When the Infranet Enforcer is se

题目

When the Infranet Enforcer is set up in transparent mode, which additional resource policy must be configured to use OAC for IPsec enforcement? ()

  • A、IPsec Routing
  • B、Access Control
  • C、IP Address Pool
  • D、Source Interface
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

You are receiving reports of possible unauthorized access to resources protected by a firewall enforcer running the Junos OS. You want to verity which users are currently accessing resources through the enforcer.Which command should you use to verify user access on the enforcer?()

A. show services unified-access-control authentication-table

B. show auth table

C. show services unified-access-control policies

D. show services unified-access-control captive-portal


参考答案:A

第2题:

Which action is optional when adding an authentication realm for use on an Infranet Controller? ()

A. Modify sign-in policy.

B. Configure role mapping.

C. Assign authentication server.

D. Configure authentication policy.


参考答案:D

第3题:

(A Most Forgiving Ape) When the author and his party se out that morning, he was quite certain that he would meet the gorillas.()


参考答案:错误

第4题:

What is true about the operation of the Infranet Enforcer? ()

A. It assigns users a set of roles.

B. It allows access based on auth table entries.

C. It verifies whether an endpoint meets security requirements.

D. It configures the UAC agent to allow or deny access to resources.


参考答案:B

第5题:

What must be updated regularly to detect the newest versions of personal firewalls on endpoints? ()

A. Infranet Enforcer firmware

B. Infranet Controller rollback software

C. Host Security Assessment Plug-in (HSAP)

D. Endpoint Security Assessment Plug-in (ESAP)


参考答案:D

第6题:

A user is successfully authenticating to the network but is unable to access protected resources behind a ScreenOS enforcer. You log in to the ScreenOS enforcer and issue the command get auth table infranet and you do not see the user listed.Which two event log settings on the Junos Pulse Access Control Service must you enable to troubleshootthis issue?()

A. Connection Requests

B. System Errors

C. Enforcer Events

D. Enforcer Command Trace


参考答案:C, D

第7题:

When the Infranet Enforcer is set up in transparent mode, which additional resource policy must be configured to use OAC for IPsec enforcement? ()

A. IPsec Routing

B. Access Control

C. IP Address Pool

D. Source Interface


参考答案:D

第8题:

You have a firewall enforcer protecting sensitive internal resources in a data center. The network traversed by endpoint traffic is semi-trusted, so you need to encrypt the traffic between the endpoints accessing the resources and the firewall enforcer.Which type of policies provide this level of protection?()

A. resource access policies

B. Host Enforcer policies

C. source IP enforcement policies

D. IPsec enforcement policies


参考答案:D

第9题:

On a pre-existing OAC, which three options can the Infranet Controller overwrite when the useraccesses the Infranet Controller?()

A. SSID

B. login name

C. MAC address

D. wired adapters

E. encryption method


参考答案:A, D, E

第10题:

Which statement is correct about defining an Infranet Enforcer for use as a RADIUS Client? ()

A. You do not need to configure a RADIUS client policy.

B. You must know the exact model number of the Infranet Enforcer.

C. You must specify the NACN password of the device in the RADIUS client policy.

D. You do not need to designate a location group to which the Infranet Enforcer will belong.


参考答案:A

更多相关问题