多选题You administer a network with Windows-based endpoints that have custom software images. You want to use Host Checker to require that endpoints are running the custom software image.Which two Host Checker policy rules would be used to enforce this requi

题目
多选题
You administer a network with Windows-based endpoints that have custom software images. You want to use Host Checker to require that endpoints are running the custom software image.Which two Host Checker policy rules would be used to enforce this requirement?()
A

Isolate a file name unique to the custom image and create a custom rule-type of File which matches on the file. Select the Required option under the custom rule.

B

Identify the MAC address unique to network cards installed in PCs with the custom image and create a custom rule-type of MAC Address which matches on the appropriate MAC address.

C

Select the Required option under the custom rule Identify the IP address unique to the network cards installed in PCs with the custom image and create a custom rule-type of IP Address which matches on the appropriate IP address. Select the Required option under the custom rule.

D

Isolate or create a unique Windows registry key for the custom image and create a custom rule- type of Registry Setting which matches on the name of the registry key.


相似考题
更多“多选题You administer a network with Windows-based endpoints that have custom software images. You want to use Host Checker to require that endpoints are running the custom software image.Which two Host Checker policy rules would be used to enforce this requi”相关问题
  • 第1题:

    What happens when Host Checker is configured to perform checks every "0" minutes? ()

    A. Host Checker is disabled.

    B. Host Checker will perform continous checks.

    C. Host Checker will perform checks when user logs out.

    D. Host Checker will perform checks when user first logs in.


    参考答案:D

  • 第2题:

    You want to create a Host Checker policy that looks for a specific antivirus product that is running on your client machines, but the predefined antivirus options do not include the antivirus product version that you use.Which feature should you verify the antivirus product is up to date?()

    • A、Enhanced Endpoint Security
    • B、DP signatures
    • C、Antivirus licensing
    • D、Endpoint Security Assessment Plug-in

    正确答案:D

  • 第3题:

    Your security policy requires that users authenticating to the Junos Pulse Access Control Service are connecting from a domain member endpoint on the internal corporate network.Which set of role access restrictions must you configure to enforce this security policy?()

    • A、Source IP and browser
    • B、Source IP and certificate
    • C、Certificate and Host Checker
    • D、Host Checker and source IP

    正确答案:D

  • 第4题:

    What are two valid configurations for user-driven remediation when a Windows-based endpoint fails a Host Checker policy?()

    • A、Kill a running process on the endpoint, based on executable name and MD5 checksum.
    • B、Delete a file on the endpoint's file system.
    • C、Download and run a remediation executable from the local software distribution server.
    • D、Alter registry entries to prevent future execution of an executable, based on executable name and full path.

    正确答案:A,B

  • 第5题:

    You administer a network with Windows-based endpoints that have custom software images. You want to use Host Checker to require that endpoints are running the custom software image.Which two Host Checker policy rules would be used to enforce this requirement?()

    • A、Isolate a file name unique to the custom image and create a custom rule-type of "File" which matches on the file. Select the "Required" option under the custom rule.
    • B、Identify the MAC address unique to network cards installed in PCs with the custom image and create a custom rule-type of "MAC Address" which matches on the appropriate MAC address.
    • C、Select the "Required" option under the custom rule Identify the IP address unique to the network cards installed in PCs with the custom image and create a custom rule-type of "IP Address" which matches on the appropriate IP address. Select the "Required" option under the custom rule.
    • D、Isolate or create a unique Windows registry key for the custom image and create a custom rule- type of "Registry Setting" which matches on the name of the registry key.

    正确答案:A,D

  • 第6题:

    You administer a network containing SRX Series firewalls. New policy requires that you implement MAG Series devices to provide access control for end users. The policy requires that the SRX Series devices dynamically enforce security policy based on the source IP address of the user. The policy also requires that the users communicate with protected resources using encrypted traffic. Which two statements are true?()

    • A、The endpoints can use agentless access.
    • B、Encrypted traffic flows between the endpoint and the enforcer.
    • C、Encrypted traffic flows between the endpoint and the protected resource
    • D、The endpoints can use the Odyssey Access Client.

    正确答案:B,D

  • 第7题:

    You are the administrator of a Windows 2000 domain. You develop a graphics software application for users in the Graphics organizational unit (OU). You want to create a custom installation for three users named Carlos, Carmen, and Maria, who are members of the Graphics OU. You want these three users to be able to access additional text, filters, and other graphics options for the software. What should you do? ()

    • A、 Create the Graphic Users OU in the domain. Add a custom .msi file to the Graphics OU
    • B、 Create the Graphic Users OU in the domain. Add a custom .mst file to the Graphics OU
    • C、 Create the Advanced Software OU within the Graphics OU, and add Carlos, Carmen, and  Maria.Create an .msi file, including changes, and apply the modifications to the Advanced Software OU
    • D、 Create the Advanced Software OU within the Graphics OU, and add Carlos. Carmen, and Maria. Create an: mst file, including changes, and apply the modifications to the Advanced Software OU

    正确答案:D

  • 第8题:

    多选题
    You are designing a Windows Azure application that will communicate with existing on-premise applications and services.  The application will be activated for Windows Azure Connect.  You need to recommend a solution for completing the Windows Azure Connect configuration.  Which two actions should you recommend?()
    A

    Place local endpoints in groups and then configure a connection between the groups and the application.

