A user logs in and is mapped to two roles. The first role has a maximum timeout value of 600 minutes and the default Juniper Networks logo on the user interface page. The second role has a maximum timeout value of 1200 minutes and a custom logo on the us

题目

A user logs in and is mapped to two roles. The first role has a maximum timeout value of 600 minutes and the default Juniper Networks logo on the user interface page. The second role has a maximum timeout value of 1200 minutes and a custom logo on the user interface page. Based on the merging of these two roles, which two will be applied?()

  • A、A custom logo on the user interface page
  • B、A maximum timeout value of 600 minutes
  • C、A maximum time out value of 1200 minutes
  • D、A default Juniper Networks logo on the user interface page

相似考题
更多“A user logs in and is mapped to”相关问题
  • 第1题:

    After installing a network with one Samba server and several clients, users are complaining that they receive an Unable to browse the network error when trying to visit a public share. What is the most likely cause of this? ()

    • A、 The user entered the wrong username and/or password.
    • B、 The nmbd process is not running on the Samba server.
    • C、 The user hasn’t mapped the share to a local drive letter yet.
    • D、 The Samba server is not configured as a Domain Master Browser.

    正确答案:B

  • 第2题:

    Which of the following is the BEST way to make sure the network printer is automatically installed when the user logs on?()

    • A、Log onto the user’s computer as a local administrator and install the printer.
    • B、Make sure the user has permission to print to the printer.
    • C、Create and implement a logon script.
    • D、After the user has logged on, install the printer.

    正确答案:C

  • 第3题:

    Which of the following logs contains information on overall performance and events not related to user authentication?()

    • A、Security
    • B、Audit
    • C、Application
    • D、System

    正确答案:D

  • 第4题:

    An administrator created a .env file in a user’s home directory to configure a number of custom environment variables for a local application. However, after the user logs out and then logs back into the system, the custom variables are not being set What is the most likely reason that the custom .env file is being ignored?()

    • A、A shell other than ksh is being used by the user.
    • B、The line ’export ENV=$HOME/.env’ is missing from /etc/profile.
    • C、The line ’export ENV=$HOME/.env’ is missing from the user’s .profile.
    • D、The env_profile attribute is not defined for the user within /etc/security/user.

    正确答案:C

  • 第5题:

    You have an Exchange Server 2010 organization that contains Windows Mobile 5.0 devices. Your company plans to replace all mobile devices with Windows Mobile 6.5 devices.  You need to identify which users accessed their mailboxes by using Windows Mobile 5.0 devices in thepast month.  What should you do?()

    • A、Create a Data Collector Set.
    • B、Install and run the Exchange Server User Monitor (ExMon).
    • C、Export and review the Internet Information Services (IIS) logs.
    • D、Enable User Agent logging, and then review the agent logs.

    正确答案:C

  • 第6题:

    单选题
    You are the administrator of a Junos Pulse Access Control Service implementation. You must restrict authenticated users connected from the branch offices to a few specific resources within the data center. However, when the authenticated users are connected at the corporate office, they are allowed more access to the data center resources. You have created two roles with different levels of access and are trying to determine the best way of controlling when a user is mapped to a specific role. Having the user prompted to manually select their role is possible, but you want to automate the process. Which configuration solves this problem?()
    A

    Implement a RADIUS request attribute policy to assist with realm selection and create different role-mapping rules for the user in each realm.

    B

    Implement a directory/attribute server on the realm and set up this server to determine by group membership the proper role to which a user should be mapped.

    C

    Reorder the role-mapping rules to allow for the more open role to be mapped first and then enable the stop processing rules when this rule matches function on this role.

    D

    Implement a Host Checker policy on the realm that determines the geographic location of the device and restricts the user based on the results of the policy.


    正确答案: D
    解析: 暂无解析

  • 第7题:

    单选题
    What happens when Host Checker is configured to perform checks every "0" minutes? ()
    A

    Host Checker is disabled.

    B

    Host Checker will perform continous checks.

    C

    Host Checker will perform checks when user logs out.

    D

    Host Checker will perform checks when user first logs in.


    正确答案: C
    解析: 暂无解析

  • 第8题:

    单选题
    Which of the following options indicates why it is important to talk to the user and ask appropriate questions about a software problem? ()
    A

    Software problems don't generate errors. 

    B

    The user is more knowledgeable about software. 

    C

    The system logs will provide useful information alone. 

    D

    Key information pertaining to the software may be uncovered.


