单选题A user calls the help desk and explains that they just purchased a Macintosh computer. When they log into the network, the Odyssey Access Client is not automatically downloaded as it was when the user used their Windows PC.How do you resolve this issue

题目
单选题
A user calls the help desk and explains that they just purchased a Macintosh computer. When they log into the network, the Odyssey Access Client is not automatically downloaded as it was when the user used their Windows PC.How do you resolve this issue?()
A

Download the Macintosh installer from the Junos Pulse Access Control Service and manually install the Odyssey Access Client.

B

Provide the user with the sign-in URL you set up for Macintosh users; this will push the Odyssey Access Client to the user's machine.

C

Assist the user to configure the Macintosh native supplicant and provide the AppleScnptto expose the EAP-JUAC inner authentication protocol.

D

Configure the user's role to install the Java agent, which is a requirement to allow the Junos Pulse Access Control Service to deploy the Odyssey Access Client.

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

A user calls the help desk and explains that they just purchased a Macintosh computer. When they log into the network, the Odyssey Access Client is not automatically downloaded as it was when the user used their Windows PC.How do you resolve this issue?()

  • A、Download the Macintosh installer from the Junos Pulse Access Control Service and manually install the Odyssey Access Client.
  • B、Provide the user with the sign-in URL you set up for Macintosh users; this will push the Odyssey Access Client to the user's machine.
  • C、Assist the user to configure the Macintosh native supplicant and provide the AppleScnptto expose the EAP-JUAC inner authentication protocol.
  • D、Configure the user's role to install the Java agent, which is a requirement to allow the Junos Pulse Access Control Service to deploy the Odyssey Access Client.

正确答案:A

第2题:

A user is successfully authenticating to the network but is unable to access protected resources behind a ScreenOS enforcer. You log in to the ScreenOS enforcer and issue the command get auth table infranet and you do not see the user listed.Which two event log settings on the Junos Pulse Access Control Service must you enable to troubleshootthis issue?()

  • A、Connection Requests
  • B、System Errors
  • C、Enforcer Events
  • D、Enforcer Command Trace

正确答案:C,D

第3题:

You are the administrator of a Windows 2000 Active Directory network. The network consists of a single domain. The domain includes 20 Windows NT Workstation 4.0 client computers. All other client computers are Windows 2000 Professional computers.

You create a Windows NT 4.0 default user policy on the Windows 2000 Server computer that is configured as the PDC emulator. This default user policy denies access to Network Neighborhood. You then install Terminal Services on one of the servers and Terminal Services Client on the 20 Windows NT Workstation client computers.

You find that the users of the Terminal Server can still browse the network when they open My Network Places. You want to prevent all users from browsing the network.

What should you do?

A.Modify the Windows NT policy template file so that you can restrict access to both My Network Places and Network Neighborhood. Save the policy file on the Terminal Server.

B.Copy the Windows NT policy file to the 20 Windows NT Workstation computers.

C.Create a Windows 2000 Group Policy that denies user access to My Network Places.

D.Edit the local registry on the Windows NT Workstation computers to deny access to Entire Network in Network Neighborhood.


正确答案:C
解析:Explanation: Windows NT 4.0 system polices affect computers running Windows NT 4.0. The Windows NT computers in this scenario are being used as Terminals for the Windows 2000 Server computer that is running Terminal Services. In effect the Windows NT clients are running locally on the Windows 2000 Server. The restriction must be applied on the Windows 2000 Server. This can be done by using a group policy.

Incorrect answers:
A: System policy templates only affect Windows NT 4.0 computers. The restriction must be applied on the Windows 2000 Server.

B: Windows NT policies only affect Windows NT 4.0 computers. The restriction must be applied on the Windows 2000 Server.

D: The NT clients are running locally on the Windows 2000 Server. The restriction must be applied on the Windows 2000 Server.

