A user logs in and is mapped to two roles. The first role has a maximum timeout value of 600 minutes and the default Juniper Networks logo on the user interface page. The second role has a maximum timeout value of 1200 minutes and a custom logo on the user interface page. Based on the merging of these two roles, which two will be applied?()
第1题:
After installing a network with one Samba server and several clients, users are complaining that they receive an Unable to browse the network error when trying to visit a public share. What is the most likely cause of this? ()
第2题:
Which of the following is the BEST way to make sure the network printer is automatically installed when the user logs on?()
第3题:
Which of the following logs contains information on overall performance and events not related to user authentication?()
第4题:
An administrator created a .env file in a user’s home directory to configure a number of custom environment variables for a local application. However, after the user logs out and then logs back into the system, the custom variables are not being set What is the most likely reason that the custom .env file is being ignored?()
第5题:
You have an Exchange Server 2010 organization that contains Windows Mobile 5.0 devices. Your company plans to replace all mobile devices with Windows Mobile 6.5 devices. You need to identify which users accessed their mailboxes by using Windows Mobile 5.0 devices in thepast month. What should you do?()
第6题:
Implement a RADIUS request attribute policy to assist with realm selection and create different role-mapping rules for the user in each realm.
Implement a directory/attribute server on the realm and set up this server to determine by group membership the proper role to which a user should be mapped.
Reorder the role-mapping rules to allow for the more open role to be mapped first and then enable the stop processing rules when this rule matches function on this role.
Implement a Host Checker policy on the realm that determines the geographic location of the device and restricts the user based on the results of the policy.
第7题:
Host Checker is disabled.
Host Checker will perform continous checks.
Host Checker will perform checks when user logs out.
Host Checker will perform checks when user first logs in.
第8题:
Software problems don't generate errors.
The user is more knowledgeable about software.
The system logs will provide useful information alone.
Key information pertaining to the software may be uncovered.
第9题:
Configure the terminal server so that users log on by using local user accounts
Configure the terminal server so that users log on by using domain accounts
Configure the server to run SalesForceMax in a dedicated window when a user logs on to the terminal server
Configure the server to allow each user to have a Windows desktop when the user logs on to the terminal server
Use software restriction polices in Group Policy objects (GPOs) that apply to the terminal server
Use Appsec.exe to restrict applications on the terminal server
第10题:
The user will not be able to log-in, as the Junos Pulse Access Control Service device cannot map the user to a realm when the realm value is empty.
The user will be mapped to all realms available to the user.
The Junos Pulse Access Control Service device displays a page where the user must choose from a list of realms.
The endpoint is assigned to the first realm in the list whose authentication server is a match with the endpoints software.
第11题:
A shell other than ksh is being used by the user.
The line ’export ENV=$HOME/.env’ is missing from /etc/profile.
The line ’export ENV=$HOME/.env’ is missing from the user’s .profile.
The env_profile attribute is not defined for the user within /etc/security/user.
第12题:
A shell other than ksh is being used by the user.
The line 'export ENV=$HOME/.env' is missing from /etc/profile.
The line 'export ENV=$HOME/.env' is missing from the user's .profile.
The env_profile attribute is not defined for the user within /etc/security/user.
第13题:
A user in the op_storage group logs onto the DS GUI and goes to the User Administration panel. Which users can be seen and what actions can be performed()
第14题:
Two users share the same Windows 7 computer. The first user creates a document intended to be used by both users, and then logs off. The second user logs on and types the name of the document in the Start menu, but the document is not found. Which of the following is the problem?()
第15题:
Which of the following options indicates why it is important to talk to the user and ask appropriate questions about a software problem? ()
第16题:
You have multiple realms configured on a MAG Series device. A user is authenticating with a non- Junos Pulse Access Control Service client. The username does not contain a realm suffix.Which behavior will the user experience?()
第17题:
You need to design the configuration on one Windows Server 2003 terminal server that hosts the SalesForceMax application to meet security requirements. Which three actions should you take?()
第18题:
A custom logo on the user interface page
A maximum timeout value of 600 minutes
A maximum time out value of 1200 minutes
A default Juniper Networks logo on the user interface page
第19题:
Add the Spanish keyboard layout/IME for the Carmen_eng user account profile
Add the English keyboard layout/IME for the Carmen_span user account profile
Reconfigure the Group Policy Object for the Carmen_eng user account to allow her to change the languages on her computer
Configure the Group Policy Object for the Carmen_span user account to allow her to change the languages on her computer.
第20题:
the user can see all other users, including those in the Admin group, but can modify only the user accounts in theOp_volume and Monitor group
the user can see all the users except those in the Admin group, but can only modify the user’s own account
the user can see only the user’s own account, and cannot modify it
the user can see only the user’s own account, and can change the password only
第21题:
The document is set to hidden.
The document is locked.
The document was saved as a system document.
The document is owned by the first user.
第22题:
The CFO is mapped to the finance role, but the session counter was enabled prior to the role mapping.
The CFO is mapped to the finance role, but the session counter was enabled after the role mapping.
The CFO is mapped to the executive and finance roles, but the CFO was mapped to the executive role first, which does not have the session counter enabled.
The CFO is mapped to the executive and finance roles, but the CFO was mapped to the executive role last, which does not have the session counter enabled.
第23题:
On Computer1, map a drive to an administrative share on Server1. Configure each user's profile path to point to the mapped drive.
Create a shared folder on Server1. Assign Full Control permissions to all users. On Computer1, configure each user's profile path to a folder in the shared folder.
Create a shared folder on Server1. Assign Full Control permissions to all users. On Computer1, configure each user's home folder path to a folder in the shared folder.
On Computer1, map a drive from each client computer to an administrative share on Server1. Configure each user's home folder path to point to the mapped drive.