You are receiving reports of pos

题目

You are receiving reports of possible unauthorized access to resources protected by a firewall enforcer running the Junos OS. You want to verity which users are currently accessing resources through the enforcer.Which command should you use to verify user access on the enforcer?()

  • A、show services unified-access-control authentication-table
  • B、show auth table
  • C、show services unified-access-control policies
  • D、show services unified-access-control captive-portal
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Thank you ______ advance for your help and we look forward to receiving your recommendations.

A、at

B、from

C、in

D、to


正确答案:C

第2题:

You are the administrator of a SQL Server 2000 computer. Your company purchased an accounting application from a vendor. The application stores its data in a database named Accounting on the server. The tables in this database contain columns that function as primary keys, but PRIMARY KEY and FOREIGN KEY constraints are not used.

You need to replicate data from this database to another SQL Server computer. This server will use the replicated data to generate reports. Most reports will run each month, but the accounting department needs to have the ability to run reports at any time. Reports should be accurate through the last full working day.

You cannot make any changes to the database, but you need to implement replication. Which two actions should you take? (Each correct answer presents part of the solution. Choose two)

A.Implement merge replication.

B.Implement snapshot replication.

C.Implement transactional replication.

D.Schedule replication to run continuously.

E.Schedule replication to run during off-peak hours.


正确答案:BE
解析:Explanation:
B: Snapshot replication is the best solution since we will not be making changes to the Accounting database but need to replicate data from the database to another SQL Server computer and as the accounting department needs to have the ability to run reports that only need to be accurate through the last full working day.

E: Only one snap-shot replication would be necessary per day, and to make as little impact on the daily use of the server this replication should be scheduled during off-peak hours.

Note: SQL Server 2000 provides three types of replication that can be used in distributed applications. These are snapshot replication, transactional replication and merge replication. Each type provides different capabilities.

Snapshot replication is the process of copying and distributing data and database objects exactly as they were at the time the snapshot was taken. Snapshot replication does not require continuous monitoring of changes because changes made to published data are not propagated to the Subscriber incrementally. Subscribers are updated with a complete data set and not individual transactions. As snapshot replication replicates an entire data set at one time, it may take longer to propagate data modifications to Subscribers. This type of replication in helpful in situations when data is mostly static and does not change often; it is acceptable to have copies of data that are out of date for a period of time; replicating small volumes of data; and when sites are often disconnected and high latency (the amount of time between when data is updated at one site and when it is updated at another) is acceptable.

In transactional replication, an initial snapshot of data is propagated to Subscribers, and then when data modifications are made at the Publisher, the individual transactions are captured and propagated to Subscribers. SQL Server 2000 monitors INSERT, UPDATE, and DELETE statements, and changes to stored procedure executions and indexed views. SQL Server 2000 stores the transactions affecting replicated objects and then it propagates those changes to Subscribers continuously or at scheduled intervals. Transaction boundaries are preserved. Transactional replication is used when data modifications must be propagated to Subscribers, often as they occur; transactions must be atomic; subscribers are mostly connected to the Publisher and when the application will not tolerate high latency for Subscribers receiving changes.

Merge replication allows various sites to work autonomously and merge data modifications made at multiple sites into a single, uniform. result at a later time. The initial snapshot is applied to Subscribers and then SQL Server 2000 tracks changes to published data at the Publisher and at the Subscribers. The data is synchronized between servers either at a scheduled time or on demand. Updates are made independently at more than one server, so the same data may have been updated by the Publisher or by more than one Subscriber. Therefore, conflicts can occur when data modifications are merged. This type of replication is helpful when multiple Subscribers need to update data at various times and propagate those changes to the Publisher and to other Subscribers; Subscribers need to receive data, make changes offline, and synchronize changes later with the Publisher and other Subscribers; the application latency requirement is either high or low, and when site autonomy is critical.

Incorrect Answers:
A: No data at the second server will not be changed so there is no need to use merge replication.

C: We don’t need the accuracy of transactional replication. In this scenario high latency is permissible as the reports must be accurate only through the last full working day.

