单选题Which of the following could be used to restrict access to the local web server to only certain IP addresses?()ACreate an ACL.BCreate an application exception.CConfigure IPSec.DBlock port 80.

题目
单选题
Which of the following could be used to restrict access to the local web server to only certain IP addresses?()
A

 Create an ACL.

B

 Create an application exception.

C

 Configure IPSec.

D

 Block port 80.


相似考题
更多“Which of the following could be used to restrict access to t”相关问题
  • 第1题:

    A site administrator is configuring Resource-level access control.  Which of the following statements about Resource-level access control are true? Resource-level access control policies:()

    • A、are optional
    • B、are used to protect data beans
    • C、provide coarse-grained access control
    • D、never specify a relationship

    正确答案:A,B

  • 第2题:

    Which of the following storage tools could be used to initiate the rebuilding of a failed hard drive?()

    • A、RAID array management
    • B、CHKDSK
    • C、Monitoring agents
    • D、Partitioning management

    正确答案:A

  • 第3题:

    Physical and logical network diagrams are used for which of the following configuration management goals?()

    • A、Track DHCP distribution
    • B、Compare MAC and IP addresses
    • C、Document Internet access history
    • D、Identity network devices

    正确答案:D

  • 第4题:

    Which of the following is used to deny or allow access to a wireless router network?()

    • A、SSID
    • B、SNMP
    • C、IMAP
    • D、MAC filtering

    正确答案:D

  • 第5题:

    Which of the following would be used to monitor unauthorized access to data files?()

    • A、Performance Log and Alerts
    • B、Event Viewer
    • C、Security Configuration and Analysis
    • D、IP Security Monitor

    正确答案:B

  • 第6题:

    Which of the following resources could be used to obtain the latest IBM DS Storage ManagerUser’s Guide?()

    • A、InfoCenter web site
    • B、Announcement letter
    • C、IBM Redbook web site
    • D、IBMTechline/Partnerline

    正确答案:C

  • 第7题:

    Which two statements are true about WHERE and HAVING clauses? ()

    • A、A WHERE clause can be used to restrict both rows and groups.
    • B、A WHERE clause can be used to restrict rows only.
    • C、A HAVING clause can be used to restrict both rows and groups.
    • D、A HAVING clause can be used to restrict groups only.
    • E、A WHERE clause CANNOT be used in a query if the query uses a HAVING clause.
    • F、A HAVING clause CANNOT be used in subqueries.

    正确答案:B,D

  • 第8题:

    多选题
    Which of the following technologies can be used to remotely gain access to a server console?()
    A

    PS/2 KVM

    B

    LDAP

    C

    VNC

    D

    Remote desktop

    E

    VPN


    正确答案: B,A
    解析: 暂无解析

  • 第9题:

    单选题
    Which of the following storage tools could be used to initiate the rebuilding of a failed hard drive?()
    A

     RAID array management

    B

     CHKDSK

    C

     Monitoring agents

    D

     Partitioning management


    正确答案: C
    解析: 暂无解析

  • 第10题:

    单选题
    Which of the following should be used to restrict access to a wireless network?()
    A

    Port forwarding

    B

    Enable SSID broadcast

    C

    Wireless encryption

    D

    Enable DMZ


    正确答案: B
    解析: 暂无解析

  • 第11题:

    多选题
    Which two statements are true about WHERE and HAVING clauses? ()
    A

    A WHERE clause can be used to restrict both rows and groups.

    B

    A WHERE clause can be used to restrict rows only.

    C

    A HAVING clause can be used to restrict both rows and groups.

    D

    A HAVING clause can be used to restrict groups only.

    E

    A WHERE clause CANNOT be used in a query of the query uses a HAVING clause.

    F

    A HAVING clause CANNOT be used in subqueries.


    正确答案: E,B
    解析: 暂无解析

  • 第12题:

    Which of the following could be used to restrict access to the local web server to only certain IP addresses?()

    • A、 Create an ACL.
    • B、 Create an application exception.
    • C、 Configure IPSec.
    • D、 Block port 80.

    正确答案:A

  • 第13题:

    Which of the following would be the BEST way to restrict access to the WAP from certain clients?()

    • A、Disable DHCP server
    • B、Enable WEP encryption
    • C、Disable SSID broadcast
    • D、Enable MAC filtering

    正确答案:D

  • 第14题:

    Which of the following could be used to prevent an attacker from accessing the master boot drive when attaching a hard drive to another system?()

    • A、BIOS password
    • B、Domain membership
    • C、EFS
    • D、Bitlocker

    正确答案:D

  • 第15题:

    Which of the following utilities could be used to determine a subnet mask?()

    • A、PING
    • B、NSLOOKUP
    • C、TRACERT
    • D、IPCONFIG

    正确答案:D

  • 第16题:

    An administrator needs to configure a server to restrict mail traffic to an application server for security reasons.  Which of the following techniques can be used to manage this?()

    • A、 PAT
    • B、 ACLs
    • C、 Subnet masking
    • D、 Port blocking

    正确答案:B

  • 第17题:

    Which statements describe the capabilities of the DBMS_NETWORK_ACL_ADMIN package?()

    • A、It can be used to allow the access privilege settings for users but not roles.
    • B、It can be used to allow the access privilege settings for users as well as roles.
    • C、It can be used to control the time interval for which the access privilege is available to a user.
    • D、It can be used to selectively restrict the access for each user in a database to different host computers.
    • E、It can be used to selectively restrict a user's access to different applications in a specific host computer.

    正确答案:B,C,D

  • 第18题:

    单选题
    An administrator needs to configure a server to restrict mail traffic to an application server for security reasons.  Which of the following techniques can be used to manage this?()
    A

     PAT

    B

     ACLs

    C

     Subnet masking

    D

     Port blocking


    正确答案: A
    解析: 暂无解析

  • 第19题:

    多选题
    Which two statements are true regarding the USING clause in table joins?()
    A

    It can be used to join a maximum of three tables

    B

    It can be used to restrict the number of columns used in a NATURAL join

    C

    It can be used to access data from tables through equijoins as well as nonequijoins

    D

    It can be used to join tables that have columns with the same name and compatible data types


    正确答案: B,A
    解析: 暂无解析

  • 第20题:

    单选题
    Which of the following methods can be used to detect block corruption?()
    A

     ANALYZE operations

    B

     dbv

    C

     SQL queries that access the potentially corrupt block

    D

     RMAN

    E

     All of the above


    正确答案: A
    解析: 暂无解析

  • 第21题:

    单选题
    On the WLSE, which of the following fault policies would be used to verify that access to thecommand-line interface of the access point is secure?()
    A

    registration error

    B

    authentication failures threshold

    C

    HTTP disabled

    D

    Telnet disabled


    正确答案: C
    解析: 暂无解析

  • 第22题:

    多选题
    Which statements describe the capabilities of the DBMS_NETWORK_ACL_ADMIN package?()
    A

    It can be used to allow the access privilege settings for users but not roles.

    B

    It can be used to allow the access privilege settings for users as well as roles.

    C

    It can be used to control the time interval for which the access privilege is available to a user.

    D

    It can be used to selectively restrict the access for each user in a database to different host computers.

    E

    It can be used to selectively restrict a user's access to different applications in a specific host computer.


    正确答案: D,B
    解析: 暂无解析