多选题What are two valid configurations for user-driven remediation when a Windows-based endpoint fails a Host Checker policy?()AKill a running process on the endpoint, based on executable name and MD5 checksum.BDelete a file on the endpoint's file system.CD

题目
多选题
What are two valid configurations for user-driven remediation when a Windows-based endpoint fails a Host Checker policy?()
A

Kill a running process on the endpoint, based on executable name and MD5 checksum.

B

Delete a file on the endpoint's file system.

C

Download and run a remediation executable from the local software distribution server.

D

Alter registry entries to prevent future execution of an executable, based on executable name and full path.


相似考题
更多“多选题What are two valid configurations for user-driven remediation when a Windows-based endpoint fails a Host Checker policy?()AKill a running process on the endpoint, based on executable name and MD5 checksum.BDelete a file on the endpoint's file system.CD”相关问题
  • 第1题:

    Your company has deployed the Junos Pulse Access Control Service. The system administrator notices that the Host Checker policies are not being applied and enforced. You have verified that the controllers configuration is correct.Which two conditions are causing this issue?()

    A. The endpoint is using EAP-PEAP with EAP-GTC as the inner protocol,

    B. The endpoint is using EAP-TTLS with EAP-JUAC as the inner protocol.

    C. The endpoint is using EAP-FAST with EAP-GTC as the inner protocol,

    D. The endpoint is using EAP-PEAP with EAP-JUAC as the inner protocol.


    参考答案:A, C

  • 第2题:

    You want to create a Host Checker policy that looks for a specific antivirus product that is running on your client machines, but the predefined antivirus options do not include the antivirus product version that you use.Which feature should you verify the antivirus product is up to date?()

    A. Enhanced Endpoint Security

    B. DP signatures

    C. Antivirus licensing

    D. Endpoint Security Assessment Plug-in


    参考答案:D

  • 第3题:

    What is a Host Enforcer policy?()

    • A、A policy that is defined on the endpoint that permits or denies inbound or outbound traffic.
    • B、A policy that is sent to the endpoint that permits or denies inbound or outbound traffic.
    • C、A policy that is sent to the protected resource that permits or denies inbound or outbound traffic.
    • D、A policy that is defined on the protected resource that permits or denies inbound or outbound traffic.

    正确答案:B

  • 第4题:

    Your security policy requires that users authenticating to the Junos Pulse Access Control Service are connecting from a domain member endpoint on the internal corporate network.Which set of role access restrictions must you configure to enforce this security policy?()

    • A、Source IP and browser
    • B、Source IP and certificate
    • C、Certificate and Host Checker
    • D、Host Checker and source IP

    正确答案:D

  • 第5题:

    You administer a network with Windows-based endpoints that have custom software images. You want to use Host Checker to require that endpoints are running the custom software image.Which two Host Checker policy rules would be used to enforce this requirement?()

    • A、Isolate a file name unique to the custom image and create a custom rule-type of "File" which matches on the file. Select the "Required" option under the custom rule.
    • B、Identify the MAC address unique to network cards installed in PCs with the custom image and create a custom rule-type of "MAC Address" which matches on the appropriate MAC address.
    • C、Select the "Required" option under the custom rule Identify the IP address unique to the network cards installed in PCs with the custom image and create a custom rule-type of "IP Address" which matches on the appropriate IP address. Select the "Required" option under the custom rule.
    • D、Isolate or create a unique Windows registry key for the custom image and create a custom rule- type of "Registry Setting" which matches on the name of the registry key.

    正确答案:A,D

  • 第6题:

    Your company has deployed the Junos Pulse Access Control Service. The system administrator notices that the Host Checker policies are not being applied and enforced. You have verified that the controllers configuration is correct.Which two conditions are causing this issue?()

    • A、The endpoint is using EAP-PEAP with EAP-GTC as the inner protocol,
    • B、The endpoint is using EAP-TTLS with EAP-JUAC as the inner protocol.
    • C、The endpoint is using EAP-FAST with EAP-GTC as the inner protocol,
    • D、The endpoint is using EAP-PEAP with EAP-JUAC as the inner protocol.