    B

    Place hosted endpoints in groups and then configure a connection between the groups and the application.

    C

    Install endpoint software on local computers or virtual machines.

    D

    Install endpoint software on hosted virtual machines.


    正确答案: D,B
    解析: 暂无解析

  • 第9题:

    多选题
    You administer a network with Windows-based endpoints that have custom software images. You want to use Host Checker to require that endpoints are running the custom software image.Which two Host Checker policy rules would be used to enforce this requirement?()
    A

    Isolate a file name unique to the custom image and create a custom rule-type of File which matches on the file. Select the Required option under the custom rule.

    B

    Identify the MAC address unique to network cards installed in PCs with the custom image and create a custom rule-type of MAC Address which matches on the appropriate MAC address.

    C

    Select the Required option under the custom rule Identify the IP address unique to the network cards installed in PCs with the custom image and create a custom rule-type of IP Address which matches on the appropriate IP address. Select the Required option under the custom rule.

    D

    Isolate or create a unique Windows registry key for the custom image and create a custom rule- type of Registry Setting which matches on the name of the registry key.


    正确答案: C,D
    解析: 暂无解析

  • 第10题:

    多选题
    What are two valid configurations for user-driven remediation when a Windows-based endpoint fails a Host Checker policy?()
    A

    Kill a running process on the endpoint, based on executable name and MD5 checksum.

    B

    Delete a file on the endpoint's file system.

    C

    Download and run a remediation executable from the local software distribution server.

    D

    Alter registry entries to prevent future execution of an executable, based on executable name and full path.


    正确答案: A,D
    解析: 暂无解析

  • 第11题:

    多选题
    You want to enforce a Host Checker policy so that only users who pass the policy receive the Employee role. In the admin GUI, which two parameters must you configure?()
    A

    Select Require and Enforce for the Host Checker Policy in the realm authentication policy.

    B

    Select Evaluate Policies for the Host Checker policy in the realm authentication policy.

    C

    Configure the Host Checker policy as a role restriction for the Employee role.

    D

    Configure the Host Checker policy as a resource access policy for the Employee role.


    正确答案: B,C
    解析: 暂无解析

  • 第12题:

    多选题
    Which two statements are true about applying Host Checker at the realm level?()
    A

    If Evaluate is checked then the client must pass policy to get the sign-in page.

    B

    If Evaluate is checked then the client can fail policy and still get the sign-in page.

    C

    If Require and Enforce is checked then the client must pass policy to get the sign-in page.

    D

    If Require and Enforce is checked then the client can fail policy and still get the sign-in page.


    正确答案: D,A
    解析: 暂无解析

  • 第13题:

    You are a network administrator for The network consists of a single Active Directory domain named.

    The domain contains two Windows Server 2003 terminal servers that host applications that are used by company employees. An organization unit (OU) named TerminalServers contains only the computer accounts for these two Terminal servers. A Group Policy object (GPO) named TSPolicy is linked to the TerminalServers OU, and you have been granted the right to modify the GPO.

    Users should use the terminal servers to run only authorized applications. A custom financial application suite is currently the only allowed application. The financial application suite is installed in the folder C:\Program Files\MT Apps. The financial application suite contains many executable files.

    Users must also be able to use Internet Explorer to access a browser-based application on the company intranet. The browser-based application makes extensive use of unsigned ActiveX components.

    The financial application suite and the browser-based application are frequently updates with patches or new versions.

    You need to configure the terminal servers to prevent users from running unauthorized applications. You plan to configure software restriction policies in the TSPolicy GPO. To reduce administrative overhead, you want to create a solution that can be implemented once, without requiring constant reconfiguration.

    Which three actions should you perform to configure software restriction polices?()

    (Each correct answer presents part of the solution. Choose three)


    参考答案:A, E, F

  • 第14题:

    You want to enforce a Host Checker policy so that only users who pass the policy receive the Employee role. In the admin GUI, which two parameters must you configure?()

    • A、Select "Require and Enforce" for the Host Checker Policy in the realm authentication policy.
    • B、Select "Evaluate Policies" for the Host Checker policy in the realm authentication policy.
    • C、Configure the Host Checker policy as a role restriction for the Employee role.
    • D、Configure the Host Checker policy as a resource access policy for the Employee role.

