单选题Which additional configuration must be completed when setting up role restrictions using certificates? ()A Set up a certificate authentication server.B Configure the authentication realm to remember certificate information.C Configure the authenticatio

题目
单选题
Which additional configuration must be completed when setting up role restrictions using certificates? ()
A

Set up a certificate authentication server.

B

Configure the authentication realm to remember certificate information.

C

Configure the authentication realm to use a certificate server for authentication.

D

Configure a role mapping rule requiring certification information to map user to role.

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which action is optional when adding an authentication realm for use on an Infranet Controller? ()

A. Modify sign-in policy.

B. Configure role mapping.

C. Assign authentication server.

D. Configure authentication policy.


参考答案:D

第2题:

Which additional configuration step is necessary in order to connect to an access point that has SSID broadcasting disabled?()

  • A、Set the SSID value in the client software to public.
  • B、Configure open authentication on the AP and the client.
  • C、Set the SSID value on the client to the SSID configured on the AP
  • D、Configure MAC address filtering to permit the client to connect to the AP

正确答案:C

第3题:

What are two steps to configure user authentication for a Junos Pulse Access Control Service?()

A. Configure an authentication policy as part of the user role definitions.

B. Configure a Sign-in Policy.

C. Configure authentication agents as part of the user role definitions

D. Configure an authentication policy as part of the authentication realm definition.


参考答案:B, D

第4题:

You want to enforce a Host Checker policy so that only users who pass the policy receive the Employee role. In the admin GUI, which two parameters must you configure?()

  • A、Select "Require and Enforce" for the Host Checker Policy in the realm authentication policy.
  • B、Select "Evaluate Policies" for the Host Checker policy in the realm authentication policy.
  • C、Configure the Host Checker policy as a role restriction for the Employee role.
  • D、Configure the Host Checker policy as a resource access policy for the Employee role.

正确答案:B,C

第5题:

Using an LDAP authentication server, what do you configure to validate certificate attributes?()

  • A、Use the "is exactly" or "contains" operators.
  • B、Create a user filter matching the dn of the certificate.
  • C、Verify that the certificate is issued by a publicly trusted cs.
  • D、Match the certificate type and value with an attribute from the ldap server.

正确答案:D

第6题:

Which additional configuration must be completed when setting up role restrictions using certificates? ()

A. Set up a certificate authentication server.

B. Configure the authentication realm to remember certificate information.

C. Configure the authentication realm to use a certificate server for authentication.

D. Configure a role mapping rule requiring certification information to map user to role.


参考答案:B

第7题:

What are two steps to configure user authentication for a Junos Pulse Access Control Service?()

  • A、Configure an authentication policy as part of the user role definitions.
  • B、Configure a Sign-in Policy.
  • C、Configure authentication agents as part of the user role definitions
  • D、Configure an authentication policy as part of the authentication realm definition.

正确答案:B,D

第8题:

When using RADIUS as an external authentication method for 802.1X authentication for the Junos Pulse Access Control Service, what must you do to ensure that the RADIUS authentication works properly?()

A. Configure IP helper to forward the authentication requests from the clients to the external RADIUS server

B. Configure the supplicant as anexternal authentication server

C. Configure RADIUS proxy on the realm

D. Specify the correct RADIUS port 389 on the Junos Pulse Access Control Service


参考答案:C

第9题:

When using RADIUS as an external authentication method for 802.1X authentication for the Junos Pulse Access Control Service, what must you do to ensure that the RADIUS authentication works properly?()

  • A、Configure IP helper to forward the authentication requests from the clients to the external RADIUS server
  • B、Configure the supplicant as anexternal authentication server
  • C、Configure RADIUS proxy on the realm
  • D、Specify the correct RADIUS port 389 on the Junos Pulse Access Control Service

正确答案:C

第10题:

Your security policy requires that users authenticating to the Junos Pulse Access Control Service are connecting from a domain member endpoint on the internal corporate network.Which set of role access restrictions must you configure to enforce this security policy?()

  • A、Source IP and browser
  • B、Source IP and certificate
  • C、Certificate and Host Checker
  • D、Host Checker and source IP

正确答案:D

更多相关问题