You want to create a security po

题目

You want to create a security policy on an SRX240 that redirects unauthenticated users back to the Junos Pulse Access Control Service.Which two steps must you take to accomplish this task?()

  • A、Configure a captive-portal service that redirects all traffic back to the Junos Pulse Access Control Service.
  • B、Configure a security policy that references the unified-access-control captive-portal service.
  • C、Configure a captive-portal service that redirects unauthenticated traffic back to the Junos Pulse Access Control Service.
  • D、Configure a security policy that references the unified-access-control intranet-controller service.
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

You want to create a security policy allowing traffic from any host in the Trust zone to hostb.example.com (172.19.1.1) in the Untrust zone.How do you create this policy?()

A. Specify the IP address (172.19.1.1/32) as the destination address in the policy.

B. Specify the DNS entry (hostb.example.com) as the destination address in the policy.

C. Create an address book entry in the Trust zone for the 172.19.1.1/32 prefix and reference this entry in the policy.

D. Create an address book entry in the Untrust zone for the 172.19.1.1/32 prefix and reference this entry in the policy.


参考答案:D

第2题:

You need to design a method to deploy security configuration settings to servers. What should you do?()

  • A、Run the Resultant Set of Policy wizard with a Windows Management Instrumentation (WMI) filter on each department’s Server OU
  • B、Log on to each server and use local policy to configure and manage the security settings
  • C、Create a customer security template. Log on to a domain controller and run the seceditcommand to import the security template
  • D、Create a customer security template. Create a GPO and import the security template. Link the GPO to each department’s Server OU

正确答案:D

第3题:

You create a Web application for your company‘s intranet. You want to enable users to customize their versions of the intranet home page. You create sections of content as Web Parts. You need to ensure that users can customize content at any time.Which two code segments should you use?()

A.

B.

C.

D.


参考答案:B, C

第4题:

You are the network administrator for Blue Yonder Airlines. You plan to create an Active Directory domain named blueyonderairlines.com that will have a functional level of Windows Server 2003.  Your company has one main office and four branch offices, which are all located in one country. A central security department in the main office is responsible for creating and administering all user accounts in all offices. Each office has a local help desk department that is responsible for resetting passwordswithin the individual department’s office only.  All user accounts are located in the default Users container.  You need to create an organizational unit (OU) structure to support the delegation of authority requirements. You want to minimize the amount of administrative effort required to maintain the environment.  What should you do?()

  • A、 Create a top­level OU named BlueYonderAirlines_Users under the blueyonderairlines.com domain. Create a separate child OU for each office under BlueYonderAirlines_Users. Move the user accounts of all employees in each office to the child OU for that office.
  • B、 Create a top­level OU named Main_Office under the blueyonderairlines.com domain. Move the user accounts of all users in the main office to the Main_Office OU.Create a separate child OU for each branch office under the Main_Office OU. Move the user accounts of all users in each branch office to the child OU for that office.
  • C、 Create a top­level OU named BlueYonderAirlines_Users under the blueyonderairlines.com domain. Create a child OU named Central_Security under BlueYonderAirlines_Users. Move the user accounts of the central security department users to the Central_Security OU.Create a child OU named Help_Desk under BlueYonderAirlines_Users. Move the user accounts of the help desk users to the Help_Desk OU.
  • D、 Create a top­level OU named BlueYonderAirlines_Users under the blueyonderairlines.com domain. Create a child OU named Central_Security under BlueYonderAirlines_Users. Move the user accounts of the central security department users to the Central_Security OU.Create a separate child OU under BlueYonderAirlines_Users for each office. Move the user accounts of the help desk users in each office to the child OU for that office.

正确答案:A

第5题:

You want to create a new optimized database for your transactional production environment to be used by a financial application. While creating the database, you want the Oracle software to take care of all basic settings to optimize the database performance. Which method would you use to achieve this objective?()

  • A、Use the CREATE DATABASE .. command to create the database with Oracle-managed files. 
  • B、Use the Database Configuration Assistant (DBCA) to create the database with Oracle-managed files. 
  • C、Use Enterprise Manager to create a new database with the Online Transaction Processing (OLTP) option. 
  • D、Use Database Configuration Assistant (DBCA) to create the database with Transaction Processing template. 
  • E、Use the CREATE DATABASE .. command to create the database with Automatic Storage Management (ASM) file system.

正确答案:D

第6题:

You want to create a Host Checker policy that looks for a specific antivirus product that is running on your client machines, but the predefined antivirus options do not include the antivirus product version that you use.Which feature should you verify the antivirus product is up to date?()

A. Enhanced Endpoint Security

B. DP signatures

C. Antivirus licensing

D. Endpoint Security Assessment Plug-in


参考答案:D

第7题:

You need to design a method to standardize and deploy a baseline security configuration for servers. You solution must meet business requirements. What should you do?()

  • A、Create a script that installs the Hisecdc.inf security template
  • B、Use a GPO to distribute and apply the Hisec.inf security template
  • C、Use the System Policy Editor to configure each server’s security settings
  • D、Use a GPO to distribute and apply a custom security template

正确答案:D

第8题:

You are using Windows Communication Foundation (WCF) to create a service. You need to implement a custom message-level security binding element. Which binding element should you use?()

A. Transport Security Binding Element

B. Https Transport Binding Element

C. Ssl Stream Secunty Binding Element

D. Windows Stream Security Binding Element


参考答案:A

第9题:

You need to design an audit strategy for Southbridge Video. Your solution must meet business requirements.What should you do?()

  • A、Create a new security template that enables the Audit account logon events policy for successful and failed attempts. Create a new GPO, and link it to the domain. Import the new security template into the new GPO
  • B、Create a new security template that enables the Audit account logon events policy for successful and failed attempts. Create a new GPO, and link it to the Domain Controllers OU. Import the new security template into the new GPO
  • C、Create a new security template that enables the Audit logon events policy for successful and failed attempts. Create a new GPO, and link it to the Domain Controllers OU. Import the new security template into the new GPO
  • D、Create a new security template that enables the Audit logon events policy for successful and failed attempts. Create a new GPO, and link it to the domain. Import the new security template into the new GPO

正确答案:D

第10题:

You are the administrator of your company's network. You want to configure a Security Policy for the Windows 2000 Professional Computers that are in the sales department.   On one of the computers, you use Security Templates to configure the Security Policy based on the desired security settings. You then export those settings to an .inf file that will be used on all of the Computers in the sales department. You want to configure each Computer to have a customized Security Policy. What steps should you follow in order to achieve your goal?()

  • A、Use Secedit.exe to import the security settings from the .inf file to the computers in the sales department.
  • B、Use a text editor to change the default security settings to the desired security settings. Then export those settings to the Computers in the sales department.
  • C、Create an organizational unit (OU) named Sales. Add the users in the sales department to the Sales OU. Then apply the security template to the users in the Sales OU.
  • D、Create an organizational unit (OU) named Sales. Add the computers in the sales department to the Sales OU. Then apply the security template to computers in the Sales OU.

正确答案:D

更多相关问题