多选题Your manager has informed you that only specific users can have access to the Preferred Members role, and that these users are restricted to the Preferred Members role. The Preferred Members role-mapping rule is currently set as the last rule in your r

题目
多选题
Your manager has informed you that only specific users can have access to the Preferred Members role, and that these users are restricted to the Preferred Members role. The Preferred Members role-mapping rule is currently set as the last rule in your role-mapping rules and is based on username. Currently all users are assigned to the Preferred Members role-mapping rule. Which three changes in the admin GUI will enforce your managers change request?()
A

Move the Preferred Members role-mapping rule to the top of the list.

B

Remove the Preferred Members role from the role-mapping rule.

C

Edit the Preferred Members role-mapping rule so that the username is equal to *.

D

Edit the Preferred Members role-mapping rule so that only the select users are assigned to the role-mapping rule.

E

Edit the Preferred Members role-mapping rule and select Stop processing rules when this rule matches.

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

You are the administrator of a Junos Pulse Access Control Service implementation. You must restrict authenticated users connected from the branch offices to a few specific resources within the data center. However, when the authenticated users are connected at the corporate office, they are allowed more access to the data center resources.You have created two roles with different levels of access and are trying to determine the best way of controlling when a user is mapped to a specific role. Having the user prompted to manually select their role is possible, but you want to automate the process.Which configuration solves this problem?()

A. Implement a RADIUS request attribute policy to assist with realm selection and create different role-mapping rules for the user in each realm.

B. Implement a directory/attribute server on the realm and set up this server to determine by group membership the proper role to which a user should be mapped.

C. Reorder the role-mapping rules to allow for the more open role to be mapped first and then enable the "stop processing rules when this rule matches" function on this role.

D. Implement a Host Checker policy on the realm that determines the geographic location of the device and restricts the user based on the results of the policy.


参考答案:A

第2题:

You have a stand-alone computer named Computer1 that runs Windows 7. Several users share Computer1. You need to prevent all users who are members of a group named Group1 from runningWindows Media Player. All other users must be allowed to run Windows Media Player. You must achievethis goal by using the least amount of administrative effort.  What should you do?()

  • A、From Software Restriction Policies, create a path rule.
  • B、From Software Restriction Policies, create a hash rule.
  • C、From Application Control Policies, create the default rules.
  • D、From Application Control Policies, create an executable rule.

正确答案:D

第3题:

You create a Web site that is for members only. The Web site allows members to create lists of users that have access to information about member profiles. The name of the list is stored in the listName variable. The user name of the user to whom access is given is stored in the username variable.You need to enable members to manage their lists of users.Which code segment should you use?()

A.

B.

C.

D.


参考答案:B

第4题:

All client computers on your company network run Windows 7 and are members of a Windows Server 2008 R2 domain. The R&D department staff are local administrators on their computers and are members of the R&D global security group. A new version of a business software application is available on the network. You plan to apply an AppLocker security policy to the R&D group. You need to ensure that members of the R&D group are not allowed to upgrade the software. What should you do?()

  • A、Create an Audit only restriction based on the version of the software.
  • B、Create an Audit only restriction based on the publisher of the software.
  • C、Create an Enforce rule restriction based on the version of the software.
  • D、Create an Enforce rule restriction based on the publisher of the software.

正确答案:C

第5题:

You executed this command to create a password file: $ orapwd file = orapworcl entries = 10 ignorecase = N Which two statements are true about the password file?()

  • A、It will permit the use of uppercase passwords for database users who have been granted the SYSOPER role.
  • B、It contains username and passwords of database users who are members of the OSOPER operating system group.
  • C、It contains usernames and passwords of database users who are members of the OSDBA operating system group.
  • D、It will permit the use of lowercase passwords for database users who have granted the SYSDBA role.
  • E、It will not permit the use of mixed case passwords for the database users who have been granted the SYSDBA role.

正确答案:A,D

第6题:

All client computers on your company network run Windows 7 and are members of a Windows Server 2008 R2 domain. The R&D department staff are local administrators on their computers and are members of the R&D global security group. A new version of a business software application is available on the network. You plan to apply an AppLocker security policy to the R&D group. You need to ensure that members of the R&D group are not allowed to upgrade the software. What should you do?()

A.Create an Audit only restriction based on the version of the software.

B.Create an Audit only restriction based on the publisher of the software.

C.Create an Enforce rule restriction based on the version of the software.

D.Create an Enforce rule restriction based on the publisher of the software.


参考答案:C

第7题:

Your manager has informed you that only specific users can have access to the Preferred Members role, and that these users are restricted to the Preferred Members role. The Preferred Members role-mapping rule is currently set as the last rule in your role-mapping rules and is based on username. Currently all users are assigned to the Preferred Members role-mapping rule. Which three changes in the admin GUI will enforce your managers change request?()

  • A、Move the Preferred Members role-mapping rule to the top of the list.
  • B、Remove the Preferred Members role from the role-mapping rule.
  • C、Edit the Preferred Members role-mapping rule so that the username is equal to *.
  • D、Edit the Preferred Members role-mapping rule so that only the select users are assigned to the role-mapping rule.
  • E、Edit the Preferred Members role-mapping rule and select "Stop processing rules when this rule matches".

正确答案:A,D,E

第8题:

Your network contains two Active Directory sites named Site1 and Site2. Site1 contains a server named Server1. Server1 runs a custom application named App1.Users in Site2 report that they cannot access App1 on Server1. Users in Site1 can access App1.Server1 has a Windows Firewall with Advanced Security rule named Rule1.You discover that Rule1 blocks the connection to App1.You verify that Server1 has no connection security rules.You need to ensure that the Site2 users can connect to Server1.What should you modify in Rule1?()

A. the authorized computers list

B. the authorized users list

C. the edge traversal settings

D. the scope


参考答案:D

第9题:

You are a help desk technician for your company. Your company’s network includes an Active Directory domain and Windows XP Professional computers that are configured as members of the domain. Company policy prohibits users from accessing their computers unless they are authenticated by a domain controller. However, users report that they can log on to their computers, even though a network administrator has told them that a domain controller is not available. As a test, you log off of your computer and disconnect it from the network. You discover that you can log on by using your domain user account. You need to ensure that users cannot access their computers unless they are authenticated by a domain controller. How should you configure the local computer policy on these computers? () 

  • A、Enable the Require domain controller to unlock policy.
  • B、Set the Number of previous logons to cache policy to 0.  
  • C、Remove all user and group accounts from the Log on locally user right. 
  • D、Remove all user and group accounts from the Access this computer from the network user right. 

正确答案:B

第10题:

You manage Hyper-V host servers and virtual machines (VMs) by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. Developers are members of an AD security group named  Development. You need to ensure that on a specific host server, members of the Development group can perform only the Create,Modify,and Remove VM management tasks. What should you do?()

  • A、Create a Self-Service user role and add the Development group to this role.
  • B、Create a Delegated Administrator user role and add the Development group to this role.
  • C、In Authorization Manager, create a role on the client computer of each member of the Development group, and add the Development group to this role.
  • D、Install Hyper-V Manager on the client computer of each member of the Development group,and grant the Development group administrative privileges on the specific server.

正确答案:A

更多相关问题