To allow clientless access to the network
To restrict access to protected resources on the network
To scan an endpointfor compliance with security policies
To push a firewall policy to the endpoint's local firewall application
第1题:
You have a firewall enforcer protecting resources in a data center. A user is experiencing difficulty connecting to a protected resource.Which two elements must exist so the user can access the resource?()
A. Resource access policy on the MAG Series device
B. IPsec routing policy on the MAG Series device
C. General traffic policy blocking access through the firewall enforcer
D. Auth table entry on the firewall enforcer
第2题:
A.Allow unrestricted access to the console or VTY ports
B.Use a firewall to restrict access from the outside to the network devices
C.Always use Telnet to access the device command line because its data is automatically encrypted
D.Use SSH or another encrypted and authenticated transport to access device configurations
E.Prevent the loss of passwords by disabling password encryption
第3题:
What would you use to enforce security-policy compliance on all devices that seek to access the network?()
第4题:
“本地网”的英文写法是“()”。
第5题:
Your security policy requires that users authenticating to the Junos Pulse Access Control Service are connecting from a domain member endpoint on the internal corporate network.Which set of role access restrictions must you configure to enforce this security policy?()
第6题:
You have a firewall enforcer protecting resources in a data center. A user is experiencing difficulty connecting to a protected resource.Which two elements must exist so the user can access the resource?()
第7题:
What is the function of Host Checker?()
第8题:
You have a firewall enforcer protecting sensitive internal resources in a data center. The network traversed by endpoint traffic is semi-trusted, so you need to encrypt the traffic between the endpoints accessing the resources and the firewall enforcer.Which type of policies provide this level of protection?()
第9题:
Your environment includes multiple Windows Server 2008 R2 Hyper-V servers. You are designing an administrative strategy for virtual machines (VMs). You need to ensure that members of the Security Compliance Active Directory Domain Services (AD DS) security group can monitor failed logon events on the VMs. What should you do?()
第10题:
It assigns users a set of roles.
It allows access based on auth table entries.
It verifies whether an endpoint meets security requirements.
It configures the UAC agent to allow or deny access to resources.
第11题:
It can be used to allow the access privilege settings for users but not roles.
It can be used to allow the access privilege settings for users as well as roles.
It can be used to control the time interval for which the access privilege is available to a user.
It can be used to selectively restrict the access for each user in a database to different host computers.
It can be used to selectively restrict a user's access to different applications in a specific host computer.
第12题:
VLAN
NAC
EAP
WLAN
第13题:
A. It assigns users a set of roles.
B. It allows access based on auth table entries.
C. It verifies whether an endpoint meets security requirements.
D. It configures the UAC agent to allow or deny access to resources.
第14题:
What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。
第15题:
What is true about the operation of the Infranet Enforcer? ()
第16题:
You want to enforce a Host Checker policy so that only users who pass the policy receive the Employee role. In the admin GUI, which two parameters must you configure?()
第17题:
You are receiving reports of possible unauthorized access to resources protected by a firewall enforcer running the Junos OS. You want to verity which users are currently accessing resources through the enforcer.Which command should you use to verify user access on the enforcer?()
第18题:
What are three elements the Junos Pulse Access Control Service uses to establish endpoint access to protected resources?()
第19题:
You administer a network containing SRX Series firewalls. New policy requires that you implement MAG Series devices to provide access control for end users. The policy requires that the SRX Series devices dynamically enforce security policy based on the source IP address of the user. The policy also requires that the users communicate with protected resources using encrypted traffic. Which two statements are true?()
第20题:
Which statements describe the capabilities of the DBMS_NETWORK_ACL_ADMIN package?()
第21题:
sign-in policy
authentication realms
role restrictions
policy realms
routing policy
第22题:
To allow clientless access to the network
To restrict access to protected resources on the network
To scan an endpointfor compliance with security policies
To push a firewall policy to the endpoint's local firewall application
第23题:
Source IP and browser
Source IP and certificate
Certificate and Host Checker
Host Checker and source IP
第24题:
Add the Security Compliance group to the local administrators group of each VM
Add the Security Compliance group to the local administrators group of each Hyper-V server
In the InitialStore.xml file of each VM, define an access policy for the Security Compliance group
in the InitialStore.xml file of each Hyper-V server, define an access policy for the Security Compliance group