多选题You want to customize access to the corporate network so that agentiess users are instructed to obtain a certificatebefore accessing the network.Which two configurations solve this problem? ()ACreate a custom sign-in page with specific instructions in

题目
多选题
You want to customize access to the corporate network so that agentiess users are instructed to obtain a certificatebefore accessing the network.Which two configurations solve this problem? ()
A

Create a custom sign-in page with specific instructions in the Instructions field.

B

Create a custom sign-in page with specific Missing Certificate messages in the Custom error messages field.

C

Create a custom sign-in policy with specific instructions in the Instructions field.

D

Create a custom sign-in notification and assign it to the Pre-Auth Sign-in Notification in the sign-in policy.

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Your security policy requires that users authenticating to the Junos Pulse Access Control Service are connecting from a domain member endpoint on the internal corporate network.Which set of role access restrictions must you configure to enforce this security policy?()

A. Source IP and browser

B. Source IP and certificate

C. Certificate and Host Checker

D. Host Checker and source IP


参考答案:D

第2题:

You must configure access to the corporate network for employees using a client access method. Users require IPsec tunneling to protected resources and an 802.1X supplicant. Users will access the network using Windows platforms.Which two client access methods would support these requirements?()

A. Junos Pulse

B. Java Agent

C. Odyssey Access Client

D. Native 802.1X supplicant


参考答案:A, C

第3题:

You create a Web application for your company‘s intranet. You want to enable users to customize their versions of the intranet home page. You create sections of content as Web Parts. You need to ensure that users can customize content at any time.Which two code segments should you use?()

A.

B.

C.

D.


参考答案:B, C

第4题:

What is the primary purpose of creating a Location Group Policy? ()

A. to associate more than one realm with an authentication server

B. to logically group network access devices and associate them with specific sign-in policies

C. to allow or prevent users from accessing resources in specific locations on the network

D. to define the URL that users of network access devices can use to access the Infranet Controller


参考答案:B

第5题:

You want to restrict access to a role based on the client machine from which the user is accessing the network.Which two role restrictions accomplish this goal? ()

A. user name

B. password length

C. certificate

D. Host Checker


参考答案:C, D

第6题:

You notice that during peak hours, some firewall enforcers contain a high number of auth table entries. As you investigate the issue, you discover that all users are getting auth table mappings to all firewalls, which is not acceptable.What should you do on the Junos Pulse Access Control Service to resolve this problem?()

A. Delete the default auth table mapping policy

B. Create auth table mapping policies that route users to specific resources

C. Create Resource Access policies that permit access to specific resources

D. Create Source Interface policies that route users to specific resources


参考答案:A

第7题:

On the Junos Pulse Access Control Service, you have created a role called Secret that you only want to provide to users who present a certificate.Using the admin GUI, which two features would you configure to satisfy this requirement?()

A. Sign-in Policy

B. Role Mapping Rule

C. Role Restrictions

D. Trusted Server CA


参考答案:B, C

第8题:

The LAN needs are expanding at the Ezonexam corporate office, which is quickly growing. You are instructed to enlarge the area covered by a single LAN segment on the Ezonexam network.

Which of the following are layer 1 devices that you can use? (Choose all that apply.)

A.A switch

B.A router

C.A network adapter card

D.A hub

E.A repeater


正确答案:DE
解析:Explanation:
A hub simply repeats the electrical signal and makes no attempt to interpret the electrical signal (layer 1) as a LAN frame. (Layer 2). So, a hub actually performs OSI layer 1 functions, repeating an electrical signal, whereas a switch performs OSI layer 2 functions, actually interpreting Ethernet header information, particularly addresses, to make forwarding decisions. Hubs can be used to increase the number of stations that can be supported on a LAN.

Because the repeater does not interpret what the bits mean, but does examine and generate electrical signals, a repeater is considered to operate at Layer 1. Repeaters can be used to physically extend the LAN to greater distances.

第9题:

You want to customize access to the corporate network so that agentiess users are instructed to obtain a certificatebefore accessing the network.Which two configurations solve this problem? ()

A. Create a custom sign-in page with specific instructions in the "Instructions" field.

B. Create a custom sign-in page with specific "Missing Certificate" messages in the "Custom error messages" field.

C. Create a custom sign-in policy with specific instructions in the "Instructions" field.

D. Create a custom sign-in notification and assign it to the "Pre-Auth Sign-in Notification" in the sign-in policy.


参考答案:A, D

第10题:

The LAN needs are expanding at the Testking corporate office, which is quickly growing. You are instructed to enlarge the area covered by a single LAN segment on the TestKing network.Which of the following are layer 1 devices that you can use?()

A. A switch.

B. A router.

C. A network adapter card.

D. A hub.

E. A repeater.


参考答案:D, E

更多相关问题