You must configure access to the corporate network for employees using a client access method. Users require IPsec tunneling to protected resources and an 802.1X supplicant. Users will access the network using Windows platforms.Which two client access methods would support these requirements?()
第1题:
A. Configure a captive-portal service that redirects all traffic back to the Junos Pulse Access Control Service.
B. Configure a security policy that references the unified-access-control captive-portal service.
C. Configure a captive-portal service that redirects unauthenticated traffic back to the Junos Pulse Access Control Service.
D. Configure a security policy that references the unified-access-control intranet-controller service.
第2题:
You work as the enterprise exchange administrator at Xxx .The Xxx network is running in a Microsoft Exchange Server 2010 environment.A SMTP server on the Internet has rejected some email sent from Xxx .What actions must you take to determine why this happened?()
第3题:
A new switch is being installed and you have been assigned the task of connecting it to an existing switch. In doing this, you want to set up the VLAN Trunking Protocol so that VLAN information can be passed between the switches. Which of the following must you do to accomplish this?()
第4题:
When using RADIUS as an external authentication method for 802.1X authentication for the Junos Pulse Access Control Service, what must you do to ensure that the RADIUS authentication works properly?()
第5题:
You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. You intend to configure FILESTREAM data, enabling FILESTREAM for file I/O streaming access and allowing remote client computers to have streaming access to FILESTREAM data. You must make sure that FILESTREAM data is enabled. In the options below, which service should you configure? ()
第6题:
You work as the enterprise exchange administrator at Xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution.What actions must you take to change the Exchange-specific cost for a site link?()
第7题:
You are designing a remote access strategy to meet the business and technical Requirement. What should you do?()
第8题:
You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. Now your company CIO assigns a task to you. The company CIO wants you to configure FILESTREAM data and the two requirements below must be met: you must enable FILESTREAM for file I/O streaming access; remote client computers must be able to have streaming access to FILESTREAM data. You must make sure that FILESTREAM data is enabled. Which service should you configure? ()
第9题:
You should configure Distributed File System
You should configure SQL Server
You should configure SQL Server Full Text
You should configure SQL Server VSS Writer
第10题:
When you configure access to the wired network at home, set the wired network adapter location type to Public.
When you configure access to the wired network at home, set the wired network adapter location type to Private.
When you configure access to the public wireless access points, set the wireless network adapter location type to Public.
When you configure access to the public wireless access points, set the wireless network adapter location type to Private.
第11题:
Junos Pulse
Java Agent
Odyssey Access Client
Native 802.1X supplicant
第12题:
Configure a directory service access audit policy. Increase the maximum size of the security log.
Configure a directory service access audit policy. Set the system log to overwrite events older than 7 days.
Configure an object access audit policy for the directory. Increase the maximum size of the system log.
Configure an object access audit policy for the directory. Set the security log to overwrite events older than 7 days.
第13题:
You want to use the Flashback Transaction Query feature to identify all the changes made to your database within a specific time period. What is a prerequisite for using the Flashback Transaction Query feature?()
第14题:
You are a database administrator for your company. The company has two SQL Server 2005 computers named SQL1 and SQL2. SQL1 is located on the local network. SQL2 is located at a vendors site and is connected by using a VPN over the Internet. You need to write heterogeneous queries on SQL1 that access data from both SQL1 and SQL2. To ensure that your queries are functional, you must configure access to the vendors site. What should you do?()
第15题:
You are configuring an SRX210 as a firewall enforcer that will tunnel IPsec traffic from several Junos Pulse users.Which two parameters must you configure on the SRX210?()
第16题:
You need to design a method to protect traffic on the wireless network. Your solution must meet the requirements of the chief security officer. What should you do?()
第17题:
Your computer has a wired network adapter and a wireless network adapter. You use the wireless network adapter only when traveling. You need to configure the network adapter profile settings to ensure that other systems are allowed to discover your computer only when you are at home. What are two possible ways to achieve this goal?()
第18题:
You need to design an authentication solution for the wireless network. Your solution must meet the security requirements. What should you do?()
第19题:
Your company has two branch offices that connect by using a WAN link. Each office contains a server that runs Windows Server 2008 R2 and that functions as a file server. Users in each office store data on the local file server. Users have access to data from the other office. You need to plan a data access solution that meets the following requirements: èFolders that are stored on the file servers must be available to users in both offices. èNetwork bandwidth usage between offices must be minimized. èUsers must be able to access all files in the event that a WAN link fails. What should you include in your plan?()
第20题:
Configure each server running Routing and Remote Access as a RADIUS Client.
Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as VPN access.
Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as dialup access.
Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as wireless access.
第21题:
Enable Anonymous access. Enable Integrated Windows authentication.
Enable Anonymous access. Enable Basic authentication.
Disable Anonymous access. Enable Integrated Windows authentication.
Disable Anonymous access. Enable Basic authentication.
第22题:
when you want to conserve tunnel resources
when the remote peer is a dialup or remote access client
when you want to configure a tunnel policy with an action of deny
when a dynamic routing protocol such as OSPF must be sent across the VPN
第23题:
CLI
WebUI
NSM
Junos Pulse Access Control Service
第24题:
You should configure SQL Server VSS Writer
You should configure Distributed File System
You should configure SQL Server
You should configure SQL Server Full Text