You are configuring an LDAP auth

题目

You are configuring an LDAP authentication server, and you want to configure role-mapping rules based on group membership. When you attempt to search for groups in the server catalog, no groups appear.Assuming the LDAP server is reachable and functioning properly, in the admin GUI. Which two parts of the configuration should you verify are correct?()

  • A、Finding user entries
  • B、Authentication required
  • C、LDAP Server Type
  • D、Determining group membership
参考答案和解析
正确答案:B,D
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

You are configuring an LDAP authentication server, and you want to configure role-mapping rules based on group membership. When you attempt to search for groups in the server catalog, no groups appear.Assuming the LDAP server is reachable and functioning properly, in the admin GUI. Which two parts of the configuration should you verify are correct?()

A. Finding user entries

B. Authentication required

C. LDAP Server Type

D. Determining group membership


参考答案:B, D

第2题:

ou perform a security audit of a server named DC1. You install the Microsoft Network Monitor 3.0 application on DC1.You plan to capture all the LDAP traffic that comes to and goes from the server between 20:00 and 07:00 the next day and save it to the E:///data.cap file.You create a scheduled task. You add a new Start a program action to the task. You need to add theapplication name and the application arguments to the new action. What should you do?()

  • A、Add nmcap.exe as the application name. Add the /networks * /capture LDAP /file e:/data.cap /stopwhen /timeafter 11hours line as arguments.
  • B、Add netmon.exe as the application name. Add the /networks */capture LDAP /file e:/data.cap /stopwhen /timeafter 11hours line as arguments.
  • C、Add nmcap.exe as the application name. Add the /networks * /capture !LDAP /file e:/data.cap /stopwhen /timeafter 11hours line as arguments.
  • D、Add nmconfig.exe as the application name. Add the /networks * /capture &LDAP /file e:/data.cap /stopwhen /timeafter 11hours line as arguments.

正确答案:A

第3题:

You notice that during peak hours, some firewall enforcers contain a high number of auth table entries. As you investigate the issue, you discover that all users are getting auth table mappings to all firewalls, which is not acceptable.What should you do on the Junos Pulse Access Control Service to resolve this problem?()

A. Delete the default auth table mapping policy

B. Create auth table mapping policies that route users to specific resources

C. Create Resource Access policies that permit access to specific resources

D. Create Source Interface policies that route users to specific resources


参考答案:A

第4题:

You navigate to "UAC" > "Infranet Enforcer" > "Auth Table Mapping" in the admin GUI. You see one policy, which is the unmodified, original default policy.Which statement is true?()

  • A、Dynamic auth table mapping is not enabled.
  • B、A successful authentication attempt will result in a new authentication table entry, which will be delivered only to the Junos enforcer protecting the network from which the user has authenticated.
  • C、To create a static auth table mapping, you must delete the default policy.
  • D、The default policy applies only to the factory-default role User.

正确答案:A

第5题:

What is the correct command for creating a new user ID authenticated with LDAP?()  

  • A、mkuser -R LDAP 
  • B、mkuser -L LDAP 
  • C、mkuser -auth LDAP 
  • D、mkuser -a auth1=LDAP 

正确答案:A

第6题:

What is the correct command for creating a new user ID authenticated with LDAP?()

A.mkuser -R LDAP <new uid>

B.mkuser -L LDAP <new uid>

C.mkuser -auth LDAP <new uid>

D.mkuser -a auth1=LDAP <new uid>


参考答案:A

第7题:

What is the correct command for creating a new user ID authenticated with LDAP?()

  • A、mkuser -R LDAP <new uid>
  • B、mkuser -L LDAP <new uid>
  • C、mkuser -auth LDAP <new uid>
  • D、mkuser -a auth1=LDAP <new uid>

正确答案:A

第8题:

You have created a Host Checker policy that contains multiple rules. You want to inform end users which rule specifically has failed.In the admin GUI, which configuration setting would you enable?()

A. Enable Custom Instructions

B. Pre-auth notification

C. Remediation message

D. Send reason strings


参考答案:D

第9题:

Which parameter do you use to enable Junos Pulse Access Control Service enforcement on a policy on a ScreenOS platform?()

  • A、uac-policy
  • B、ic-policy
  • C、inyranet-auth
  • D、uac-auth

正确答案:C

第10题:

如果/etc/syslog.conf中,包含以下设置:“auth.warning/var/adm/auth.log”,则以下说法正确的是:()。

  • A、/var/adm/auth.log将仅仅记录auth的warning级别的日志
  • B、/var/adm/auth.log将记录auth的emerg、alert、crit、err、warning级别的日志
  • C、/var/adm/auth.log将记录auth的warning、notice、info、debug级别的日志
  • D、/var/adm/auth.log将记录auth的所有级别的日志

正确答案:B

更多相关问题