    正确答案:A,C

  • 第7题:

    You are developing a Windows Communication Foundation (WCF) service. The service needs to access out-of-process resources.You need to ensure that the service accesses these resources on behalf of the originating caller. What should you do?()

    • A、Set the value of ServiceSecurityContext.Current.WindowsIdentity.ImpersonationLevel to TokenlmpersonationLevel.Impersonation
    • B、Set the value of ServiceSecurityContext.Current.Windowsldentity.ImpersonationLevel to TokenlmpersonationLevel.Delegation
    • C、Set the PrincipalPermissionAttribute on the service contract and update the binding attribute in the endpoint element of the configuration file to wsHttpBinding
    • D、Set the PnncipalPermissionAttribute on the service contract and update the bindingConfiguration attribute in the endpoint element of the configuration file to wsHttpBinding

    正确答案:B

  • 第8题:

    You have an existing Windows Communication Foundation (WCF) service that exposes a service contract over HTTP. You need to expose that contract over HTTP and TCP. What should you do?()

    • A、Add a net.tcp base address to the host.
    • B、Add an endpoint configured with a netTcpBinding.
    • C、Add an endpoint behavior named netTcpBehavior to the existing endpoint.
    • D、Add a binding configuration to the existing endpoint named netTcpBinding.

    正确答案:B

  • 第9题:

    单选题
    What is the function of Host Checker?()
    A

    To allow clientless access to the network

    B

    To restrict access to protected resources on the network

    C

    To scan an endpointfor compliance with security policies

    D

    To push a firewall policy to the endpoint's local firewall application


    正确答案: C
    解析: 暂无解析

  • 第10题:

    多选题
    You administer a network with Windows-based endpoints that have custom software images. You want to use Host Checker to require that endpoints are running the custom software image.Which two Host Checker policy rules would be used to enforce this requirement?()
    A

    Isolate a file name unique to the custom image and create a custom rule-type of File which matches on the file. Select the Required option under the custom rule.

    B

    Identify the MAC address unique to network cards installed in PCs with the custom image and create a custom rule-type of MAC Address which matches on the appropriate MAC address.

    C

    Select the Required option under the custom rule Identify the IP address unique to the network cards installed in PCs with the custom image and create a custom rule-type of IP Address which matches on the appropriate IP address. Select the Required option under the custom rule.

    D

    Isolate or create a unique Windows registry key for the custom image and create a custom rule- type of Registry Setting which matches on the name of the registry key.


    正确答案: C,D
    解析: 暂无解析

  • 第11题:

    多选题
    You administer a network containing SRX Series firewalls. New policy requires that you implement MAG Series devices to provide access control for end users. The policy requires that the SRX Series devices dynamically enforce security policy based on the source IP address of the user. The policy also requires that the users communicate with protected resources using encrypted traffic. Which two statements are true?()
    A

    The endpoints can use agentless access.

    B

    Encrypted traffic flows between the endpoint and the enforcer.

    C

    Encrypted traffic flows between the endpoint and the protected resource

    D

    The endpoints can use the Odyssey Access Client.


    正确答案: B,D
    解析: 暂无解析

  • 第12题:

    多选题
    Your company has deployed the Junos Pulse Access Control Service. The system administrator notices that the Host Checker policies are not being applied and enforced. You have verified that the controllers configuration is correct.Which two conditions are causing this issue?()
    A

    The endpoint is using EAP-PEAP with EAP-GTC as the inner protocol,

    B

    The endpoint is using EAP-TTLS with EAP-JUAC as the inner protocol.

    C

    The endpoint is using EAP-FAST with EAP-GTC as the inner protocol,

    D

    The endpoint is using EAP-PEAP with EAP-JUAC as the inner protocol.


    正确答案: A,C
    解析: 暂无解析

  • 第13题:

    In a Junos Pulse Access Control Service active/active clustered environment, which statement is true about VIPs?()

    A. VIP is not required when using only agentless access for all endpoint platforms.

    B. VIP is not required when using Junos Pulse or Odyssey Access Client for all endpoint platforms.

    C. VIP is not required when using Junos Pulse and agentless access for all endpoint platforms.

    D. VIP is not required when using Odyssey Access Client and agentless access for all endpoint platforms.


    参考答案:B

  • 第14题:

    Refertotheexhibit.Whichstatementistrueaboutwheretrustboundariesshouldbeestablishedinanetwork?()

    A.Endpoints2and3areoptimalplacestoestablishatrustboundary.Endpoint1isanacceptableplacetoestablishatrustboundary.

    B.Endpoint2istheoptimalplacetoestablishatrustboundary.Endpoints1and3areacceptableplacestoestablishatrustboundary.

    C.Endpoint2istheonlyacceptableplacetoestablishatrustboundary.

    D.Endpoint1istheonlyacceptableplacetoestablishatrustboundary.

