You are configuring an LDAP authentication server, and you want to configure role-mapping rules based on group membership. When you attempt to search for groups in the server catalog, no groups appear.Assuming the LDAP server is reachable and functioning properly, in the admin GUI. Which two parts of the configuration should you verify are correct?()
第1题:
You are configuring an LDAP authentication server, and you want to configure role-mapping rules based on group membership. When you attempt to search for groups in the server catalog, no groups appear.Assuming the LDAP server is reachable and functioning properly, in the admin GUI. Which two parts of the configuration should you verify are correct?()
A. Finding user entries
B. Authentication required
C. LDAP Server Type
D. Determining group membership
第2题:
ou perform a security audit of a server named DC1. You install the Microsoft Network Monitor 3.0 application on DC1.You plan to capture all the LDAP traffic that comes to and goes from the server between 20:00 and 07:00 the next day and save it to the E:///data.cap file.You create a scheduled task. You add a new Start a program action to the task. You need to add theapplication name and the application arguments to the new action. What should you do?()
第3题:
You notice that during peak hours, some firewall enforcers contain a high number of auth table entries. As you investigate the issue, you discover that all users are getting auth table mappings to all firewalls, which is not acceptable.What should you do on the Junos Pulse Access Control Service to resolve this problem?()
A. Delete the default auth table mapping policy
B. Create auth table mapping policies that route users to specific resources
C. Create Resource Access policies that permit access to specific resources
D. Create Source Interface policies that route users to specific resources
第4题:
You navigate to "UAC" > "Infranet Enforcer" > "Auth Table Mapping" in the admin GUI. You see one policy, which is the unmodified, original default policy.Which statement is true?()
第5题:
What is the correct command for creating a new user ID authenticated with LDAP?()
第6题:
A.mkuser -R LDAP <new uid>
B.mkuser -L LDAP <new uid>
C.mkuser -auth LDAP <new uid>
D.mkuser -a auth1=LDAP <new uid>
第7题:
What is the correct command for creating a new user ID authenticated with LDAP?()
第8题:
A. Enable Custom Instructions
B. Pre-auth notification
C. Remediation message
D. Send reason strings
第9题:
Which parameter do you use to enable Junos Pulse Access Control Service enforcement on a policy on a ScreenOS platform?()
第10题:
如果/etc/syslog.conf中,包含以下设置:“auth.warning/var/adm/auth.log”,则以下说法正确的是:()。