当前分类: JN0-140
问题:单选题A customer has installed UAC in their network. They have both Windows and Linux endpoints andmust choose a deployment method that everyone can use. Which deployment method allows for multiple platforms? ()A IPsec enforcementB 802.1X enforcementC Source...
查看答案
问题:多选题On a pre-existing OAC, which three options can the Infranet Controller overwrite when the useraccesses the Infranet Controller?()ASSIDBlogin nameCMAC addressDwired adaptersEencryption method...
问题:多选题Which three statements about dynamic filtering are true? ()ADynamic filtering creates a query statement.BDynamic filtering has an option to save query.CDynamic filtering can select any log field to filter.DDynamic filtering permanently removes other lo...
问题:单选题Which additional configuration must be completed when setting up role restrictions using certificates? ()A Set up a certificate authentication server.B Configure the authentication realm to remember certificate information.C Configure the authenticatio...
问题:单选题What is true about the operation of the Infranet Enforcer? ()A It assigns users a set of roles.B It allows access based on auth table entries.C It verifies whether an endpoint meets security requirements.D It configures the UAC agent to allow or deny a...
问题:单选题Which interface does the Infranet Controller use to push the configuration? ()A trusted portB internal portC trust interfaceD untrust interface...
问题:单选题What must be updated regularly to detect the newest versions of personal firewalls on endpoints? ()A Infranet Enforcer firmwareB Infranet Controller rollback softwareC Host Security Assessment Plug-in (HSAP)D Endpoint Security Assessment Plug-in (ESAP)...
问题:单选题Which action is optional when adding an authentication realm for use on an Infranet Controller? ()A Modify sign-in policy.B Configure role mapping.C Assign authentication server.D Configure authentication policy....
问题:单选题What happens when Host Checker is configured to perform checks every "0" minutes? ()A Host Checker is disabled.B Host Checker will perform continous checks.C Host Checker will perform checks when user logs out.D Host Checker will perform checks when us...
问题:多选题Which two methods of authentication are used by the Infranet Controller for IPSec enforcement?()Adial-up VPNBIKE authenticationCXAuth authenticationDshared IKE authentication...
问题:单选题Your company has a mix of employees and contractors. Contractor usernames always begin with"con-"; employee usernames never begin with "con-". You need to give employees access to allresources and give contractors access to a limited set of resources. ...
问题:单选题When the Infranet Enforcer is set up in transparent mode, which additional resource policy must be configured to use OAC for IPsec enforcement? ()A IPsec RoutingB Access ControlC IP Address PoolD Source Interface...