第4题:

You are a network administrator for your company. The network consists of a single Active Directory domain. The domain contains three Windows Server 2003 domain controllers, 20 Windows Server 2003 member servers, and 750 Windows XP Professional computers. The domain is configured to use only Kerberos authentication for all server connections.A user reports that she receives an "Access denied" error message when she attempts to connect to one of the member servers. You want to test the functionality of Kerberos authentication on the user’s client computer.  Which command should you run from the command prompt on the user’s computer?()

  • A、netsh
  • B、netdiag
  • C、ktpass
  • D、ksetup

正确答案:B

第5题:

A new software engineer has been hired. As part of the normal hiring process, the user was added to the Active Directory and placed into the Domain Users group and the SW_DEV group. The Domain Users group has access to the company's intranet website and time card system. The SW_DEV group has access to the source code library server. You have created roles that correspond to each Active Directory group. The user calls the help desk stating that they cannot access the source code library server. Which two troubleshooting tools would you use on the Junos Pulse Access Control Service to resolve the issue?()

  • A、Perform a policy trace for the specific user and review the output to isolate the problem.
  • B、Review the Events log.
  • C、Review the Admin Access log to verify that the user has the correct permissions to access the SVVJDEV resource.
  • D、Review the User Access log to verify that the user is getting mapped to both the Domain User role and the SW_DEV role.

正确答案:A,D

第6题:

You are using windows installer to deploy an application to 750 Windows 2000 Professional computers on your network. The network includes organizational unit (OU) named sales. A Group Policy object (GPO) is created for the Sales OU. You want to deploy that application in such a way that the shortcuts of that application should be created on the used desktop as well as in start-menu. When a user first click on the shortcut or try to open any file whose extension is associated with that application, then that application should automatically install on the computer. What should you do to accomplish this task?()

  • A、Using GPO, publish that application at user level
  • B、Using GPO, assign that application at the user level
  • C、Using GPO, publish that application at computer level
  • D、Using GPO, assign that application at the computer level.

正确答案:B

第7题:

You have three classes of users on your network: employee, contractor, and IT administrator. You configure the Junos Pulse Access Control Service to assign roles to each user class and require that a specific wireless SSID be preconfigured for the Odyssey Access Client based on the role. Which configuration method should you use to satisfy this scenario?()

  • A、Create a "Settings Update file" in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under "User Roles" > "Agent" > "Odyssey Settings" > "Preconfigured Installer".
  • B、Configure a wired adapter and assign the required SSID under "User Roles" > "Agent" > "Odyssey Settings".
  • C、Create a script in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under "User Roles" > "Agent" > "Odyssey Settings" > "Preconfigured Installer".
  • D、Create a "Preconfiguration file" in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under "User Roles" > "Agent" > "Odyssey Settings" > "Preconfigured Installer".

正确答案:A,B,D

第8题:

A user is successfully authenticating to the network but is unable to access protected resources behind a ScreenOS enforcer. You log in to the ScreenOS enforcer and issue the command get auth table infranet and you do not see the user listed.Which two event log settings on the Junos Pulse Access Control Service must you enable to troubleshootthis issue?()

A. Connection Requests

B. System Errors

C. Enforcer Events

D. Enforcer Command Trace


参考答案:C, D

第9题:

You are a security administrator for your company. The network consists of a single Active Directory domain. Servers run either Windows Server 2003 or Windows 2000 Server. All client computers run Windows XP Professional.    The company’s written security policy states that user accounts must be locked if an unauthorized user attempts to guess the users, passwords. The current account policy locks out a user after two invalid password attempts in five minutes. The user remains locked out until the account is reset by an administrator. Users frequently call the help desk to have their account unlocked. Calls related to account lockout constitute 25 percent of help desk calls.    You need to reduce the number of help desk calls related to account lockout.  What should you do?()

  • A、 Modify the Default Domain Controllers Policy Group Policy object(GPO). Increase the maximum lifetime for service
  • B、 Modify the Default Domain Policy Group Policy object(GPO). Configure an account lockout threshold of 10.
  • C、 Modify the Default Domain Controllers Policy Group Policy object(GPO). Disable the enforcement of user logon res
  • D、 Modify the Default Domain Policy Group Policy object(GPO). Increase the minimum password age.

正确答案:B

第10题:

Your company’s network has client computers that run Windows 7.    When a user attempts to log on to the domain from a computer named Client1,she receives the following message:   The system cannot log you on to this domain because the system’s computer account in its primary domain is missing or the password on that account is incorrect.  You need to ensure that the user can log on to the domain from Client1.   What should you do?()

  • A、Disjoin and rejoin Client1 to the domain.
  • B、Add the computer account for Client1 to the Domain Computers Active Directory group.
  • C、Reset the account password for Client1 through Active Directory Users and Computers.
  • D、Reset the account password for the user through Active Directory Users and Computers.

正确答案:A

更多相关问题