搜题
用户您好, 请在下方输入框内搜索其它题目:
搜题
题目内容 (请给出正确答案)
提问人:网友 发布时间:
【单选题】

Your corporate security policy requires that a user performing attacks must have limited network access and activities until an administrator can investigate.In the admin GUI, which sensor event policy action must you configure in "Configuration" > "Sensors" > "Sensor Event Policies" > [rule name] to accomplish this?()

A、Ignore

B、Replace users role

C、Terminate user session

D、Disable user account

更多“Your corporate security policy requires that a user performing attacks must have limited network access and activities until an administrator can investigate.In the admin GUI, which sensor event policy action must you configure in "Configuration" > "Sensors" > "Sensor Event Policies" > [rule name] to accomplish this?()”相关的问题
第1题

A、to secure communication between two remote PCs  B、to secure communication between two remote offices  C、to secure communication betweenan remote PC and the corporate intranet  D、to secure communication between a corporate intranet and the public internet  

点击查看答案
第2题

A、Apply an IPsec NAP policy.  B、Configure a NAP Policy for 802.1x Wireless connections.  C、Configure VPN connections to use MS-CHAP v2 authentication.  D、Restrict dynamic host configuration protocol (DHCP) clients by using NAP.  

点击查看答案
第3题

A、Apply an IPsec NAP policy.  B、Configure a NAP policy for 802.1X wireless connections.  C、Configure VPN connections to use MS-CHAP v2 authentication.  D、Restrict Dynamic Host Configuration Protocol (DHCP) clients by using NAP.  

点击查看答案
第6题

A、Apply an IPsec NAP policy.  B、Configure a NAP Policy for 802.1x Wireless connections  C、Configure VPN connections to use MS-CHAP v2 authentication  D、Restrict Dynamic Host Configuration Protocol (DHCP) clients by using NAP  

点击查看答案
第7题

A、Apply an IPsec NAP policy.  B、Configure a NAP policy for 802.1X wireless connections.  C、Configure VPN connections to use MS-CHAP v2 authentication.  D、Restrict Dynamic Host Configuration Protocol (DHCP) clients by using NAP  

点击查看答案
第8题

A、Use secedit.exe to refresh the security policy.  B、Use the local computer policy to configure the local security policy.  C、Use security configuration and analysis to support the security files as a .pol file.  D、Use computer management to configure the security policy setting.  

点击查看答案
第9题

A、For all the security-sensitive members, set the ProtectionLevel parameter of the MessageBodyMember or MessageHeader attribute to EncryptAndSign.  B、Implement IEndpointldentityProvider in the message contract class.  C、Implement ISecureConversationSession in the message contract class.  D、For all the security-sensitive members, set the ProtectionLevel parameter of the MessageBodyMember or MessageHeader attribute to Sign.  

点击查看答案
客服
TOP

请使用微信扫码支付

订单号:
遇到问题请联系在线客服