多选题What are two valid configurations for user-driven remediation when a Windows-based endpoint fails a Host Checker policy?()AKill a running process on the endpoint, based on executable name and MD5 checksum.BDelete a file on the endpoint's file system.CD

题目
多选题
What are two valid configurations for user-driven remediation when a Windows-based endpoint fails a Host Checker policy?()
A

Kill a running process on the endpoint, based on executable name and MD5 checksum.

B

Delete a file on the endpoint's file system.

C

Download and run a remediation executable from the local software distribution server.

D

Alter registry entries to prevent future execution of an executable, based on executable name and full path.

参考答案和解析
正确答案: A,D
解析: 暂无解析
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Your security policy requires that users authenticating to the Junos Pulse Access Control Service are connecting from a domain member endpoint on the internal corporate network.Which set of role access restrictions must you configure to enforce this security policy?()

A. Source IP and browser

B. Source IP and certificate

C. Certificate and Host Checker

D. Host Checker and source IP


参考答案:D

第2题:

Your company has deployed the Junos Pulse Access Control Service. The system administrator notices that the Host Checker policies are not being applied and enforced. You have verified that the controllers configuration is correct.Which two conditions are causing this issue?()

A. The endpoint is using EAP-PEAP with EAP-GTC as the inner protocol,

B. The endpoint is using EAP-TTLS with EAP-JUAC as the inner protocol.

C. The endpoint is using EAP-FAST with EAP-GTC as the inner protocol,

D. The endpoint is using EAP-PEAP with EAP-JUAC as the inner protocol.


参考答案:A, C

第3题:

You are developing a Windows Communication Foundation (WCF) service that must be discoverable.You need to ensure that the ServiceHost instance supports multiple discovery versions.What should you do?()

A. - Specify a unique DiscoveryVersion parameter for each endpoint constructor. - Use the same value for the Address property of each endpoint.

B. - Use the endpoint constructor without the DiscoveryVersion parameter. - Use a unique value for the Address property of each endpoint.

C. - Specify a unique DiscoveryVersion parameter for each endpoint constructor. - Use a unique value for the Address property of each endpoint.

D. - Use the endpoint constructor without the DiscoveryVersion parameter. - Use the same value for the Address property of each endpoint.


参考答案:C

第4题:

What is a Host Enforcer policy?()

  • A、A policy that is defined on the endpoint that permits or denies inbound or outbound traffic.
  • B、A policy that is sent to the endpoint that permits or denies inbound or outbound traffic.
  • C、A policy that is sent to the protected resource that permits or denies inbound or outbound traffic.
  • D、A policy that is defined on the protected resource that permits or denies inbound or outbound traffic.

正确答案:B

第5题:

You want to create a Host Checker policy that looks for a specific antivirus product that is running on your client machines, but the predefined antivirus options do not include the antivirus product version that you use.Which feature should you verify the antivirus product is up to date?()

A. Enhanced Endpoint Security

B. DP signatures

C. Antivirus licensing

D. Endpoint Security Assessment Plug-in


参考答案:D

第6题:

What is a Host Enforcer policy?()

A. A policy that is defined on the endpoint that permits or denies inbound or outbound traffic.

B. A policy that is sent to the endpoint that permits or denies inbound or outbound traffic.

C. A policy that is sent to the protected resource that permits or denies inbound or outbound traffic.

D. A policy that is defined on the protected resource that permits or denies inbound or outbound traffic.


参考答案:B

第7题:

In a Junos Pulse Access Control Service active/active clustered environment, which statement is true about VIPs?()

A. VIP is not required when using only agentless access for all endpoint platforms.

B. VIP is not required when using Junos Pulse or Odyssey Access Client for all endpoint platforms.

C. VIP is not required when using Junos Pulse and agentless access for all endpoint platforms.

D. VIP is not required when using Odyssey Access Client and agentless access for all endpoint platforms.


参考答案:B

第8题:

You are developing a Windows Communication Foundation (WCF) service. The service needs to access out-of-process resources.You need to ensure that the service accesses these resources on behalf of the originating caller. What should you do?()

A. Set the value of ServiceSecurityContext.Current.WindowsIdentity.ImpersonationLevel to TokenlmpersonationLevel.Impersonation

B. Set the value of ServiceSecurityContext.Current.Windowsldentity.ImpersonationLevel to TokenlmpersonationLevel.Delegation

C. Set the PrincipalPermissionAttribute on the service contract and update the binding attribute in the endpoint element of the configuration file to wsHttpBinding

D. Set the PnncipalPermissionAttribute on the service contract and update the bindingConfiguration attribute in the endpoint element of the configuration file to wsHttpBinding


参考答案:B

第9题:

Refertotheexhibit.Whichstatementistrueaboutwheretrustboundariesshouldbeestablishedinanetwork?()

A.Endpoints2and3areoptimalplacestoestablishatrustboundary.Endpoint1isanacceptableplacetoestablishatrustboundary.

B.Endpoint2istheoptimalplacetoestablishatrustboundary.Endpoints1and3areacceptableplacestoestablishatrustboundary.

C.Endpoint2istheonlyacceptableplacetoestablishatrustboundary.

D.Endpoint1istheonlyacceptableplacetoestablishatrustboundary.

E.Endpoints1and2areoptimalplacestoestablishatrustboundary.Endpoint3isanacceptableplacetoestablishatrustboundary.

F.Endpoint1istheoptimalplacetoestablishatrustboundary.Endpoints2and3areacceptableplacestoestablishatrustboundary.


参考答案:E

第10题:

You want to create a Host Checker policy that looks for a specific antivirus product that is running on your client machines, but the predefined antivirus options do not include the antivirus product version that you use.Which feature should you verify the antivirus product is up to date?()

  • A、Enhanced Endpoint Security
  • B、DP signatures
  • C、Antivirus licensing
  • D、Endpoint Security Assessment Plug-in

正确答案:D

更多相关问题