单选题What is true about the operation of the Infranet Enforcer? ()A It assigns users a set of roles.B It allows access based on auth table entries.C It verifies whether an endpoint meets security requirements.D It configures the UAC agent to allow or deny a

题目
单选题
What is true about the operation of the Infranet Enforcer? ()
A

It assigns users a set of roles.

B

It allows access based on auth table entries.

C

It verifies whether an endpoint meets security requirements.

D

It configures the UAC agent to allow or deny access to resources.

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

You navigate to "UAC" > "Infranet Enforcer" > "Auth Table Mapping" in the admin GUI. You see one policy, which is the unmodified, original default policy.Which statement is true?()

A. Dynamic auth table mapping is not enabled.

B. A successful authentication attempt will result in a new authentication table entry, which will be delivered only to the Junos enforcer protecting the network from which the user has authenticated.

C. To create a static auth table mapping, you must delete the default policy.

D. The default policy applies only to the factory-default role User.


参考答案:A

第2题:

What is true about the operation of the Infranet Enforcer? ()

A. It assigns users a set of roles.

B. It allows access based on auth table entries.

C. It verifies whether an endpoint meets security requirements.

D. It configures the UAC agent to allow or deny access to resources.


参考答案:B

第3题:

You notice that during peak hours, some firewall enforcers contain a high number of auth table entries. As you investigate the issue, you discover that all users are getting auth table mappings to all firewalls, which is not acceptable.What should you do on the Junos Pulse Access Control Service to resolve this problem?()

A. Delete the default auth table mapping policy

B. Create auth table mapping policies that route users to specific resources

C. Create Resource Access policies that permit access to specific resources

D. Create Source Interface policies that route users to specific resources


参考答案:A

第4题:

What is true about the operation of the Infranet Enforcer? ()

  • A、It assigns users a set of roles.
  • B、It allows access based on auth table entries.
  • C、It verifies whether an endpoint meets security requirements.
  • D、It configures the UAC agent to allow or deny access to resources.

正确答案:B

第5题:

Which two statements apply to dynamic access lists?()

  • A、they offer simpler management in large internetworks.
  • B、you can control logging messages.
  • C、they allow packets to be filtered based on upper-layer session information.
  • D、you can set a time-based security policy.
  • E、they provide a level of security against spoofing.
  • F、they are used to authenticate individual users

正确答案:C,D

第6题:

What must be updated regularly to detect the newest versions of personal firewalls on endpoints? ()

A. Infranet Enforcer firmware

B. Infranet Controller rollback software

C. Host Security Assessment Plug-in (HSAP)

D. Endpoint Security Assessment Plug-in (ESAP)


参考答案:D

第7题:

Which two statements apply to dynamic access lists?()

A.they offer simpler management in large internetworks.

B.you can control logging messages.

C.they allow packets to be filtered based on upper-layer session information.

D.you can set a time-based security policy.

E.they provide a level of security against spoofing.

F.they are used to authenticate individual users.


参考答案:A, F

第8题:

A user is successfully authenticating to the network but is unable to access protected resources behind a ScreenOS enforcer. You log in to the ScreenOS enforcer and issue the command get auth table infranet and you do not see the user listed.Which two event log settings on the Junos Pulse Access Control Service must you enable to troubleshootthis issue?()

A. Connection Requests

B. System Errors

C. Enforcer Events

D. Enforcer Command Trace


参考答案:C, D

第9题:

During the implement phase, systems acceptance testing provides which two of the following services for the customer()

  • A、It installs, configures, and verifies monitoring tools and processes in accordance with the operations implementation.
  • B、It verifies that the Cisco Unified Communications solutions is ready for production.
  • C、It verifies that the Cisco Unified Communications solution meets their business and technical requirements.
  • D、It executes and verifies the migration plan by migrating network services from an existing state to a future state.
  • E、It provides automated tools for measuring system performance under load.

正确答案:B,E

第10题:

You deploy your companys Internet Web site. You need to deny anonymous access to the Web site, allowing only authenticated users. Which code segment should you use?()

  • A、<authorization> <allow users="?"/> </authorization>
  • B、<authorization> <deny users="?"/> </authorization>
  • C、<authorization> <deny users="*"/></authorization>
  • D、<authorization> <allow users="*"/> </authorization>

正确答案:B

更多相关问题