Create an ACL.
Create an application exception.
Configure IPSec.
Block port 80.
第1题:
A site administrator is configuring Resource-level access control. Which of the following statements about Resource-level access control are true? Resource-level access control policies:()
第2题:
Which of the following storage tools could be used to initiate the rebuilding of a failed hard drive?()
第3题:
Physical and logical network diagrams are used for which of the following configuration management goals?()
第4题:
Which of the following is used to deny or allow access to a wireless router network?()
第5题:
Which of the following would be used to monitor unauthorized access to data files?()
第6题:
Which of the following resources could be used to obtain the latest IBM DS Storage ManagerUser’s Guide?()
第7题:
Which two statements are true about WHERE and HAVING clauses? ()
第8题:
PS/2 KVM
LDAP
VNC
Remote desktop
VPN
第9题:
RAID array management
CHKDSK
Monitoring agents
Partitioning management
第10题:
Port forwarding
Enable SSID broadcast
Wireless encryption
Enable DMZ
第11题:
A WHERE clause can be used to restrict both rows and groups.
A WHERE clause can be used to restrict rows only.
A HAVING clause can be used to restrict both rows and groups.
A HAVING clause can be used to restrict groups only.
A WHERE clause CANNOT be used in a query of the query uses a HAVING clause.
A HAVING clause CANNOT be used in subqueries.
第12题:
Which of the following could be used to restrict access to the local web server to only certain IP addresses?()
第13题:
Which of the following would be the BEST way to restrict access to the WAP from certain clients?()
第14题:
Which of the following could be used to prevent an attacker from accessing the master boot drive when attaching a hard drive to another system?()
第15题:
Which of the following utilities could be used to determine a subnet mask?()
第16题:
An administrator needs to configure a server to restrict mail traffic to an application server for security reasons. Which of the following techniques can be used to manage this?()
第17题:
Which statements describe the capabilities of the DBMS_NETWORK_ACL_ADMIN package?()
第18题:
PAT
ACLs
Subnet masking
Port blocking
第19题:
It can be used to join a maximum of three tables
It can be used to restrict the number of columns used in a NATURAL join
It can be used to access data from tables through equijoins as well as nonequijoins
It can be used to join tables that have columns with the same name and compatible data types
第20题:
ANALYZE operations
dbv
SQL queries that access the potentially corrupt block
RMAN
All of the above
第21题:
registration error
authentication failures threshold
HTTP disabled
Telnet disabled
第22题:
It can be used to allow the access privilege settings for users but not roles.
It can be used to allow the access privilege settings for users as well as roles.
It can be used to control the time interval for which the access privilege is available to a user.
It can be used to selectively restrict the access for each user in a database to different host computers.
It can be used to selectively restrict a user's access to different applications in a specific host computer.