Kill a running process on the endpoint, based on executable name and MD5 checksum.
Delete a file on the endpoint's file system.
Download and run a remediation executable from the local software distribution server.
Alter registry entries to prevent future execution of an executable, based on executable name and full path.
第1题:
Your security policy requires that users authenticating to the Junos Pulse Access Control Service are connecting from a domain member endpoint on the internal corporate network.Which set of role access restrictions must you configure to enforce this security policy?()
A. Source IP and browser
B. Source IP and certificate
C. Certificate and Host Checker
D. Host Checker and source IP
第2题:
Your company has deployed the Junos Pulse Access Control Service. The system administrator notices that the Host Checker policies are not being applied and enforced. You have verified that the controllers configuration is correct.Which two conditions are causing this issue?()
A. The endpoint is using EAP-PEAP with EAP-GTC as the inner protocol,
B. The endpoint is using EAP-TTLS with EAP-JUAC as the inner protocol.
C. The endpoint is using EAP-FAST with EAP-GTC as the inner protocol,
D. The endpoint is using EAP-PEAP with EAP-JUAC as the inner protocol.
第3题:
You are developing a Windows Communication Foundation (WCF) service that must be discoverable.You need to ensure that the ServiceHost instance supports multiple discovery versions.What should you do?()
A. - Specify a unique DiscoveryVersion parameter for each endpoint constructor. - Use the same value for the Address property of each endpoint.
B. - Use the endpoint constructor without the DiscoveryVersion parameter. - Use a unique value for the Address property of each endpoint.
C. - Specify a unique DiscoveryVersion parameter for each endpoint constructor. - Use a unique value for the Address property of each endpoint.
D. - Use the endpoint constructor without the DiscoveryVersion parameter. - Use the same value for the Address property of each endpoint.
第4题:
What is a Host Enforcer policy?()
第5题:
You want to create a Host Checker policy that looks for a specific antivirus product that is running on your client machines, but the predefined antivirus options do not include the antivirus product version that you use.Which feature should you verify the antivirus product is up to date?()
A. Enhanced Endpoint Security
B. DP signatures
C. Antivirus licensing
D. Endpoint Security Assessment Plug-in
第6题:
A. A policy that is defined on the endpoint that permits or denies inbound or outbound traffic.
B. A policy that is sent to the endpoint that permits or denies inbound or outbound traffic.
C. A policy that is sent to the protected resource that permits or denies inbound or outbound traffic.
D. A policy that is defined on the protected resource that permits or denies inbound or outbound traffic.
第7题:
A. VIP is not required when using only agentless access for all endpoint platforms.
B. VIP is not required when using Junos Pulse or Odyssey Access Client for all endpoint platforms.
C. VIP is not required when using Junos Pulse and agentless access for all endpoint platforms.
D. VIP is not required when using Odyssey Access Client and agentless access for all endpoint platforms.
第8题:
You are developing a Windows Communication Foundation (WCF) service. The service needs to access out-of-process resources.You need to ensure that the service accesses these resources on behalf of the originating caller. What should you do?()
A. Set the value of ServiceSecurityContext.Current.WindowsIdentity.ImpersonationLevel to TokenlmpersonationLevel.Impersonation
B. Set the value of ServiceSecurityContext.Current.Windowsldentity.ImpersonationLevel to TokenlmpersonationLevel.Delegation
C. Set the PrincipalPermissionAttribute on the service contract and update the binding attribute in the endpoint element of the configuration file to wsHttpBinding
D. Set the PnncipalPermissionAttribute on the service contract and update the bindingConfiguration attribute in the endpoint element of the configuration file to wsHttpBinding
第9题:
A.Endpoints2and3areoptimalplacestoestablishatrustboundary.Endpoint1isanacceptableplacetoestablishatrustboundary.
B.Endpoint2istheoptimalplacetoestablishatrustboundary.Endpoints1and3areacceptableplacestoestablishatrustboundary.
C.Endpoint2istheonlyacceptableplacetoestablishatrustboundary.
D.Endpoint1istheonlyacceptableplacetoestablishatrustboundary.
E.Endpoints1and2areoptimalplacestoestablishatrustboundary.Endpoint3isanacceptableplacetoestablishatrustboundary.
F.Endpoint1istheoptimalplacetoestablishatrustboundary.Endpoints2and3areacceptableplacestoestablishatrustboundary.
第10题:
You want to create a Host Checker policy that looks for a specific antivirus product that is running on your client machines, but the predefined antivirus options do not include the antivirus product version that you use.Which feature should you verify the antivirus product is up to date?()