user name
password length
certificate
Host Checker
第1题:
A. All roles are evaluated together.
B. Each role is evaluated separately.
C. Clients must pass all policies to access the role.
D. Clients will pass as long as one policy is accepted.
第2题:
On the Junos Pulse Access Control Service, you have created a role called Secret that you only want to provide to users who present a certificate.Using the admin GUI, which two features would you configure to satisfy this requirement?()
第3题:
An administrator has created three different Odyssey Access Client preconfiguration files and assigned them to three different roles in the same realm.Which action should the administrator take to ensure that users get the correct Odyssey Access Client preconfiguration file?()
第4题:
Your security policy requires that users authenticating to the Junos Pulse Access Control Service are connecting from a domain member endpoint on the internal corporate network.Which set of role access restrictions must you configure to enforce this security policy?()
第5题:
You want to create a role to meet these requirements: 1:The role is to be protected from unauthorized usage. 2:The password of the role is not to be embedded in the application source code or stored in a table. Which method would you use to restrict enabling of such roles()
第6题:
Which two statements accurately describe a role?()
第7题:
Your network consists of an Active Directory forest that contains two sites named Site1 and Site2. From the Internet, users can only access servers in Site1. You have an Exchange Server 2007 organization. Each site contains servers that run the Client Access server role, the Mailbox server role, and the HubTransport server role. You plan to transition the organization to Exchange Server 2010. You need to recommend the server role that you must transition first to Exchange Server 2010. Your solution must provide the least amount of downtime for users in the organization. Which servers should you transition first?()
第8题:
Create the role with external authentication.
Create the role as a secure application role.
Create the role as a password-protected role.
Create a role and use Fine-Grained Access Control (FGAC) to secure the role
第9题:
user name
password length
certificate
Host Checker
第10题:
Create a Settings Update file in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under User Roles > Agent > Odyssey Settings > Preconfigured Installer.
Configure a wired adapter and assign the required SSID under User Roles > Agent > Odyssey Settings.
Create a script in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under User Roles > Agent > Odyssey Settings > Preconfigured Installer.
Create a Preconfiguration file in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under User Roles > Agent > Odyssey Settings > Preconfigured Installer.
第11题:
Select Require and Enforce for the Host Checker Policy in the realm authentication policy.
Select Evaluate Policies for the Host Checker policy in the realm authentication policy.
Configure the Host Checker policy as a role restriction for the Employee role.
Configure the Host Checker policy as a resource access policy for the Employee role.
第12题:
A user calls the help desk and explains that they just purchased a Macintosh computer. When they log into the network, the Odyssey Access Client is not automatically downloaded as it was when the user used their Windows PC.How do you resolve this issue?()
第13题:
A system administrator wants to configure 802.1X on an Ethernet switch to enable access to specific parts of the network based on group memberships.How can the administrator accomplish this goal?()
第14题:
You want to enforce a Host Checker policy so that only users who pass the policy receive the Employee role. In the admin GUI, which two parameters must you configure?()
第15题:
You want to restrict access to a role based on the client machine from which the user is accessing the network.Which two role restrictions accomplish this goal? ()
第16题:
You want to create a role to meet these requirements: 1. The role is to be protected from unauthorized usage. 2. The password of the role is not to be embedded in the application source code or stored in a table. method would you use to restrict enabling of such roles()
第17题:
You are employed as the enterprise exchange administrator at TestKing.com. The TestKing.com networkconsits of a single Active Directory site. TestKing.com makes use of Microsoft Exchange Servermessaging solution. You are in the process of planning the deployment of Exchange Server 2010. The CIO provides you withthe set criteria needed to deploy the Exchange Server 2010 servers. TestKing.com wants you to ensurethat: * The Mailbox servers belong to the database availability group (DAG). * The users are able to send and receive e-mail in the event of a single server failure. * The minimization of the amount of servers deployed. * The load balancing of MAPI connections form Outlook Clients using hardware load balancer.You need to plan the deployment to the Exchange Server 2010 servers to meet the above criteria. What should you do?()
第18题:
Your network consists of a single Active Directory site. You plan to deploy Exchange Server 2010. You need to plan the deployment of Exchange Server 2010 servers to meet the following requirements:.All Mailbox servers must belong to a database availability group (DAG) .MAPI connections from Outlook clients must be load balanced by using a hardware load balancer .If a single server fails, users must continue to send and receive e-mail .The plan must minimize the number of servers deployed What should you include in the plan?()
第19题:
Create a database role named BankTerminals.
Grant the BankTerminals role the Execute permission for the WoodgroveBanking database.
Grant database access to the Windows Bank Terminals group, and add the group to the BankTerminals role.
Grant the BankTerminals role the Execute permission for the Bank schema.
Grant the Windows Bank Terminals group the Execute permission for the Bank schema.
Grant the BankTerminals role the Execute permission for all stored procedures and user-defined functions in the Bank schema.
第20题:
Finding user entries
Authentication required
LDAP Server Type
Determining group membership
第21题:
A role can be given to a maximum of 1000 users.
A user can have access to a maximum of 10 roles.
A role can have a maximum of 100 privileges contained in it.
Privileges are given to a role by using the CREATE ROLE statement.
A role is a named group of related privileges that can be granted to the user.
A user can have access to several roles, and several users can be assigned the same role.
第22题:
All roles are evaluated together.
Each role is evaluated separately.
Clients must pass all policies to access the role.
Clients will pass as long as one policy is accepted.