多选题You want to customize access to the corporate network so that agentiess users are instructed to obtain a certificatebefore accessing the network.Which two configurations solve this problem? ()ACreate a custom sign-in page with specific instructions in

题目
多选题
You want to customize access to the corporate network so that agentiess users are instructed to obtain a certificatebefore accessing the network.Which two configurations solve this problem? ()
A

Create a custom sign-in page with specific instructions in the Instructions field.

B

Create a custom sign-in page with specific Missing Certificate messages in the Custom error messages field.

C

Create a custom sign-in policy with specific instructions in the Instructions field.

D

Create a custom sign-in notification and assign it to the Pre-Auth Sign-in Notification in the sign-in policy.


相似考题
更多“多选题You want to customize access to the corporate network so that agentiess users are instructed to obtain a certificatebefore accessing the network.Which two configurations solve this problem? ()ACreate a custom sign-in page with specific instructions in ”相关问题
  • 第1题:

    You must configure access to the corporate network for employees using a client access method. Users require IPsec tunneling to protected resources and an 802.1X supplicant. Users will access the network using Windows platforms.Which two client access methods would support these requirements?()

    A. Junos Pulse

    B. Java Agent

    C. Odyssey Access Client

    D. Native 802.1X supplicant


    参考答案:A, C

  • 第2题:

    You want to restrict access to a role based on the client machine from which the user is accessing the network.Which two role restrictions accomplish this goal? ()

    A. user name

    B. password length

    C. certificate

    D. Host Checker


    参考答案:C, D

  • 第3题:

    What is the primary purpose of creating a Location Group Policy? ()

    A. to associate more than one realm with an authentication server

    B. to logically group network access devices and associate them with specific sign-in policies

    C. to allow or prevent users from accessing resources in specific locations on the network

    D. to define the URL that users of network access devices can use to access the Infranet Controller


    参考答案:B

  • 第4题:

    You use a Windows 2000 Professional desktop computer. The corporate product information is stored on this computer. You want other users on the network to be able to read the product information on your computer. You use Windows Explorer to share the product information folder on the network. You want Sales staff to be able to keep a copy of the product information on their portable computers when they travel. Other users should not be able to synchronize the product information.  What should you do?()

    • A、Use Synchronization manager to configure synchronization to occur when users are connected to the LAN connection.
    • B、Use Windows Explorer to grant Sales Staff Special access for the reports on the network share.
    • C、Use Windows Explorer to enable automatic caching for documents on the network share.
    • D、Create a new share for the Sales users only and enable caching on that share only.

    正确答案:D

  • 第5题:

    On the Junos Pulse Access Control Service, you have created a role called Secret that you only want to provide to users who present a certificate.Using the admin GUI, which two features would you configure to satisfy this requirement?()

    • A、Sign-in Policy
    • B、Role Mapping Rule
    • C、Role Restrictions
    • D、Trusted Server CA

    正确答案:B,C

  • 第6题:

    Your security policy requires that users authenticating to the Junos Pulse Access Control Service are connecting from a domain member endpoint on the internal corporate network.Which set of role access restrictions must you configure to enforce this security policy?()

    • A、Source IP and browser
    • B、Source IP and certificate
    • C、Certificate and Host Checker
    • D、Host Checker and source IP

    正确答案:D

  • 第7题:

    You want to provide all users in your corporation with a single agent that provides access to multiple connection types conditionally. For example, you connect to the Junos Pulse Access Control Service if you are connected to the intranet, but you connect to the Junos Pulse Secure Access Service if you are on a remote network. Which agent should you use for this type of connection requirement?()

    • A、Junos Pulse should be configured with location awareness rules configured.
    • B、Odyssey Access Client should be installed with Host Checker configured to check the client's location.
    • C、Junos Pulse should be configured with all components installed.
    • D、Agentless access should be enabled so that clients can connect to any service without concern for installing an agent.

    正确答案:A

  • 第8题:

    You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains Windows Server 2003 file servers. The network also contains a Windows Server 2003 computer named Server1 that runs Routing and Remote Access and Internet Authentication Service (IAS). Server1 provides VPN access to the network for users’ home computers.   You suspect that an external unauthorized user is attempting to access the network through Server1. You want to log the details of access attempts by VPN users when they attempt to access the network. You want to compare the IP addresses of users’ home computers with the IP addresses used in the access attempts to verify that the users are authorized.  You need to configure Server1 to log the details of access attempts by VPN users.   What should you do?  ()

    • A、 Configure the system event log to Do not overwrite.
    • B、 In IAS, in Remote Access Logging, enable the Authentication requests setting.
    • C、 Configure the Remote Access server to Log all events.
    • D、 Create a custom remote access policy and configure it for Authentication-Type.