    E.Endpoints1and2areoptimalplacestoestablishatrustboundary.Endpoint3isanacceptableplacetoestablishatrustboundary.

    F.Endpoint1istheoptimalplacetoestablishatrustboundary.Endpoints2and3areacceptableplacestoestablishatrustboundary.


    参考答案:E

  • 第15题:

    You want to create a Host Checker policy that looks for a specific antivirus product that is running on your client machines, but the predefined antivirus options do not include the antivirus product version that you use.Which feature should you verify the antivirus product is up to date?()

    • A、Enhanced Endpoint Security
    • B、DP signatures
    • C、Antivirus licensing
    • D、Endpoint Security Assessment Plug-in

    正确答案:D

  • 第16题:

    What are two valid configurations for user-driven remediation when a Windows-based endpoint fails a Host Checker policy?()

    • A、Kill a running process on the endpoint, based on executable name and MD5 checksum.
    • B、Delete a file on the endpoint's file system.
    • C、Download and run a remediation executable from the local software distribution server.
    • D、Alter registry entries to prevent future execution of an executable, based on executable name and full path.

    正确答案:A,B

  • 第17题:

    What is the function of Host Checker?()

    • A、To allow clientless access to the network
    • B、To restrict access to protected resources on the network
    • C、To scan an endpointfor compliance with security policies
    • D、To push a firewall policy to the endpoint's local firewall application

    正确答案:B

  • 第18题:

    You are designing a Windows Azure application that will include two web roles.  The web roles will communicate with on-premise development computers and on-premise databases.  Web Role 1 must connect to development computers and databases.  Web Role 2 must connect to only databases.  What should you recommend?()

    • A、 Create one endpoint group that contains the development computers and one endpoint group that contains the databases. Connect Web Role 1 to both endpoint groups. Connect Web Role 2 to only the database endpoint group.
    • B、 Create one endpoint group that contains the development computers and databases. Connect Web Role 1 and Web Role 2 to the endpoint group.
    • C、 Create one endpoint group that contains the development computers and one endpoint group that contains the databases. Connect the endpoint groups. Connect Web Role 1 and Web Role 2 to the development computer group.
    • D、 Create one endpoint group that contains the development computers and databases, and connectit to Web Role 1.  Create one endpoint group that contains only the databases, and connect it to Web Role 2.

    正确答案:A

  • 第19题:

    You need to implement an authentication method on SQL4. The TravelOnline database will be accessed through a Web services application. You need to make the authentication method as secure as possible.What should you do?()

    • A、Create an HTTP endpoint with NTLM authentication, and create a service principal name (SPN).
    • B、Create an HTTP endpoint with digest authentication, and create a service principal name (SPN).
    • C、Create an HTTP endpoint with integrated authentication, and create a service principal name (SPN).
    • D、Create an HTTP endpoint with Kerberos authentication.

    正确答案:C

  • 第20题:

    多选题
    What are three elements the Junos Pulse Access Control Service uses to establish endpoint access to protected resources?()
    A

    sign-in policy

    B

    authentication realms

    C

    role restrictions

    D

    policy realms

    E

    routing policy


    正确答案: E,A
    解析: 暂无解析

  • 第21题:

    单选题
    What is a Host Enforcer policy?()
    A

    A policy that is defined on the endpoint that permits or denies inbound or outbound traffic.

    B

    A policy that is sent to the endpoint that permits or denies inbound or outbound traffic.

    C

    A policy that is sent to the protected resource that permits or denies inbound or outbound traffic.

    D

    A policy that is defined on the protected resource that permits or denies inbound or outbound traffic.


    正确答案: C
    解析: 暂无解析

  • 第22题:

    单选题
    Your security policy requires that users authenticating to the Junos Pulse Access Control Service are connecting from a domain member endpoint on the internal corporate network.Which set of role access restrictions must you configure to enforce this security policy?()
    A

    Source IP and browser

    B

    Source IP and certificate

    C

    Certificate and Host Checker

    D

    Host Checker and source IP


    正确答案: B
    解析: 暂无解析

  • 第23题:

    单选题
    You want to create a Host Checker policy that looks for a specific antivirus product that is running on your client machines, but the predefined antivirus options do not include the antivirus product version that you use.Which feature should you verify the antivirus product is up to date?()
    A

    Enhanced Endpoint Security

    B

    DP signatures

    C

    Antivirus licensing

    D

    Endpoint Security Assessment Plug-in


    正确答案: A
    解析: 暂无解析