    正确答案: C
    解析: 暂无解析

  • 第9题:

    多选题
    You need to design the configuration on one Windows Server 2003 terminal server that hosts the SalesForceMax application to meet security requirements. Which three actions should you take?()
    A

    Configure the terminal server so that users log on by using local user accounts

    B

    Configure the terminal server so that users log on by using domain accounts

    C

    Configure the server to run SalesForceMax in a dedicated window when a user logs on to the terminal server

    D

    Configure the server to allow each user to have a Windows desktop when the user logs on to the terminal server

    E

    Use software restriction polices in Group Policy objects (GPOs) that apply to the terminal server

    F

    Use Appsec.exe to restrict applications on the terminal server


    正确答案: F,A
    解析: 暂无解析

  • 第10题:

    单选题
    You have multiple realms configured on a MAG Series device. A user is authenticating with a non- Junos Pulse Access Control Service client. The username does not contain a realm suffix.Which behavior will the user experience?()
    A

    The user will not be able to log-in, as the Junos Pulse Access Control Service device cannot map the user to a realm when the realm value is empty.

    B

    The user will be mapped to all realms available to the user.

    C

    The Junos Pulse Access Control Service device displays a page where the user must choose from a list of realms.

    D

    The endpoint is assigned to the first realm in the list whose authentication server is a match with the endpoints software.


    正确答案: D
    解析: 暂无解析

  • 第11题:

    单选题
    An administrator created a .env file in a user’s home directory to configure a number of custom environment variables for a local application. However, after the user logs out and then logs back into the system, the custom variables are not being set What is the most likely reason that the custom .env file is being ignored?()
    A

    A shell other than ksh is being used by the user.

    B

    The line ’export ENV=$HOME/.env’ is missing from /etc/profile.

    C

    The line ’export ENV=$HOME/.env’ is missing from the user’s .profile.

    D

    The env_profile attribute is not defined for the user within /etc/security/user.


    正确答案: C
    解析: 暂无解析

  • 第12题:

    单选题
    An administrator created a .env file in a user's home directory to configure a number of custom environment variables for a local application. However, after the user logs out and then logs back into the system, the custom variables are not being set. What is the most likely reason that the custom .env file is being ignored?()
    A

    A shell other than ksh is being used by the user.

    B

    The line 'export ENV=$HOME/.env' is missing from /etc/profile.

    C

    The line 'export ENV=$HOME/.env' is missing from the user's .profile.

    D

    The env_profile attribute is not defined for the user within /etc/security/user.


    正确答案: B
    解析: 暂无解析

  • 第13题:

    A user in the op_storage group logs onto the DS GUI and goes to the User Administration panel.  Which users can be seen and what actions can be performed()

    • A、the user can see all other users, including those in the Admin group, but can modify only the user accounts in theOp_volume and Monitor group
    • B、the user can see all the users except those in the Admin group, but can only modify the user’s own account
    • C、the user can see only the user’s own account, and cannot modify it
    • D、the user can see only the user’s own account, and can change the password only

    正确答案:D

  • 第14题:

    Two users share the same Windows 7 computer. The first user creates a document intended to be used by both users, and then logs off. The second user logs on and types the name of the document in the Start menu, but the document is not found. Which of the following is the problem?()

    • A、The document is set to hidden.
    • B、The document is locked.
    • C、The document was saved as a system document.
    • D、The document is owned by the first user.

    正确答案:D

  • 第15题:

    Which of the following options indicates why it is important to talk to the user and ask appropriate questions about a software problem? ()

    • A、Software problems don't generate errors. 
    • B、The user is more knowledgeable about software. 
    • C、The system logs will provide useful information alone. 
    • D、Key information pertaining to the software may be uncovered.

    正确答案:D

  • 第16题:

    You have multiple realms configured on a MAG Series device. A user is authenticating with a non- Junos Pulse Access Control Service client. The username does not contain a realm suffix.Which behavior will the user experience?()

    • A、The user will not be able to log-in, as the Junos Pulse Access Control Service device cannot map the user to a realm when the realm value is empty.
    • B、The user will be mapped to all realms available to the user.
    • C、The Junos Pulse Access Control Service device displays a page where the user must choose from a list of realms.
    • D、The endpoint is assigned to the first realm in the list whose authentication server is a match with the endpoints software.

