Ignore
Replace users role
Terminate user session
Disable user account
第1题:
Your corporate security policy requires that a user performing attacks must have limited network access and activities until an administrator can investigate.In the admin GUI, which sensor event policy action must you configure in "Configuration" >"Sensors" >"Sensor Event Policies" >[rule name] to accomplish this?()
A. Ignore
B. Replace users role
C. Terminate user session
D. Disable user account
第2题:
You want to enforce a Host Checker policy so that only users who pass the policy receive the Employee role. In the admin GUI, which two parameters must you configure?()
第3题:
Your security policy requires that users authenticating to the Junos Pulse Access Control Service are connecting from a domain member endpoint on the internal corporate network.Which set of role access restrictions must you configure to enforce this security policy?()
第4题:
You navigate to "UAC" > "Infranet Enforcer" > "Auth Table Mapping" in the admin GUI. You see one policy, which is the unmodified, original default policy.Which statement is true?()
第5题:
Your company uses Network Access Protection (NAP) to enforce policies on client computers that connect to the network. Client computers run Windows 7. A Group Policy is used to configure client computers to obtain updates from Windows Server Update Services (WSUS).Company policy requires that updates labeled Important and Critical must be applied before client computers can access network resources.You need to ensure that client computers meet the company policy requirement. What should you do?()
第6题:
our company uses network access protection (NAP) to enforce policies on client computers that connect to the network. Client computes run windows vista. A group policy is used to configure client computers to obtain updates from WSUS. Company policy requires that updates labeled important and critical must be applied before client computers can access network resources. You need to ensure that client computers meet the company policy requirement. What should you do?()
第7题:
Add Session-Timeout attribute with value equal to the session lifetime
Add Termination-Action attribute with value equal 1
VLAN
Open port
第8题:
Source IP and browser
Source IP and certificate
Certificate and Host Checker
Host Checker and source IP
第9题:
Ignore
Replace users role
Terminate user session
Disable user account
第10题:
Implement Network Access Protection (NAP).
Implement Active Directory Rights Management Services (AD RMS).
Create a new Password Settings Object (PSO) for administrator accounts.
Create a new child domain in the forest. Move all non-administrator accounts to the new domain.Configure a complex password policy in the root domain.
第11题:
Select Require and Enforce for the Host Checker Policy in the realm authentication policy.
Select Evaluate Policies for the Host Checker policy in the realm authentication policy.
Configure the Host Checker policy as a role restriction for the Employee role.
Configure the Host Checker policy as a resource access policy for the Employee role.
第12题:
Enable automatic updates on each client.
Enable the Security Center on each client.
Quarantine clients that do not have all available security updates installed.
Disconnect the connection until the required updates are installed.
第13题:
You are an administrator of a large campus network. Every switch on a floor within each building of your campus has been configured for a different VLAN. During implementation of the Junos Pulse Access Control Service, you must configure a RADIUS return attribute policy to apply a role representing a group of authenticated users that frequently transport their laptops from building to building and floor to floor. In the admin GUI, which policy element would you enable to accommodate these users?()
第14题:
Your corporate security policy requires that a user performing attacks must have limited network access and activities until an administrator can investigate.In the admin GUI, which sensor event policy action must you configure in "Configuration" > "Sensors" > "Sensor Event Policies" > [rule name] to accomplish this?()
第15题:
You have a firewall enforcer protecting resources in a data center. A user is experiencing difficulty connecting to a protected resource.Which two elements must exist so the user can access the resource?()
第16题:
Your company uses Network Access Protection (NAP) to enforce policies on client computers taht connect to the network. Client computers run Windows Vista. A Group Policy is used to configure client computers to obtain updates from WSUS. Company policy requires that updates labeled important and Critical must be applied before client computers can access network resources. You need to ensure that client computers meet the company policy requirement. What should you do()
第17题:
You are a network administrator of an organization. Maria and John are your network assistant. You have grant then the rights to modify the user properties in the computer management. You want to audit the modification in user accounts. What should you do?()
第18题:
Configure a directory service access audit policy. Increase the maximum size of the security log.
Configure a directory service access audit policy. Set the system log to overwrite events older than 7 days.
Configure an object access audit policy for the directory. Increase the maximum size of the system log.
Configure an object access audit policy for the directory. Set the security log to overwrite events older than 7 days.
第19题:
Run the Set-ADAccountControl cmdlet.
Run the Set-ADServiceAccount cmdlet.
Create a new password policy.
Create a new Password Settings object (PSO).
第20题:
Dynamic auth table mapping is not enabled.
A successful authentication attempt will result in a new authentication table entry, which will be delivered only to the Junos enforcer protecting the network from which the user has authenticated.
To create a static auth table mapping, you must delete the default policy.
The default policy applies only to the factory-default role User.
第21题:
In Event Viewer, filter the Security log.
In Event Viewer, configure the properties of the Security log.
In the Local Security Policy console, modify the Security Options.
In the Registry Editor, add a Security Descriptor Definition Language (SDDL) value.
第22题:
Turn on auditing for objects in the Local Security Policy and Select 'Process Tracking'.
Turn on auditing for objects in the Local Security Policy and Select 'Object Access'.
Use Windows Explorer to turn on auditing for the specific files.
Have the administrator for domains log you on as an administrator and enable auditing for a specific file.
Turn on auditing for objects in the Local Security Policy and Select 'Account Management'.
Allow only one account at a time to log on to your shared folder. Check the event viewer to see who logged on.
第23题:
Enable automatic updates on each client.
Enable the security center on each client.
Quarantine clients that do not have all available security updates installed.
Disconnect the remote connection until the required updates are installed.
第24题:
Enable automatic updates on each client.
Enable the security center on each client.
Quarantine clients that do not have all available security updates installed.
Disconnect the remote connection until the required updates are installed.