A user logs in and is mapped to two roles. The first role ha

题目
多选题
A user logs in and is mapped to two roles. The first role has a maximum timeout value of 600 minutes and the default Juniper Networks logo on the user interface page. The second role has a maximum timeout value of 1200 minutes and a custom logo on the user interface page. Based on the merging of these two roles, which two will be applied?()
A

A custom logo on the user interface page

B

A maximum timeout value of 600 minutes

C

A maximum time out value of 1200 minutes

D

A default Juniper Networks logo on the user interface page

参考答案和解析
正确答案: D,C
解析: 暂无解析
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

An outside vendor is eligible for the guest role and the contractor role when accessing your network, that is secured with the Junos Pulse Access Control Service.What is the default role-mapping behavior?()

A. The vendor must select a role from a list of eligible roles.

B. The vendor must select a rule from a list of eligible rules.

C. The vendor is automatically mapped to the first configured role

D. The vendor is automatically granted a merged role.


参考答案:D

第2题:

You want to restrict access to a role based on the client machine from which the user is accessing the network.Which two role restrictions accomplish this goal? ()

A. user name

B. password length

C. certificate

D. Host Checker


参考答案:C, D

第3题:

What are two steps to configure user authentication for a Junos Pulse Access Control Service?()

A. Configure an authentication policy as part of the user role definitions.

B. Configure a Sign-in Policy.

C. Configure authentication agents as part of the user role definitions

D. Configure an authentication policy as part of the authentication realm definition.


参考答案:B, D

第4题:

Which two statements are true regarding firewall user authentication?() (Choose two.)

  • A、When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.
  • B、When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.
  • C、If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .
  • D、If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.

正确答案:B,C

第5题:

Which two items does a user object in the UCS system contain?()

  • A、Authentication and Authorization credentials
  • B、Microsoft Active Directory credentials
  • C、LDAP assignment
  • D、Role assignment

正确答案:A,D

第6题:

Click the Exhibit button.A customer configures the Junos Pulse Access Control Service with a Contractor role, an Employee role, and a Remediation role. A user logs in and is assigned the Remediation role. Referring to the exhibit, to which RADIUS Return Attributes Policy will the user be assigned?()

A. CorporateVLAN

B. EmployeeVLAN

C. RemediationVLAN

D. GuestVLAN


参考答案:D

第7题:

Two users share the same Windows 7 computer. The first user creates a document intended to be used by both users, and then logs off. The second user logs on and types the name of the document in the Start menu, but the document is not found. Which of the following is the problem?()

A. The document is set to hidden.

B. The document is locked.

C. The document was saved as a system document.

D. The document is owned by the first user.


参考答案:D

第8题:

You are customizing the user interface options for the finance department in your organization. Users in the department are able to see a session counter on the Web interface of the Junos Pulse Access Control Service. The CFO is unable to see the session counter.Which explanation would cause this behavior?()

A. The CFO is mapped to the finance role, but the session counter was enabled prior to the role mapping.

B. The CFO is mapped to the finance role, but the session counter was enabled after the role mapping.

C. The CFO is mapped to the executive and finance roles, but the CFO was mapped to the executive role first, which does not have the session counter enabled.

D. The CFO is mapped to the executive and finance roles, but the CFO was mapped to the executive role last, which does not have the session counter enabled.


参考答案:C

第9题:

A user logs in and is mapped to two roles. The first role has a maximum timeout value of 600 minutes and the default Juniper Networks logo on the user interface page. The second role has a maximum timeout value of 1200 minutes and a custom logo on the user interface page. Based on the merging of these two roles, which two will be applied?()

  • A、A custom logo on the user interface page
  • B、A maximum timeout value of 600 minutes
  • C、A maximum time out value of 1200 minutes
  • D、A default Juniper Networks logo on the user interface page

正确答案:C,D

第10题:

Two users share the same Windows 7 computer. The first user creates a document intended to be used by both users, and then logs off. The second user logs on and types the name of the document in the Start menu, but the document is not found. Which of the following is the problem?()

  • A、The document is set to hidden.
  • B、The document is locked.
  • C、The document was saved as a system document.
  • D、The document is owned by the first user.

正确答案:D

更多相关问题