You administer a network with Windows-based endpoints that have custom software images. You want to use Host Checker to require that endpoints are running the custom software image.Which two Host Checker policy rules would be used to enforce this requirem

题目

You administer a network with Windows-based endpoints that have custom software images. You want to use Host Checker to require that endpoints are running the custom software image.Which two Host Checker policy rules would be used to enforce this requirement?()

  • A、Isolate a file name unique to the custom image and create a custom rule-type of "File" which matches on the file. Select the "Required" option under the custom rule.
  • B、Identify the MAC address unique to network cards installed in PCs with the custom image and create a custom rule-type of "MAC Address" which matches on the appropriate MAC address.
  • C、Select the "Required" option under the custom rule Identify the IP address unique to the network cards installed in PCs with the custom image and create a custom rule-type of "IP Address" which matches on the appropriate IP address. Select the "Required" option under the custom rule.
  • D、Isolate or create a unique Windows registry key for the custom image and create a custom rule- type of "Registry Setting" which matches on the name of the registry key.
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

You have created a Host Checker policy that contains multiple rules. You want to inform end users which rule specifically has failed.In the admin GUI, which configuration setting would you enable?()

A. Enable Custom Instructions

B. Pre-auth notification

C. Remediation message

D. Send reason strings


参考答案:D

第2题:

You want to customize access to the corporate network so that agentiess users are instructed to obtain a certificatebefore accessing the network.Which two configurations solve this problem? ()

A. Create a custom sign-in page with specific instructions in the "Instructions" field.

B. Create a custom sign-in page with specific "Missing Certificate" messages in the "Custom error messages" field.

C. Create a custom sign-in policy with specific instructions in the "Instructions" field.

D. Create a custom sign-in notification and assign it to the "Pre-Auth Sign-in Notification" in the sign-in policy.


参考答案:A, D

第3题:

You are an administrator of Ezonexam.com's network. You want to perform. routine upgrades on your Windows 2000 Server computer. You use your non-administrator user account in the domain to logon to the server.

You want to upgrade all of the critical system files and patches on the server in the shortest possible time.

What should you do?

A.Use Windows Update.

B.Run System File Checker.

C.Log on as administrator and run Windows Update.

D.Log on as administrator and run System File Checker.


正确答案:C
解析:Explanation:WindowsUpdateisusedtoupgradethesystemfilesandtoretrieveandapplythelatestservicepacksandpatchesfortheoperatingsystem.AllnecessaryfilesaredownloadedthroughtheInternet.TobeabletorunWindowsUpdatewemusthaveadministrativerights.Incorrectanswers:A:Thenon-administrativeuseraccountcannotbeusedtorunWindowsUpdate.TorunWindowsUpdatewemusthaveadministrativerights.B:SystemFileCheckercheckstheintegrityofthesystemfiles.Itcannotbeusedtoupgradethesystemfilesortoretrieveandapplythelatestservicepacksandpatchesfortheoperatingsystem.D:SystemFileCheckercheckstheintegrityofthesystemfiles.Itcannotbeusedtoupgradethesystemfilesortoretrieveandapplythelatestservicepacksandpatchesfortheoperatingsystem.

第4题:

You want to create a Host Checker policy that looks for a specific antivirus product that is running on your client machines, but the predefined antivirus options do not include the antivirus product version that you use.Which feature should you verify the antivirus product is up to date?()

  • A、Enhanced Endpoint Security
  • B、DP signatures
  • C、Antivirus licensing
  • D、Endpoint Security Assessment Plug-in

正确答案:D

第5题:

What happens when Host Checker is configured to perform checks every "0" minutes? ()

A. Host Checker is disabled.

B. Host Checker will perform continous checks.

C. Host Checker will perform checks when user logs out.

D. Host Checker will perform checks when user first logs in.


参考答案:D

第6题:

You want to restrict access to a role based on the client machine from which the user is accessing the network.Which two role restrictions accomplish this goal? ()

A. user name

B. password length

C. certificate

D. Host Checker


参考答案:C, D

第7题:

You want to create a Host Checker policy that looks for a specific antivirus product that is running on your client machines, but the predefined antivirus options do not include the antivirus product version that you use.Which feature should you verify the antivirus product is up to date?()

A. Enhanced Endpoint Security

B. DP signatures

C. Antivirus licensing

D. Endpoint Security Assessment Plug-in


参考答案:D

第8题:

Your security policy requires that users authenticating to the Junos Pulse Access Control Service are connecting from a domain member endpoint on the internal corporate network.Which set of role access restrictions must you configure to enforce this security policy?()

A. Source IP and browser

B. Source IP and certificate

C. Certificate and Host Checker

D. Host Checker and source IP


参考答案:D

第9题:

You are a network administrator for The network consists of a single Active Directory domain named.

The domain contains two Windows Server 2003 terminal servers that host applications that are used by company employees. An organization unit (OU) named TerminalServers contains only the computer accounts for these two Terminal servers. A Group Policy object (GPO) named TSPolicy is linked to the TerminalServers OU, and you have been granted the right to modify the GPO.

Users should use the terminal servers to run only authorized applications. A custom financial application suite is currently the only allowed application. The financial application suite is installed in the folder C:\Program Files\MT Apps. The financial application suite contains many executable files.

Users must also be able to use Internet Explorer to access a browser-based application on the company intranet. The browser-based application makes extensive use of unsigned ActiveX components.

The financial application suite and the browser-based application are frequently updates with patches or new versions.

You need to configure the terminal servers to prevent users from running unauthorized applications. You plan to configure software restriction policies in the TSPolicy GPO. To reduce administrative overhead, you want to create a solution that can be implemented once, without requiring constant reconfiguration.

Which three actions should you perform to configure software restriction polices?()

(Each correct answer presents part of the solution. Choose three)


参考答案:A, E, F

第10题:

To ensure device security, Cisco Network Admission Control works with antivirus software onwhich two endpoints? ()

  • A、 port
  • B、 server
  • C、 laptop
  • D、 wireless client

正确答案:B,C

更多相关问题