Permissions are configured individually for each user.
Users are associated with user classes, and each class defines the permissions for entering commands.
There are four default classes with different permissions and you can only use these four.
Permissions are associated with each user ID
第1题:
A.Permissions are configured individually for each user.
B.Users are associated with user classes, and each class defines the permissions for entering commands.
C.There are four default classes with different permissions and you can only use these four.
D.Permissions are associated with each user ID
第2题:
How are the commands a user is allowed to enter defined in JUNOS?()
第3题:
You need to configure port security on switch R1. Which two statements are true about this technology? ()
第4题:
You are the network administrator for Testking.com. The network consists of a single Active Directory domain named testking.com. The sales department is hiring employees. An OU named TestKingSales is created to hold objects for the new sales department users. Each sales department user has a portable computer. Each portable computer runs Windows XP Professional. The sales department users are responsible for joining their portable computers to the domain. You need to ensure that the computer accounts for the Sales department user's portable computers are created in the TestKingSales OU. You need to achieve this goal without granting any unnecessary permissions. What should you do?()
第5题:
You are the administrator of your company’s network. You purchase 75 new Windows 2000 Professional computers that will be shared by the users in Graphic organizational unit (OU). All the computers are configured identically. You want the users to be able to maintain their individual desktop settings regardless of which computer they use. You want to accomplish this with the least amount of administrative effort. What should you do? ()
第6题:
Your company has four offices. The network contains a single Active Directory domain. Each office has domain controller. Each office has an organitational unit (OU) that contains the user accounts for the users in that office. In each office, support technicians perform basic troubleshooting for the users in their respective office. You need to ensure that the support technicians can reset the password for the user accounts in their respective office only. The solution must prevent the thechnicians from creating user accounts. What shoul you do()
第7题:
Assign the sales department users the Allow - Read permissions for the Computer container.
Configure the sales department users' user accounts to be trusted for delegation
Prestage the computer accounts in the TestKingSales OU for the sales department users' portable computers.
Assign the sales depertment users the Allow - Create all Child Objects permission for the TestKingSales OU.
第8题:
On Computer1, map a drive to an administrative share on Server1. Configure each user's profile path to point to the mapped drive.
Create a shared folder on Server1. Assign Full Control permissions to all users. On Computer1, configure each user's profile path to a folder in the shared folder.
Create a shared folder on Server1. Assign Full Control permissions to all users. On Computer1, configure each user's home folder path to a folder in the shared folder.
On Computer1, map a drive from each client computer to an administrative share on Server1. Configure each user's home folder path to point to the mapped drive.
第9题:
The first authentication realm that was added to the sign-in policy is used by default.
The user is allowed to choose the correct authentication realm from a list presented by Junos Pulse.
When Junos Pulse is initially installed on the desktop, it must be configured with the correct realm.
This is not an allowed configuration; the administrator should configure separate sign-in policies for each realm.
第10题:
Remove User1 as a delegate, and then grant User1 Send As permissions to User2¯s mailbox
Remove User1 as a delegate, and then grant User1 Send on Behalf permissions to User2¯s mailbox
Create a Sharing policy, and then grant User1 Modify permissions to User2¯s mailbox
Create a Sharing policy, and then grant User1 Full Mailbox permissions to User2¯s mailbox
第11题:
Configure each computer to join a workgroup. Create a user account and a local profile for each user.
Configure each computer to join a workgroup. Create a domain user account that uses roaming user profiles.
Configure each computer to join the domain. Create a user account for each user on a domain controller.
Configure each computer to join the domain. Create domain user accounts that use roaming user profiles.
第12题:
Create a single organizational unit (OU). Place the user accounts for each office in the OU. Delegate control over the OU to the office’s server administrators and the central IT staff
Create a single Exchange administrative group. Place all Exchange servers into that administrative group. Assign permissions for the administrative group to the officer’s server administrators and the central IT staff
Create an Exchange administrative group for each office. Place the Exchange severs for each office into that office’s administrative group. Assign permissions for the administrative group to the office’s server administrators. Allow the central IT staff to manage user mailboxes
Create an organizational unit (OU) for each office. Place the user accounts for each office into the appropriate OU. Delegate control over each OU to the office’s server administrators. Allow the central IT staff to manager user mailboxes
第13题:
A. All defined VLANs are allowed on the trunk by default.
B. Each VLAN, or VLAN range, that is specified with the switchport mode command.
C. Each VLAN, or VLAN range, that is specified with the vtp domain command.
D. Each VLAN, or VLAN range, that is specified with the vlan database command.
第14题:
Which two statements are true of login classes?()
第15题:
Which two statements about login classes correctly define their usage within the JUNOS software?()
第16题:
You need to design an administrative model for the Exchange Server environment. What should you do?()
第17题:
You need to design an access control and permission strategy for user objects in Active Directory.What should you do?()
第18题:
You network contains a server named Server1. You have a computer named Computer1 that runs Windows XP Professional. Employees log on to Computer1 by using local user accounts. You need to configure the user profiles on Computer1 to be stored on Server1. What should you do?()
第19题:
Users can be members of multiple login classes.
Login classes define authorization parameters for a user.
There are five system-defined login classes.
Login class permission flags can be overridden for certain commands.
第20题:
Click Admin > Users. Enter username, password, role, account status, and email.
Click Admin > Users. Enter username, password, role, account status, and user class.
Click Users > Manage Users. Enter username, password, role, account status, and user class.
Click Users > Manage Users. Enter username, password, ActiveDirectory domain, account status, and role.
第21题:
Make the members of the AdvancedSupport security group members of the Domain Admins security group
Give each desktop support technician permission to reset passwords for the top-level OU that contains user accounts at their own location
Delegate full control over all OUs that contain user accounts to all AllSupport security group
Change the permissions on the domain object and its child objects so that the BasicSupport security group is denied permissions. Then, add a permission to each OU that contains user accounts that allows AllSupport security group members to reset passwords in that OU
第22题:
Port security can be configured for ports supporting VoIP.
With port security configured, four MAC addresses are allowed by default.
The network administrator must manually enter the MAC address for each device in order for the switch to allow connectivity.
Withsecurity configured, only one MAC addresses is allowed by default.
Port security cannot be configured for ports supporting VoIP.
第23题:
A different login class must be configured for each user.
Individual commands can be explicitly allowed or denied.
A user must be assigned to one of the default login classes.
Each login class is associated with one or more permissions flags.