Select Require and Enforce for the Host Checker Policy in the realm authentication policy.
Select Evaluate Policies for the Host Checker policy in the realm authentication policy.
Configure the Host Checker policy as a role restriction for the Employee role.
Configure the Host Checker policy as a resource access policy for the Employee role.
第1题:
You want to create a Host Checker policy that looks for a specific antivirus product that is running on your client machines, but the predefined antivirus options do not include the antivirus product version that you use.Which feature should you verify the antivirus product is up to date?()
A. Enhanced Endpoint Security
B. DP signatures
C. Antivirus licensing
D. Endpoint Security Assessment Plug-in
第2题:
A. All roles are evaluated together.
B. Each role is evaluated separately.
C. Clients must pass all policies to access the role.
D. Clients will pass as long as one policy is accepted.
第3题:
You are designing a password management solution to meet the business and technical requirements. Which two actions should you perform?hich two actions should you perform?()
第4题:
You are configuring an SRX210 as a firewall enforcer that will tunnel IPsec traffic from several Junos Pulse users.Which two parameters must you configure on the SRX210?()
第5题:
Your corporate security policy requires that a user performing attacks must have limited network access and activities until an administrator can investigate.In the admin GUI, which sensor event policy action must you configure in "Configuration" > "Sensors" > "Sensor Event Policies" > [rule name] to accomplish this?()
第6题:
Which two statements are true about applying Host Checker at the realm level?()
第7题:
You navigate to "UAC" > "Infranet Enforcer" > "Auth Table Mapping" in the admin GUI. You see one policy, which is the unmodified, original default policy.Which statement is true?()
第8题:
Sign-in Policy
Role Mapping Rule
Role Restrictions
Trusted Server CA
第9题:
DBMS_RLS.STATIC
DBMS_RLS.DYNAMIC
DBMS_RLS.SHARED_STATIC
DBMS_RLS.CONTEXT_SENSITIVE
DBMS_RLS.SHARED_CONTEXT_SENSITIVE
第10题:
Isolate a file name unique to the custom image and create a custom rule-type of File which matches on the file. Select the Required option under the custom rule.
Identify the MAC address unique to network cards installed in PCs with the custom image and create a custom rule-type of MAC Address which matches on the appropriate MAC address.
Select the Required option under the custom rule Identify the IP address unique to the network cards installed in PCs with the custom image and create a custom rule-type of IP Address which matches on the appropriate IP address. Select the Required option under the custom rule.
Isolate or create a unique Windows registry key for the custom image and create a custom rule- type of Registry Setting which matches on the name of the registry key.
第11题:
Select Require and Enforce for the Host Checker Policy in the realm authentication policy.
Select Evaluate Policies for the Host Checker policy in the realm authentication policy.
Configure the Host Checker policy as a role restriction for the Employee role.
Configure the Host Checker policy as a resource access policy for the Employee role.
第12题:
access profile
IKE parameters
tunneled interface
redirect policy
第13题:
A. Dynamic auth table mapping is not enabled.
B. A successful authentication attempt will result in a new authentication table entry, which will be delivered only to the Junos enforcer protecting the network from which the user has authenticated.
C. To create a static auth table mapping, you must delete the default policy.
D. The default policy applies only to the factory-default role User.
第14题:
You want to create a Host Checker policy that looks for a specific antivirus product that is running on your client machines, but the predefined antivirus options do not include the antivirus product version that you use.Which feature should you verify the antivirus product is up to date?()
第15题:
You are designing a strategy of enforce the corporate security policy. Which action or actions should you perform?()
第16题:
You want to enforce a Host Checker policy so that only users who pass the policy receive the Employee role. In the admin GUI, which two parameters must you configure?()
第17题:
Your security policy requires that users authenticating to the Junos Pulse Access Control Service are connecting from a domain member endpoint on the internal corporate network.Which set of role access restrictions must you configure to enforce this security policy?()
第18题:
You have created a Host Checker policy that contains multiple rules. You want to inform end users which rule specifically has failed.In the admin GUI, which configuration setting would you enable?()
第19题:
You are the network administrator for TestKing.com. The network consists of a single Active Directory domain named testking.com. All network servers run Windows Server 2003, and all client computers run Windows XP Professional. A new management directive states that users can log to the domain only during business hours. Users who remain logged on after business hours must be automatically disconnected from network resources. You need to enforce this directive by using the minimum amount of administrative effort. Which two actions should you perform?() (Each correct answer presents part of the solution. Choose two)
第20题:
Configure the Default Domain Policy Group Policy object (GPO) to increase scheduling priority for all users.
Configure the Default Domain Policy Group Policy object (GPO) to force users to log off when their logon hours expire.
Select all user accounts. Modify the account properties to restrict logon hours to business hours.
Create a domain user account named Temp. Configure the account properties to restrict logon hours to business hours.
Modify the DACL on the Default Domain Policy Group Policy object (GPO) to assign the Allow - Read permission to the Users group.
第21题:
Delegate the password management controls to the help desk staff.
Delegate the password management controls to the Domain Users group.
Configure the Default Domain Policy to enforce password expiration settings.
Configure the Default Domain Controller Policy to enforce password expiration settings.
第22题:
Source IP and browser
Source IP and certificate
Certificate and Host Checker
Host Checker and source IP
第23题:
All roles are evaluated together.
Each role is evaluated separately.
Clients must pass all policies to access the role.
Clients will pass as long as one policy is accepted.
第24题:
If Evaluate is checked then the client must pass policy to get the sign-in page.
If Evaluate is checked then the client can fail policy and still get the sign-in page.
If Require and Enforce is checked then the client must pass policy to get the sign-in page.
If Require and Enforce is checked then the client can fail policy and still get the sign-in page.