单选题Your corporate security policy requires that a user performing attacks must have limited network access and activities until an administrator can investigate.In the admin GUI, which sensor event policy action must you configure in "Configuration" "Sen

题目
单选题
Your corporate security policy requires that a user performing attacks must have limited network access and activities until an administrator can investigate.In the admin GUI, which sensor event policy action must you configure in "Configuration" > "Sensors" > "Sensor Event Policies" > [rule name] to accomplish this?()
A

Ignore

B

Replace users role

C

Terminate user session

D

Disable user account

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Your security policy requires that users authenticating to the Junos Pulse Access Control Service are connecting from a domain member endpoint on the internal corporate network.Which set of role access restrictions must you configure to enforce this security policy?()

A. Source IP and browser

B. Source IP and certificate

C. Certificate and Host Checker

D. Host Checker and source IP


参考答案:D

第2题:

Your corporate security policy requires that a user performing attacks must have limited network access and activities until an administrator can investigate.In the admin GUI, which sensor event policy action must you configure in "Configuration" >"Sensors" >"Sensor Event Policies" >[rule name] to accomplish this?()

A. Ignore

B. Replace users role

C. Terminate user session

D. Disable user account


参考答案:B

第3题:

Your network contains a server named Server1 that runs Windows Server 2008 R2.You have a user named User1.You need to ensure that User1 can view the events in the Security event log. The solution must minimize the number of rights assigned to User1.What should you do?()

A. In Event Viewer, filter the Security log.

B. In Event Viewer, configure the properties of the Security log.

C. In the Local Security Policy console, modify the Security Options.

D. In the Registry Editor, add a Security Descriptor Definition Language (SDDL) value.


参考答案:D

第4题:

Your security policy requires that users authenticating to the Junos Pulse Access Control Service are connecting from a domain member endpoint on the internal corporate network.Which set of role access restrictions must you configure to enforce this security policy?()

  • A、Source IP and browser
  • B、Source IP and certificate
  • C、Certificate and Host Checker
  • D、Host Checker and source IP

正确答案:D

第5题:

You want to enforce a Host Checker policy so that only users who pass the policy receive the Employee role. In the admin GUI, which two parameters must you configure?()

  • A、Select "Require and Enforce" for the Host Checker Policy in the realm authentication policy.
  • B、Select "Evaluate Policies" for the Host Checker policy in the realm authentication policy.
  • C、Configure the Host Checker policy as a role restriction for the Employee role.
  • D、Configure the Host Checker policy as a resource access policy for the Employee role.

正确答案:B,C

第6题:

You are an administrator of a large campus network. Every switch on a floor within each building of your campus has been configured for a different VLAN. During implementation of the Junos Pulse Access Control Service, you must configure a RADIUS return attribute policy to apply a role representing a group of authenticated users that frequently transport their laptops from building to building and floor to floor.In the admin GUI, which policy element would you enable to accommodate these users?()

A. Add Session-Timeout attribute with value equal to the session lifetime

B. Add Termination-Action attribute with value equal 1

C. VLAN

D. Open port


参考答案:D

第7题:

You are an administrator of a large campus network. Every switch on a floor within each building of your campus has been configured for a different VLAN. During implementation of the Junos Pulse Access Control Service, you must configure a RADIUS return attribute policy to apply a role representing a group of authenticated users that frequently transport their laptops from building to building and floor to floor. In the admin GUI, which policy element would you enable to accommodate these users?()

  • A、Add Session-Timeout attribute with value equal to the session lifetime
  • B、Add Termination-Action attribute with value equal 1
  • C、VLAN
  • D、Open port

正确答案:D

第8题:

our company uses network access protection (NAP) to enforce policies on client computers that connect to the network. Client computes run windows vista. A group policy is used to configure client computers to obtain updates from WSUS. Company policy requires that updates labeled important and critical must be applied before client computers can access network resources. You need to ensure that client computers meet the company policy requirement. What should you do?()

A.Enable automatic updates on each client.

B.Enable the security center on each client.

C.Quarantine clients that do not have all available security updates installed.

D.Disconnect the remote connection until the required updates are installed.


参考答案:C

第9题:

Your corporate security policy requires that a user performing attacks must have limited network access and activities until an administrator can investigate.In the admin GUI, which sensor event policy action must you configure in "Configuration" > "Sensors" > "Sensor Event Policies" > [rule name] to accomplish this?()

  • A、Ignore
  • B、Replace users role
  • C、Terminate user session
  • D、Disable user account

正确答案:B

第10题:

You have a firewall enforcer protecting resources in a data center. A user is experiencing difficulty connecting to a protected resource.Which two elements must exist so the user can access the resource?()

  • A、Resource access policy on the MAG Series device
  • B、IPsec routing policy on the MAG Series device
  • C、General traffic policy blocking access through the firewall enforcer
  • D、Auth table entry on the firewall enforcer

正确答案:A,D

更多相关问题