What is a Host Enforcer policy?()
第1题:
You have a firewall enforcer protecting resources in a data center. A user is experiencing difficulty connecting to a protected resource.Which two elements must exist so the user can access the resource?()
A. Resource access policy on the MAG Series device
B. IPsec routing policy on the MAG Series device
C. General traffic policy blocking access through the firewall enforcer
D. Auth table entry on the firewall enforcer
第2题:
A. You do not need to configure a RADIUS client policy.
B. You must know the exact model number of the Infranet Enforcer.
C. You must specify the NACN password of the device in the RADIUS client policy.
D. You do not need to designate a location group to which the Infranet Enforcer will belong.
第3题:
Your company runs Remote Desktop Services. You have a Remote Desktop Session Host (RD Session Host) server. You need to ensure that remote desktop users can print only to the printers that are installed on the RD Session Host server. What should you do?()
第4题:
What must be updated regularly to detect the newest versions of personal firewalls on endpoints? ()
第5题:
What is the function of Host Checker?()
第6题:
You have a firewall enforcer protecting sensitive internal resources in a data center. The network traversed by endpoint traffic is semi-trusted, so you need to encrypt the traffic between the endpoints accessing the resources and the firewall enforcer.Which type of policies provide this level of protection?()
第7题:
Create a Remote Desktop resource authorization policy (RD RAP).
Create a Remote Desktop connection authorization policy (RD CAP).
Install and configure the Remote Desktop Licensing role service.
Install and configure the Remote Desktop Connection Broker role service.
第8题:
A policy that is defined on the endpoint that permits or denies inbound or outbound traffic.
A policy that is sent to the endpoint that permits or denies inbound or outbound traffic.
A policy that is sent to the protected resource that permits or denies inbound or outbound traffic.
A policy that is defined on the protected resource that permits or denies inbound or outbound traffic.
第9题:
Enable the Do not allow client printer redirection Group Policy setting.
Disable the Do not allow client printer redirection Group Policy setting.
Enable the Do not set default client printer to be default printer in a session Group Policy setting.
Disable the Do not set default client printer to be default printer in a session Group Policy setting.
第10题:
Telnet is not being permitted by self policy.
Telnet is not being permitted by security policy.
Telnet is not allowed because it is not considered secure.
Telnet is not enabled as a host-inbound service on the zone.
第11题:
Resource access policy on the MAG Series device
IPsec routing policy on the MAG Series device
General traffic policy blocking access through the firewall enforcer
Auth table entry on the firewall enforcer
第12题:
to specify the destination addresses to which access is permitted
to specify the source address permitted to access the resource
to specify the services to which access is permitted
to inform the enforcer to expect policy information from the Junos Pulse Access Control Service
第13题:
A. Infranet Enforcer firmware
B. Infranet Controller rollback software
C. Host Security Assessment Plug-in (HSAP)
D. Endpoint Security Assessment Plug-in (ESAP)
第14题:
Which statement is correct about defining an Infranet Enforcer for use as a RADIUS Client? ()
第15题:
In a Junos Pulse Access Control Service firewall enforcement configuration, what is the purpose of the source IP policy?()
第16题:
You navigate to "UAC" > "Infranet Enforcer" > "Auth Table Mapping" in the admin GUI. You see one policy, which is the unmodified, original default policy.Which statement is true?()
第17题:
You are not able to telnet to the interface IP address of your device from a PC on the same subnet. What iscausing the problem?()
第18题:
Your company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 7. You have a Remote Desktop Session Host (RD Session Host) server. You have the following requirements: H Local devices from remote desktop clients must be redirected to the RD Session Host server . H USB devices from remote desktop clients must not be redirected to the RD Session Host server. What should you do?()
第19题:
To allow clientless access to the network
To restrict access to protected resources on the network
To scan an endpointfor compliance with security policies
To push a firewall policy to the endpoint's local firewall application
第20题:
guest-vlan
auth-fail-vlan
server-reject-vlan
server-fail-vlan
第21题:
Select Require and Enforce for the Host Checker Policy in the realm authentication policy.
Select Evaluate Policies for the Host Checker policy in the realm authentication policy.
Configure the Host Checker policy as a role restriction for the Employee role.
Configure the Host Checker policy as a resource access policy for the Employee role.
第22题:
The host needs to open the telnet port.
The host needs a route for the translated address.
The administrator must use a proxy-arp policy for the translated address.
The administrator must use a security policy, which will allow communication between the zones.
第23题:
Dynamic auth table mapping is not enabled.
A successful authentication attempt will result in a new authentication table entry, which will be delivered only to the Junos enforcer protecting the network from which the user has authenticated.
To create a static auth table mapping, you must delete the default policy.
The default policy applies only to the factory-default role User.