Note: Transactional replication is used when data modifications must be propagated to Subscribers, often as they occur; transactions must be atomic; subscribers are mostly connected to the Publisher and when the application will not tolerate high latency for Subscribers receiving changes.

D: As the reports must be accurate through the last full working day, it not necessary to run replication continuously. Running replication continuously will place locks on the destination database, which would hamper the performance of queries and actions run against the destination database.

第3题:

We look forward ( ) receiving your prompt reply and ( ) you soon.

A.to, meeting

B.to, meet

C.to, met

D.on, meeting


参考答案:A

第4题:

Using the reports server how would you force the orders report in the orders entry application to run every six hours?()

  • A、Schedule the report's execution in the queue manager. 
  • B、Schedule the reports execution using the R30RQM command line with scheduled parameter. 
  • C、Create a trigger in the application to execute the report every six hours. 
  • D、You cannot schedule a reports execution.

正确答案:A

第5题:

If you want to reset your configuration back to the factory defaults but keep your logs and reports,Which CLI command should you use?()

  • A、resetconfig
  • B、restoreconfig
  • C、loadconfig
  • D、reload

正确答案:A

第6题:

You are receiving reports of possible unauthorized access to resources protected by a firewall enforcer running the Junos OS. You want to verity which users are currently accessing resources through the enforcer.Which command should you use to verify user access on the enforcer?()

A. show services unified-access-control authentication-table

B. show auth table

C. show services unified-access-control policies

D. show services unified-access-control captive-portal


参考答案:A

第7题:

You administer your company‘s network. All client computers run Microsoft Windows Vista. A standard user reports that they are unable to install an application. You need to install the applicatin.What should you do?()

A.A

B.B

C.C

D.D


参考答案:B

第8题:

You need to create a web share on your Windows 2000 Professional computer named Admin01. You create a folder named reports. Then you configure web sharing on Reports. You name the share WebReports and allow Read permissions on the share.

You test the web share by pointing to http://admin01/WebReports from another computer. You receive the following error message, 'You are not authorized to view this page.'

You need to be able to access the folder. What must you do?

A.Allow write permission on WebReports.

B.Allow directory browsing permissions on WebReports.

C.In the IIS console, enable anonymous access to WebReports.

D.In the IIS console, set the execute permissions option to script. and executables on WebReports.


正确答案:C
解析:Explanation: The proper NTFS permissions, read permission, have already been granted. To access the folder through Internet Explorer the folder must be published in Internet Information Services (IIS), and authentication through IIS must be provided. By enabling anonymous access in the IIS console the folder would be accessible through Internet Explorer.

Incorrect answers:
A: Only read permission is required to view a page, not write permissions. And read permission is already granted.

B: Via directory browsing, web site visitors are able to view the contents of directories as a list of files. Directory browsing is not used to allow access to a web share.

D: The execute permission is only required to enable the user to run scripts and executables. It is not required to view the web share.

第9题:

Bob, a user, reports that his computer is running slower since he viewed an online training presentation. Bob is also receiving an increased amount of spam email. Which of the following is the MOST likely cause of Bob’s issue?()

  • A、Virus
  • B、Worm
  • C、Network bandwidth
  • D、Malware

正确答案:D

第10题:

You design a Business Intelligence (BI) solution by using SQL Server 2008. You create a SQL Server 2008 Reporting Services (SSRS) solution. You create reports by using Microsoft Visual Studio .NET 2008. The development team of your company must create 50 SSRS reports. You need to ensure that the company logo and the company name are included in the page header of all the reports. What should you do?()

  • A、 Create an SSRS report and include the required page header in the report. Use the report as a template for all the reports.
  • B、 Create an SSRS report and include the required page header in the report. Create a subreport that refers to the report. Include the subreport to all the reports.
  • C、 Create a SSRS report and include the required page header in the report. Copy the report definition to an XML file.Add the XML file as a data source for all the reports.
  • D、 Create a SSRS report and include the required page header in the report. Create a class library that includes the report.Add the class library as an assembly reference for all the reports.

正确答案:A

更多相关问题