the custom firewall rules, an ACL entry is statically created and added to theexisting ACL permanently
    • E、Temporary ACL entries that allow selected traffic to pass are created and persist for theduration of the communication session

    正确答案:B,E

  • 第16题:

    What is the primary purpose of creating a Location Group Policy? ()

    • A、to associate more than one realm with an authentication server
    • B、to logically group network access devices and associate them with specific sign-in policies
    • C、to allow or prevent users from accessing resources in specific locations on the network
    • D、to define the URL that users of network access devices can use to access the Infranet Controller

    正确答案:B

  • 第17题:

    Your network contains a Network Policy Server (NPS) named NPS1. NPS1 is configured for remote access account lockout.A domain user named User1 has been locked out by NPS1.You need to unlock the User1 user account on NPS1.What should you use?()

    • A、the Netsh tool
    • B、the Network Policy Server console
    • C、the Registry Editor
    • D、the Routing and Remote Access console

    正确答案:C

  • 第18题:

    单选题
    What is the primary purpose of creating a Location Group Policy? ()
    A

    to associate more than one realm with an authentication server

    B

    to logically group network access devices and associate them with specific sign-in policies

    C

    to allow or prevent users from accessing resources in specific locations on the network

    D

    to define the URL that users of network access devices can use to access the Infranet Controller


    正确答案: B
    解析: 暂无解析

  • 第19题:

    单选题
    A user can ping everything on the local network earth.net from an AIX box (which is located on earth.net). However, if the user tries to ping something on another network (mars.net) the user must type the fully qualified hostname. What can the user do so that the fully qualified hostname does not have to be typed every time the user wants to access ANY machine on mars.net?()
    A

    Edit the /etc/hosts file and add an alias to the correct entry

    B

    Set up an alias in his .kshrc file to alias the hostname to the fully qualified hostname

    C

    Add an alias to /etc/aliases

    D

    Add mars.net to the search path of the resolv.conf file


    正确答案: D
    解析: 暂无解析

  • 第20题:

    单选题
    Which of the following is NOT a security feature relating to user accounts?()
    A

    Some commands can be password protected requiring logged in customers to re-enter their password.

    B

    A user account can be disabled automatically, after a specified number of invalid login attempts.

    C

    An account can have multiple valid passwords at the same time, any of which can be used to access the account.

    D

    The password policy feature can allow the system to require passwords to include a minimum number of numeric characters.

    E

    Logged in customers can be logged off of the system after a specified period of inactivity.


    正确答案: D
    解析: 暂无解析

  • 第21题:

    单选题
    Your network contains a Network Policy Server (NPS) named NPS1. NPS1 is configured for remote access account lockout.A domain user named User1 has been locked out by NPS1.You need to unlock the User1 user account on NPS1.What should you use?()
    A

    the Netsh tool

    B

    the Network Policy Server console

    C

    the Registry Editor

    D

    the Routing and Remote Access console


    正确答案: B
    解析: 暂无解析

  • 第22题:

    单选题
    A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()
    A

    BPDU

    B

    Port security

    C

    RSTP

    D

    STP

    E

    VTP

    F

    Blocking mode


    正确答案: B
    解析: 暂无解析

  • 第23题:

    单选题
    What is not a difference between VPN tunnel authentication and per-user authentication?()
    A

    VPN tunnel authentication is part of the IKE specification. 

    B

    VPN tunnel authentication does not control which end user can use the IPSec SA (VPN tunnel).

    C

    User authentication is used to control access for a specific user ID, and can be used with or without a VPN tunnel for network access authorization. 

    D

    802.1X with EAP-TLS (X.509 certificates) can be used to authenticate an IPSec tunnel.


    正确答案: C
    解析: 暂无解析