Kill a running process on the endpoint, based on executable name and MD5 checksum.
Delete a file on the endpoint's file system.
Download and run a remediation executable from the local software distribution server.
Alter registry entries to prevent future execution of an executable, based on executable name and full path.
第1题:
Your company has deployed the Junos Pulse Access Control Service. The system administrator notices that the Host Checker policies are not being applied and enforced. You have verified that the controllers configuration is correct.Which two conditions are causing this issue?()
A. The endpoint is using EAP-PEAP with EAP-GTC as the inner protocol,
B. The endpoint is using EAP-TTLS with EAP-JUAC as the inner protocol.
C. The endpoint is using EAP-FAST with EAP-GTC as the inner protocol,
D. The endpoint is using EAP-PEAP with EAP-JUAC as the inner protocol.
第2题:
You want to create a Host Checker policy that looks for a specific antivirus product that is running on your client machines, but the predefined antivirus options do not include the antivirus product version that you use.Which feature should you verify the antivirus product is up to date?()
A. Enhanced Endpoint Security
B. DP signatures
C. Antivirus licensing
D. Endpoint Security Assessment Plug-in
第3题:
What is a Host Enforcer policy?()
第4题:
Your security policy requires that users authenticating to the Junos Pulse Access Control Service are connecting from a domain member endpoint on the internal corporate network.Which set of role access restrictions must you configure to enforce this security policy?()
第5题:
You administer a network with Windows-based endpoints that have custom software images. You want to use Host Checker to require that endpoints are running the custom software image.Which two Host Checker policy rules would be used to enforce this requirement?()
第6题:
Your company has deployed the Junos Pulse Access Control Service. The system administrator notices that the Host Checker policies are not being applied and enforced. You have verified that the controllers configuration is correct.Which two conditions are causing this issue?()
第7题:
You are developing a Windows Communication Foundation (WCF) service. The service needs to access out-of-process resources.You need to ensure that the service accesses these resources on behalf of the originating caller. What should you do?()
第8题:
You have an existing Windows Communication Foundation (WCF) service that exposes a service contract over HTTP. You need to expose that contract over HTTP and TCP. What should you do?()
第9题:
To allow clientless access to the network
To restrict access to protected resources on the network
To scan an endpointfor compliance with security policies
To push a firewall policy to the endpoint's local firewall application
第10题:
Isolate a file name unique to the custom image and create a custom rule-type of File which matches on the file. Select the Required option under the custom rule.
Identify the MAC address unique to network cards installed in PCs with the custom image and create a custom rule-type of MAC Address which matches on the appropriate MAC address.
Select the Required option under the custom rule Identify the IP address unique to the network cards installed in PCs with the custom image and create a custom rule-type of IP Address which matches on the appropriate IP address. Select the Required option under the custom rule.
Isolate or create a unique Windows registry key for the custom image and create a custom rule- type of Registry Setting which matches on the name of the registry key.
第11题:
The endpoints can use agentless access.
Encrypted traffic flows between the endpoint and the enforcer.
Encrypted traffic flows between the endpoint and the protected resource
The endpoints can use the Odyssey Access Client.
第12题:
The endpoint is using EAP-PEAP with EAP-GTC as the inner protocol,
The endpoint is using EAP-TTLS with EAP-JUAC as the inner protocol.
The endpoint is using EAP-FAST with EAP-GTC as the inner protocol,
The endpoint is using EAP-PEAP with EAP-JUAC as the inner protocol.
第13题:
A. VIP is not required when using only agentless access for all endpoint platforms.
B. VIP is not required when using Junos Pulse or Odyssey Access Client for all endpoint platforms.
C. VIP is not required when using Junos Pulse and agentless access for all endpoint platforms.
D. VIP is not required when using Odyssey Access Client and agentless access for all endpoint platforms.
第14题:
A.Endpoints2and3areoptimalplacestoestablishatrustboundary.Endpoint1isanacceptableplacetoestablishatrustboundary.
B.Endpoint2istheoptimalplacetoestablishatrustboundary.Endpoints1and3areacceptableplacestoestablishatrustboundary.
C.Endpoint2istheonlyacceptableplacetoestablishatrustboundary.
D.Endpoint1istheonlyacceptableplacetoestablishatrustboundary.
E.Endpoints1and2areoptimalplacestoestablishatrustboundary.Endpoint3isanacceptableplacetoestablishatrustboundary.
F.Endpoint1istheoptimalplacetoestablishatrustboundary.Endpoints2and3areacceptableplacestoestablishatrustboundary.
第15题:
You want to create a Host Checker policy that looks for a specific antivirus product that is running on your client machines, but the predefined antivirus options do not include the antivirus product version that you use.Which feature should you verify the antivirus product is up to date?()
第16题:
What are two valid configurations for user-driven remediation when a Windows-based endpoint fails a Host Checker policy?()
第17题:
What is the function of Host Checker?()
第18题:
You are designing a Windows Azure application that will include two web roles. The web roles will communicate with on-premise development computers and on-premise databases. Web Role 1 must connect to development computers and databases. Web Role 2 must connect to only databases. What should you recommend?()
第19题:
You need to implement an authentication method on SQL4. The TravelOnline database will be accessed through a Web services application. You need to make the authentication method as secure as possible.What should you do?()
第20题:
sign-in policy
authentication realms
role restrictions
policy realms
routing policy
第21题:
A policy that is defined on the endpoint that permits or denies inbound or outbound traffic.
A policy that is sent to the endpoint that permits or denies inbound or outbound traffic.
A policy that is sent to the protected resource that permits or denies inbound or outbound traffic.
A policy that is defined on the protected resource that permits or denies inbound or outbound traffic.
第22题:
Source IP and browser
Source IP and certificate
Certificate and Host Checker
Host Checker and source IP
第23题:
Enhanced Endpoint Security
DP signatures
Antivirus licensing
Endpoint Security Assessment Plug-in