    正确答案:D

  • 第17题:

    You need to design the configuration on one Windows Server 2003 terminal server that hosts the SalesForceMax application to meet security requirements. Which three actions should you take?()

    • A、Configure the terminal server so that users log on by using local user accounts
    • B、Configure the terminal server so that users log on by using domain accounts
    • C、Configure the server to run SalesForceMax in a dedicated window when a user logs on to the terminal server
    • D、Configure the server to allow each user to have a Windows desktop when the user logs on to the terminal server
    • E、Use software restriction polices in Group Policy objects (GPOs) that apply to the terminal server
    • F、Use Appsec.exe to restrict applications on the terminal server

    正确答案:B,C,E

  • 第18题:

    多选题
    A user logs in and is mapped to two roles. The first role has a maximum timeout value of 600 minutes and the default Juniper Networks logo on the user interface page. The second role has a maximum timeout value of 1200 minutes and a custom logo on the user interface page. Based on the merging of these two roles, which two will be applied?()
    A

    A custom logo on the user interface page

    B

    A maximum timeout value of 600 minutes

    C

    A maximum time out value of 1200 minutes

    D

    A default Juniper Networks logo on the user interface page


    正确答案: B,D
    解析: 暂无解析

  • 第19题:

    单选题
    You are administrator of your company’s network. Your company has offices in New York, Madrid, Paris and Tokyo. A user named Carmen works in the New York office, but she often travels to the Madrid office. Carmen uses the multi-language version of Windows 2000 Professional on her portable computer. She needs to be able to access both an English and Spanish user interface, input locale, and keyboard layout/IME. When Carmen is in the New York office, she logs on to the network by using the Carmen_eng user account. She is given the English user interface, input locale and keyboard layout/IME. When Carmen is in the Madrid office she logs on to the network by using the Carmen_span user account. She is then given the Spanish interface, input locale and keyboard layout/IME. Carmen reports that when she logs on to the network by using the Carmen_eng user account, she is not allowed to add any languages to her computer other than English, which is already installed. What should you do?( )
    A

    Add the Spanish keyboard layout/IME for the Carmen_eng user account profile

    B

    Add the English keyboard layout/IME for the Carmen_span user account profile

    C

    Reconfigure the Group Policy Object for the Carmen_eng user account to allow her to  change the languages on her computer

    D

    Configure the Group Policy Object for the Carmen_span user account to allow her to change  the languages on her computer.


    正确答案: B
    解析: 暂无解析

  • 第20题:

    单选题
    A user in the op_storage group logs onto the DS GUI and goes to the User Administration panel.  Which users can be seen and what actions can be performed()
    A

    the user can see all other users, including those in the Admin group, but can modify only the user accounts in theOp_volume and Monitor group

    B

    the user can see all the users except those in the Admin group, but can only modify the user’s own account

    C

    the user can see only the user’s own account, and cannot modify it

    D

    the user can see only the user’s own account, and can change the password only


    正确答案: D
    解析: 暂无解析

  • 第21题:

    单选题
    Two users share the same Windows 7 computer. The first user creates a document intended to be used by both users, and then logs off. The second user logs on and types the name of the document in the Start menu, but the document is not found. Which of the following is the problem?()
    A

    The document is set to hidden.

    B

    The document is locked.

    C

    The document was saved as a system document.

    D

    The document is owned by the first user.


    正确答案: D
    解析: 暂无解析

  • 第22题:

    单选题
    You are customizing the user interface options for the finance department in your organization. Users in the department are able to see a session counter on the Web interface of the Junos Pulse Access Control Service. The CFO is unable to see the session counter.Which explanation would cause this behavior?()
    A

    The CFO is mapped to the finance role, but the session counter was enabled prior to the role mapping.

    B

    The CFO is mapped to the finance role, but the session counter was enabled after the role mapping.

    C

    The CFO is mapped to the executive and finance roles, but the CFO was mapped to the executive role first, which does not have the session counter enabled.

    D

    The CFO is mapped to the executive and finance roles, but the CFO was mapped to the executive role last, which does not have the session counter enabled.


    正确答案: B
    解析: 暂无解析

  • 第23题:

    单选题
    You network contains a server named Server1. You have a computer named Computer1 that runs Windows XP Professional. Employees log on to Computer1 by using local user accounts. You need to configure the user profiles on Computer1 to be stored on Server1. What should you do?()
    A

    On Computer1, map a drive to an administrative share on Server1.  Configure each user's profile path to point to the mapped drive. 

    B

    Create a shared folder on Server1.  Assign Full Control permissions to all users. On Computer1, configure each user's profile path to a folder in the shared folder. 

    C

    Create a shared folder on Server1.  Assign Full Control permissions to all users. On Computer1, configure each user's home folder path to a folder in the shared folder. 

    D

    On Computer1, map a drive from each client computer to an administrative share on Server1.  Configure each user's home folder path to point to the mapped drive. 


    正确答案: B
    解析: 暂无解析