单选题Your company has a mix of employees and contractors. Contractor usernames always begin with"con-"; employee usernames never begin with "con-". You need to give employees access to allresources and give contractors access to a limited set of resources.

题目
单选题
Your company has a mix of employees and contractors. Contractor usernames always begin with"con-"; employee usernames never begin with "con-". You need to give employees access to allresources and give contractors access to a limited set of resources. Employee and contractor roles have been created with the appropriate access privileges, and the realm is set to merge settings for all assigned roles. Which role mapping ruleset would result in the correct access privileges being assigned?()
A

username=* -> Employee-role Stop username=con-* -> Contractor-role

B

username=* -> Employee-role username=con-* -> Contractor-role Stop

C

username=con-* -> Contractor-role Stop username=* -> Employee-role

D

username=con-* -> Contractor-role username=* -> Employee-role Stop

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Your company has a main office and a branch office. The network contains an Active Directory forest. All users on the network access the Internet from their computers. The company hires a temporary employee who has his own portable computer. The employee connects his portable computer to the network. When the employee attempts to join the computer to the domain, the connection fails. A help desk technician reports the following about the employee. He has a domain user account.His computer can access Internet Web sites.His computer can contact domain controllers by using the domain controllers IP addresses. You need to ensure that the employees computer can join the domain. The solution must ensure that the computer can access resources on the Internet. What should you do?()

A.Modify the time zone for the computer.

B.Modify the IPv4 settings on the computer.

C.Create an A record for the computer in an internal DNS zone.

D.Request that an administrator create a prestaged computer account in the domain.


参考答案:B

第2题:

Your company has a mix of employees and contractors. Contractor usernames always begin with"con-"; employee usernames never begin with "con-". You need to give employees access to allresources and give contractors access to a limited set of resources. Employee and contractor roles have been created with the appropriate access privileges, and the realm is set to merge settings for all assigned roles. Which role mapping ruleset would result in the correct access privileges being assigned?()

  • A、username="*" -> Employee-role Stop username="con-*" -> Contractor-role
  • B、username="*" -> Employee-role username="con-*" -> Contractor-role Stop
  • C、username="con-*" -> Contractor-role Stop username="*" -> Employee-role
  • D、username="con-*" -> Contractor-role username="*" -> Employee-role Stop

正确答案:C

第3题:

Your IT director has decided to allow employees to use their laptops at home as well as in the office. You have deployed the Junos Pulse client to allow access to the offices 802.1X-enabled wired network. Your company also has the Junos Pulse Secure Access Service deployed. You want the Junos Pulse client to automatically launch the appropriate access method depending on each users location.Which three are supported to determine the users location?()

A. MAC address

B. DNS server

C. DHCP server

D. resolve address

E. endpoint address


参考答案:B, D, E

第4题:

You are a security administrator for your company. The network consists of three Active Directory domains. All Active Directory domains are running at a Windows Server 2003 mode functionality level.    Employees in the editorial department of your company need access to resources on file servers that are in each of the Active Directory domains. Each Active Directory domain in the company contains at least one editorial department employee user account.    You need to create a single group named Company Editors that contains all editorial department employee user accounts and that has access to the resources on file server computers.  What should you do?()

  • A、 Create a global distribution group in the forest root domain and name it Company Editors.
  • B、 Create a global security group in the forest root domain and name it Company Editors.
  • C、 Create a universal distribution group in the forest root domain and name it Company Editors. 
  • D、 Create a universal security group in the forest root domain and name it Company Editors.

正确答案:D

第5题:

Your company has a main office and a branch office. The network contains an Active Directory forest. All users on the network access the Internet from their computers. The company hires a temporary employee who has his own portable computer. The employee connects his portable computer to the network. When the employee attempts to join the computer to the domain, the connection fails. A help desk technician reports the following about the employee. He has a domain user account.His computer can access Internet Web sites.His computer can contact domain controllers by using the domain controllers IP addresses. You need to ensure that the employees computer can join the domain. The solution must ensure that the computer can access resources on the Internet. What should you do?()

  • A、Modify the time zone for the computer.
  • B、Modify the IPv4 settings on the computer.
  • C、Create an A record for the computer in an internal DNS zone.
  • D、Request that an administrator create a prestaged computer account in the domain.

正确答案:B

第6题:

Your IT director has decided to allow employees to use their laptops at home as well as in the office. You have deployed the Junos Pulse client to allow access to the offices 802.1X-enabled wired network. Your company also has the Junos Pulse Secure Access Service deployed. You want the Junos Pulse client to automatically launch the appropriate access method depending on each users location. Which three are supported to determine the users location?()

  • A、MAC address
  • B、DNS server
  • C、DHCP server
  • D、resolve address
  • E、endpoint address

正确答案:B,D,E

第7题:

Your network consists of a single Active Directory domain. The network is located on the 172.16.0.0/23  subnet.   The company hires temporary employees. You provide user accounts and computers to the temporaryem ployees. The temporary employees receive computers that are outside the Active Directory domain.   The temporary employees use their computers to connect to the network by using wired connections andwireless connections. The company’s security policy specifies that the computers connected to the network must have the latest updates for the operating system.   You need to plan the network’s security so that it complies with the company 's security policy. What should you include in your plan?()

  • A、Implement a Network Access Protection (NAP) strategy for the 172.16.0.0/23 subnet.
  • B、Create an extranet domain within the same forest. Migrate the temporary employees user accounts to the extranet domain. Install the necessary domain resources on the 172.16.0.0/23 subnet.
  • C、Move the temporary employees user accounts to a new organizational unit (OU). Create a new Group Policy object (GPO) that uses an intranet Microsoft Update server. Link the new GPO tothe new OU.
  • D、Create a new subnet in a perimeter network. Relocate the wireless access point to the perimeter network. Require authentication through a VPN server before allowing access to the internal resources.

正确答案:A

第8题:

Your company has a mix of employees and contractors. Contractor usernames always begin with"con-"; employee usernames never begin with "con-". You need to give employees access to allresources and give contractors access to a limited set of resources. Employee and contractor roles have been created with the appropriate access privileges, and the realm is set to merge settings for all assigned roles.Which role mapping ruleset would result in the correct access privileges being assigned?()

A. username="*" -> Employee-role Stop username="con-*" -> Contractor-role

B. username="*" -> Employee-role username="con-*" -> Contractor-role Stop

C. username="con-*" -> Contractor-role Stop username="*" -> Employee-role

D. username="con-*" -> Contractor-role username="*" -> Employee-role Stop


参考答案:C

第9题:

Your company hires 10 new employees. You want the new employees to connect to the main  office through a VPN connection. You create new user accounts and grant the new employees  the Allow Read and Allow Execute permissions to shared resources in the main office.     The new employees are unable to access shared resources in the main office. You need to  ensure that users are able to establish a VPN connection to the main office.     What should you do()

  • A、Grant the new employees the Allow Full control permission.
  • B、Grant the new employees the Allow Access Dial-in permission.
  • C、Add the new employees to the Remote Desktop Users security group.
  • D、Add the new employees to the Windows Authorization Access security group.

正确答案:B

第10题:

The human resources department has informed you that two new temporary part-time employees will join your company next week. You are required to set up a workstation that will be used bythese employees. They do not need access to the network but they will need to access an HP LaserJet printer attached to the local computer. You install Windows 2000 Professional and format the hard disk using NTFS. What type of user account should you create for them?()

  • A、No account. They can use the built-in guest account.
  • B、No Account. They can use the built-in Administrator account.
  • C、Local user account
  • D、Domain user account

正确答案:C

更多相关问题