For security reasons, an administrator is asked to modify the system to prevent someone from leaving a terminal logged in. To enable a five minute timeout for all users, what would need to be done to accomplish this task?()
![](/upload/20220827/c85071da6ff0aadc10ebce6c25bb4f0d.png)
相似题目
-
An International Ship Security Certificate shall be issued for a period specified by the Administration which shall not exceed ()
-
A wireless client cannot connect to an 802.11b/g BSS with a b/g wireless card. The client section of the access point does not list any active WLAN clients. What is a possible reason for this?()
-
You examine the port statistics on a Cisco Catalyst switch and notice an excessive number offrames are being dropped. Which of the following are possible reasons for the drops?()
-
In securing deck loads for an ocean tow,drill pipe should be().
-
An operator is asked to shutdown the telnet service for security reasons. What are the appropriate commands to achieve this?()
-
When a flash-type evaporator is to be secured for an extended period of time, the entire unit should be drained, cleaned, and ().
-
As an experienced Network Engineer, you are required to implement the security architecture assessment. Which of the following statement describes the most important reason for that?()
-
For security reasons, an administrator is asked to modify the system to prevent someone from leaving a terminal logged in. Which of the following options would enable a five minute timeout for all users()
-
There are many reasons why customers lack sufficient security measures on the network. Which two reasons for insufficient security are typical of the customers today?()
-
A customer is considering a DS3500 to replace an installed DS3400. Which is a supporting reason for this change of the following?()
-
Every lifeboat which is fitted with a fixed()VHF radiotelephone apparatus with an antenna which is separately mounted shall be provided with arrangements for sitting and securing the antenna effectively in its operating position.
-
You previously secured your listener with an encrypted password. However, you need to set a new password for security reasons. What is the correct method for setting a new encrypted password for the listener using the Listener Control utility?()
-
You are developing an application to create a new file on the local file system.You need to define specific security settings for the file. You must deny the file inheritance of any default security settings during creation.What should you do?()
-
What is valid reason for a switch to deny port access to new devices when port security is enabled?()
-
A customer is involved in an IBM critical situation (CritSit). The customer recently installed iDATAPIex. The business partner has been assessed a significant penalty by IBM. Which of the following is the reason for this action by IBM?()
-
A network administrator receives an error message while tring to configure the Ethernet interface of a router with IP address 10.24.24.24/29.which statement explains the reason for this issue?()
-
A meteorologist’s report about the reasons for and the aftermath of a blizzard is an example of a piece of writing that emphasizes _____.
-
An adapter that works in France won’ t work in Australia or Japan. For that reason, it’ s important to have a reliable travel power adapter to bring with you.
-
\on account of\ = \give an explanation or reason for\ ( )
-
Which one is NOT the reason for the airtight security at the data center?
-
You have created a security policy on an SRX240 that permits traffic from any source-address, any destination-address, and any application. The policy will be a source IP policy for use with the Junos Pulse Access Control Service.What must you add to complete the security policy configuration?()
-
Secure Shell (SSH) is a cryptographic network protocol for () remote login and other secure network services over an(请作答此空)network.The standard()port for SSH is 22. The best known example applicatio
-
Secure Shell (SSH) is a cryptographic network protocol for (请作答此空) remote login and other secure network services over an()network.The standard()port for SSH is 22. The best known example applicatio
推荐题目
- 分度号为K的热电偶错接了补偿导线的正负极,则实际的温度如何()。
- 容量最大的孵化器类型是()式。
- 使用螺杆钻具钻塞前,应用小于套管内径6~8mm的通井规通井。
- ()应立足于体现产品或服务的功能与众不同、客户服务更加周到和服务人员的业务技能更全面等方面。
- 根据巴甫洛夫关于高级神经活动的类型学说,()类型属于神经兴奋与抑制不均衡型。
- 实行单一同央银行制的国家有
- 电气控制方法中,最基本应用最广的方法()
- “菌子中的贵族”成员主要有:
- 患者男,19岁。因发热,伴有咳嗽,痰多2天入院。查体:面部潮红、多汗,脉搏、呼吸加快,临床已诊断为"左下叶性肺炎"。病人一般还会具有下述阳性体征,但不包括
- 下列行为中,情节严重,对直接责任者和领导责任者应给予撤销党内职务或者留党察看处分的有: