Select Require and Enforce for the Host Checker Policy in the realm authentication policy.
Select Evaluate Policies for the Host Checker policy in the realm authentication policy.
Configure the Host Checker policy as a role restriction for the Employee role.
Configure the Host Checker policy as a resource access policy for the Employee role.
第1题:
You want to create a Host Checker policy that looks for a specific antivirus product that is running on your client machines, but the predefined antivirus options do not include the antivirus product version that you use.Which feature should you verify the antivirus product is up to date?()
A. Enhanced Endpoint Security
B. DP signatures
C. Antivirus licensing
D. Endpoint Security Assessment Plug-in
第2题:
Your company runs Remote Desktop Services. You have a Remote Desktop Session Host (RD Session Host) server. You need to ensure that remote desktop users can print only to the printers that are installed on the RD Session Host server. What should you do?()
第3题:
You want to restrict access to a role based on the client machine from which the user is accessing the network.Which two role restrictions accomplish this goal? ()
第4题:
You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A new Company.com policy prohibits the users from changing their password by using Outlook Web App (OWA). What should you do?()
第5题:
You are the administrator of an Active Directory domain. All servers run Windows Server 2003. All client computers run Windows XP Professional. A server named Filesrv1 contains confidential data that is only available to users in the human resources (HR) department. You want all computers in the HR department to connect to Filesrv1 by using an IPSec policy. You assign the Server (Request Security) IPSec policy to Filesrv1. Using Network Monitor, you notice that some computers in the HR department connect to Filesrv1 without using the IPSec policy. You need to configure Filesrv1 to ensure that all computers connect to it by using the IPSec policy. What should you do?()
第6题:
If Evaluate is checked then the client must pass policy to get the sign-in page.
If Evaluate is checked then the client can fail policy and still get the sign-in page.
If Require and Enforce is checked then the client must pass policy to get the sign-in page.
If Require and Enforce is checked then the client can fail policy and still get the sign-in page.
第7题:
Enable the Do not allow client printer redirection Group Policy setting.
Disable the Do not allow client printer redirection Group Policy setting.
Enable the Do not set default client printer to be default printer in a session Group Policy setting.
Disable the Do not set default client printer to be default printer in a session Group Policy setting.
第8题:
Isolate a file name unique to the custom image and create a custom rule-type of File which matches on the file. Select the Required option under the custom rule.
Identify the MAC address unique to network cards installed in PCs with the custom image and create a custom rule-type of MAC Address which matches on the appropriate MAC address.
Select the Required option under the custom rule Identify the IP address unique to the network cards installed in PCs with the custom image and create a custom rule-type of IP Address which matches on the appropriate IP address. Select the Required option under the custom rule.
Isolate or create a unique Windows registry key for the custom image and create a custom rule- type of Registry Setting which matches on the name of the registry key.
第9题:
Junos Pulse should be configured with location awareness rules configured.
Odyssey Access Client should be installed with Host Checker configured to check the client's location.
Junos Pulse should be configured with all components installed.
Agentless access should be enabled so that clients can connect to any service without concern for installing an agent.
第10题:
Enhanced Endpoint Security
DP signatures
Antivirus licensing
Endpoint Security Assessment Plug-in
第11题:
DBMS_RLS.STATIC
DBMS_RLS.DYNAMIC
DBMS_RLS.SHARED_STATIC
DBMS_RLS.CONTEXT_SENSITIVE
DBMS_RLS.SHARED_CONTEXT_SENSITIVE
第12题:
Create an organizational unit (OU) for all users who log on to any of the NewApp servers.
Create an organizational unit (OU) named NewApp Users for the NewApp users.
Create an organizational unit (OU) named NewApp Servers for the NewApp servers.
Create a Group Policy object (GPO) for the NewApp Users OU to enforce the use of IPSec.
Create a global group for all NewApp servers. Add this group to the NewApp Servers OU.
Create a Group Policy object (GPO) for the NewApp Servers OU to enforce the use of smart cards.
第13题:
A. If Evaluate is checked then the client must pass policy to get the sign-in page.
B. If Evaluate is checked then the client can fail policy and still get the sign-in page.
C. If Require and Enforce is checked then the client must pass policy to get the sign-in page.
D. If Require and Enforce is checked then the client can fail policy and still get the sign-in page.
第14题:
Your security policy requires that users authenticating to the Junos Pulse Access Control Service are connecting from a domain member endpoint on the internal corporate network.Which set of role access restrictions must you configure to enforce this security policy?()
第15题:
You enabled an audit policy by issuing the following statements: SQL> AUDIT POLICY ORA_DATABASE_PARAMETER BY SCOTT; SQL> AUDIT POLICY ORA_DATABASE_PARAMETER BY SYS, SYSTEM; For which database users and for which executions is the audit policy now active? ()
第16题:
You are the network administrator for TestKing.com. The network consists of a single Active Directory domain named testking.com. All network servers run Windows Server 2003, and all client computers run Windows XP Professional. A new management directive states that users can log to the domain only during business hours. Users who remain logged on after business hours must be automatically disconnected from network resources. You need to enforce this directive by using the minimum amount of administrative effort. Which two actions should you perform?() (Each correct answer presents part of the solution. Choose two)
第17题:
Implement a RADIUS request attribute policy to assist with realm selection and create different role-mapping rules for the user in each realm.
Implement a directory/attribute server on the realm and set up this server to determine by group membership the proper role to which a user should be mapped.
Reorder the role-mapping rules to allow for the more open role to be mapped first and then enable the stop processing rules when this rule matches function on this role.
Implement a Host Checker policy on the realm that determines the geographic location of the device and restricts the user based on the results of the policy.
第18题:
Enable Custom Instructions
Pre-auth notification
Remediation message
Send reason strings
第19题:
Select Require and Enforce for the Host Checker Policy in the realm authentication policy.
Select Evaluate Policies for the Host Checker policy in the realm authentication policy.
Configure the Host Checker policy as a role restriction for the Employee role.
Configure the Host Checker policy as a resource access policy for the Employee role.
第20题:
Delegate the password management controls to the help desk staff.
Delegate the password management controls to the Domain Users group.
Configure the Default Domain Policy to enforce password expiration settings.
Configure the Default Domain Controller Policy to enforce password expiration settings.
第21题:
Source IP and browser
Source IP and certificate
Certificate and Host Checker
Host Checker and source IP
第22题:
Configure a password policy that requires strong passwords
Configure a password policy that requires all users to change their passwords once a month.
Allow users in the branch offices to log on between the hours of 8:00 AM and 5:00 PM, Monday through Friday.
Allow users in the retail outlets to log on between the hours of 6:00 AM and 11:00 PM, daily.
Enable a policy that forces users to log off when their logon hours expire.
第23题:
Use the RemoteApp Wizard to add to the RemoteApp Programs list setting.
Assign domain users and domain security groups to each RemoteApp application.
Use the RemoteApp Wizard to configure the RemoteApp program is a vailable through RD Web Access setting.
Specify custom menu locations on the RD Session Host server for each domain security group by using a Group Policy object (GPO).
第24题:
Configure File signature verification to block driver installation, and set driver signing as a system default.
Remove all users from the Power User group.
Create a Local Computer Policy to prevent users from installing drivers.
Create a Local Computer Policy to enable Windows File Protection.