    正确答案:B,C

  • 第15题:

    Which two statements are true about applying Host Checker at the realm level?()

    • A、If Evaluate is checked then the client must pass policy to get the sign-in page.
    • B、If Evaluate is checked then the client can fail policy and still get the sign-in page.
    • C、If Require and Enforce is checked then the client must pass policy to get the sign-in page.
    • D、If Require and Enforce is checked then the client can fail policy and still get the sign-in page.

    正确答案:B,C

  • 第16题:

    You have created a Host Checker policy that contains multiple rules. You want to inform end users which rule specifically has failed.In the admin GUI, which configuration setting would you enable?()

    • A、Enable Custom Instructions
    • B、Pre-auth notification
    • C、Remediation message
    • D、Send reason strings

    正确答案:D

  • 第17题:

    You want to restrict access to a role based on the client machine from which the user is accessing the network.Which two role restrictions accomplish this goal? ()

    • A、user name
    • B、password length
    • C、certificate
    • D、Host Checker

    正确答案:C,D

  • 第18题:

    You work as a database administrator for Supportcenter.cn. You want to administer your database servers, which are running on different host machines, using the Web-enabled grid control interface. You have configured the agent on the host machines. You have started the Oracle Database 10g Grid Control utility on your machine. Which two additional components would you configure to achieve this objective?()

    • A、Application Server Control
    • B、Oracle Management Service
    • C、Oracle Enterprise Manager Repository
    • D、Oracle Enterprise Manager Database Control

    正确答案:C,D

  • 第19题:

    多选题
    To ensure device security, Cisco Network Admission Control works with antivirus software onwhich two endpoints? ()
    A

    port

    B

    server

    C

    laptop

    D

    wireless client


    正确答案: A,C
    解析: 暂无解析

  • 第20题:

    单选题
    You are the administrator of a Windows 2000 domain. You develop a graphics software application for users in the Graphics organizational unit (OU). You want to create a custom installation for three users named Carlos, Carmen, and Maria, who are members of the Graphics OU. You want these three users to be able to access additional text, filters, and other graphics options for the software. What should you do? ()
    A

     Create the Graphic Users OU in the domain. Add a custom .msi file to the Graphics OU

    B

     Create the Graphic Users OU in the domain. Add a custom .mst file to the Graphics OU

    C

     Create the Advanced Software OU within the Graphics OU, and add Carlos, Carmen, and  Maria.Create an .msi file, including changes, and apply the modifications to the Advanced Software OU

    D

     Create the Advanced Software OU within the Graphics OU, and add Carlos. Carmen, and Maria. Create an: mst file, including changes, and apply the modifications to the Advanced Software OU


    正确答案: D
    解析: 暂无解析

  • 第21题:

    单选题
    Your security policy requires that users authenticating to the Junos Pulse Access Control Service are connecting from a domain member endpoint on the internal corporate network.Which set of role access restrictions must you configure to enforce this security policy?()
    A

    Source IP and browser

    B

    Source IP and certificate

    C

    Certificate and Host Checker

    D

    Host Checker and source IP


    正确答案: B
    解析: 暂无解析

  • 第22题:

    多选题
    You administer a network containing SRX Series firewalls. New policy requires that you implement MAG Series devices to provide access control for end users. The policy requires that the SRX Series devices dynamically enforce security policy based on the source IP address of the user. The policy also requires that the users communicate with protected resources using encrypted traffic. Which two statements are true?()
    A

    The endpoints can use agentless access.

    B

    Encrypted traffic flows between the endpoint and the enforcer.

    C

    Encrypted traffic flows between the endpoint and the protected resource

    D

    The endpoints can use the Odyssey Access Client.


    正确答案: B,D
    解析: 暂无解析

  • 第23题:

    多选题
    You work as a database administrator for Certkiller .com. You want to administer your database servers,which are running on different host machines,using the Web-enabled grid control interface. You have configured the agent on the host machines. You have started the Oracle Database 10g Grid Control utility on your machine. Which two additional components would you configure to achieve this objective?()
    A

    Application Server Control

    B

    Oracle Management Service

    C

    Oracle Enterprise Manager Repository

    D

    Oracle Enterprise Manager Database Control


    正确答案: C,D
    解析: 暂无解析

  • 第24题:

    单选题
    You are the desktop administrator for your company's sales department. The IT manager for the sales department needs to distribute a custom application to the Windows XP Professional computers in the sales department. He deploys the software by using Group Policy. Susan is a user in the sales department. She reports that the custom application is not available. You examine her computer, and you verify that the application is not present on her computer. You want to ensure that the software is deployed the next time Susan logs on. Which command should you run?()
    A

    Secedit /refreshpolicy user_policy /enforce

    B

    Secedit /refreshpolicy machine_policy /enforce

    C

    Gpupdate /target:computer /sync

    D

    Gpupdate /target:user /sync


    正确答案: D
    解析: 暂无解析