Your security policy requires th

题目

Your security policy requires that users authenticating to the Junos Pulse Access Control Service are connecting from a domain member endpoint on the internal corporate network.Which set of role access restrictions must you configure to enforce this security policy?()

  • A、Source IP and browser
  • B、Source IP and certificate
  • C、Certificate and Host Checker
  • D、Host Checker and source IP
参考答案和解析
正确答案:D
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which statement describes the behavior of a security policy?()

  • A、The implicit default security policy permits all traffic.
  • B、Traffic destined to the device itself always requires a security policy.
  • C、Traffic destined to the device’s incoming interface does not require a security policy.
  • D、The factory-default configuration permits all traffic from all interfaces.

正确答案:C

第2题:

ou are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. All client computers run Windows XP Professional.Two of the servers on the network contain highly confidential documents. The company’s written security policy states that all network connections with these servers must be encrypted by using an IPSec policy.You place the two servers in an organizational unit (OU) named SecureServers. You configure a Group Policy object (GPO) that requires encryption for all connections. You assign the GPO to the SecureServers OU.  You need to verify that users are connecting to the two servers by using encrypted connections.   What should you do?()

  • A、Run the net view command.
  • B、Run the gpresult command.
  • C、Use the IP Security Monitor console.
  • D、Use the IPSec Policy Management console.

正确答案:C

第3题:

Your security policy requires that users authenticating to the Junos Pulse Access Control Service are connecting from a domain member endpoint on the internal corporate network.Which set of role access restrictions must you configure to enforce this security policy?()

A. Source IP and browser

B. Source IP and certificate

C. Certificate and Host Checker

D. Host Checker and source IP


参考答案:D

第4题:

You deploy mobile devices that run Microsoft Windows Mobile 5.0.   Company security policy requires an authentication process that is stronger than a user name and password combination.   You need to ensure that Microsoft ActiveSync sessions use an authentication process that meets the company security policy.   What should you do?()

  • A、Deploy a two-factor authentication process.
  • B、Deploy a single-factor authentication process.
  • C、Deploy a simple PIN policy for the Windows Mobilebased devices.
  • D、Deploy a complex PIN policy for the Windows Mobilebased devices.

正确答案:A

第5题:

Your company uses Network Access Protection (NAP) to enforce policies on client computers that connect to the network. Client computers run Windows 7. A Group Policy is used to configure client computers to obtain updates from Windows Server Update Services (WSUS).Company policy requires that updates labeled Important and Critical must be applied before client computers can access network resources.You need to ensure that client computers meet the company policy requirement. What should you do?()

  • A、Enable automatic updates on each client.
  • B、Enable the Security Center on each client.
  • C、Quarantine clients that do not have all available security updates installed.
  • D、Disconnect the connection until the required updates are installed.

正确答案:C

第6题:

Which two are needed components when designing and implementing a security solution?()

  • A、detailed VLAN information
  • B、an incident response plan
  • C、results of testing the new network configuration
  • D、an existing hierarchical network topology
  • E、a security policy for your organization

正确答案:B,E

第7题:

Your company uses network access protection (NAP) to enforce policies on client computers that connect to the network. Client computers run windows vista. A group Policy is used to configure client computers to obtain updates from WSUS. Company policy requires that updates labeled important and critical must be applied before client computers can access network resources. You need to ensure that client computes meet the company policy requirement. What should you do?()

  • A、Enable automatic updates on each client.
  • B、Enable the security center on each client.
  • C、Quarantine clients that do not have all available security updates installed.
  • D、Disconnect the remote connection until the required updates are installed.

正确答案:C

第8题:

Your corporate security policy requires that a user performing attacks must have limited network access and activities until an administrator can investigate.In the admin GUI, which sensor event policy action must you configure in "Configuration" >"Sensors" >"Sensor Event Policies" >[rule name] to accomplish this?()

A. Ignore

B. Replace users role

C. Terminate user session

D. Disable user account


参考答案:B

第9题:

You are the administrator of your company’s network. You use Security Templates to configure a Security Policy on the Windows 2000 Professional Computers in the Sales organizational unit (OU). You notice that the Computers in the Sales OU are not downloading the Security Policy settings. On each computer, the Security Policy appears in the Local Computer Policy, but is not listed as the effective policy. You want all computers in the Sales OU to have the Security Policy listed as the effective policy. How should you accomplish this task? ()

  • A、Use Security Templates to correct the setting and export the security file.
  • B、Use Security Configuration and Analysis to import the security setting. Then create a Group policy object (GPO) for the Sales QU.
  • C、Use Secedit /RefreshPolicy Machine_Policy command.
  • D、Use the Basicwk.inf security file settings, save the security file, and then import the fileto theComputers.

正确答案:C

第10题:

Your network consists of a single Active Directory domain. The domain contains a server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). Your company’s security policy states that domain users must be prevented from logging on to Server1 if a domain controller is unavailable. You disconnect Server1 from the network and discover that you can log on to Server1. You need to configure Server1 to comply with the company’s security policy. What should you do on Server1? ()

  • A、From the local security policy, modify the Security Options.
  • B、From the local security policy, modify the User Rights Assignment.
  • C、From Active Directory Users and Computers, modify the properties of the Server1 account.
  • D、From Active Directory Users and Computers, modify the properties of the Domain Computers group.

正确答案:A

更多相关问题