    正确答案:B

  • 第9题:

    单选题
    Network access protection (NAP) is configured for the corporate network. Users connect to the corporate network by using portable computers. The command policy required confidentiality of data when is in transmit between the portable computers and the servers. You need to ensure that users can access network resources only from computers that comply with the company policy. What should you do?()
    A

    Create an Ipsec enforcement network policy.

    B

    Create an 802.1xenforcemen tnetwork policy.

    C

    Createa wired network(IEEE802.3)Group policy.

    D

    Create an extensible authentication protocol(EAP)enforcement network policy.


    正确答案: D
    解析: 暂无解析

  • 第10题:

    多选题
    You want to restrict access to a role based on the client machine from which the user is accessing the network.Which two role restrictions accomplish this goal? ()
    A

    user name

    B

    password length

    C

    certificate

    D

    Host Checker


    正确答案: A,B
    解析: 暂无解析

  • 第11题:

    多选题
    You are planning to move streaming media content to Windows Azure Storage.   You need to recommend an approach for providing worldwide users the fastest possible access to the content. Which two actions should you recommend?()
    A

    Use a Shared Access Signature.

    B

    Use Windows Azure page blob storage.

    C

    Use Windows Azure block blob storage.

    D

    Use the Windows Azure Content Delivery Network (CDN).


    正确答案: C,A
    解析: 暂无解析

  • 第12题:

    单选题
    Network Access Protection (NAP) is configured for the corporate network.Users connect to the corporate network by using portable computers.The company policy requires confidentiality of data when the data is in transit between the portable computers and the servers.You need to ensure that users can access network resources only from computers that comply with the company policy.What should you do?()
    A

    Create an IPsec Enforcement Network policy.

    B

    Create an 802.1X Enforcement Network policy.

    C

    Create a Wired Network (IEEE 802.3) Group policy.

    D

    Create an Extensible Authentication Protocol (EAP) Enforcement Network policy.


    正确答案: B
    解析: 暂无解析

  • 第13题:

    On the Junos Pulse Access Control Service, you have created a role called Secret that you only want to provide to users who present a certificate.Using the admin GUI, which two features would you configure to satisfy this requirement?()

    A. Sign-in Policy

    B. Role Mapping Rule

    C. Role Restrictions

    D. Trusted Server CA


    参考答案:B, C

  • 第14题:

    You want to customize access to the corporate network so that agentiess users are instructed to obtain a certificatebefore accessing the network.Which two configurations solve this problem? ()

    A. Create a custom sign-in page with specific instructions in the "Instructions" field.

    B. Create a custom sign-in page with specific "Missing Certificate" messages in the "Custom error messages" field.

    C. Create a custom sign-in policy with specific instructions in the "Instructions" field.

    D. Create a custom sign-in notification and assign it to the "Pre-Auth Sign-in Notification" in the sign-in policy.


    参考答案:A, D

  • 第15题:

    The LAN needs are expanding at the Testking corporate office, which is quickly growing. You are instructed to enlarge the area covered by a single LAN segment on the TestKing network.Which of the following are layer 1 devices that you can use?()

    A. A switch.

    B. A router.

    C. A network adapter card.

    D. A hub.

    E. A repeater.


    参考答案:D, E

  • 第16题:

    You must configure access to the corporate network for employees using a client access method. Users require IPsec tunneling to protected resources and an 802.1X supplicant. Users will access the network using Windows platforms.Which two client access methods would support these requirements?()

    • A、Junos Pulse
    • B、Java Agent
    • C、Odyssey Access Client
    • D、Native 802.1X supplicant

    正确答案:A,C

  • 第17题:

    You notice that during peak hours, some firewall enforcers contain a high number of auth table entries. As you investigate the issue, you discover that all users are getting auth table mappings to all firewalls, which is not acceptable. What should you do on the Junos Pulse Access Control Service to resolve this problem?()

    • A、Delete the default auth table mapping policy
    • B、Create auth table mapping policies that route users to specific resources
    • C、Create Resource Access policies that permit access to specific resources
    • D、Create Source Interface policies that route users to specific resources

    正确答案:A

  • 第18题:

    What is the primary purpose of creating a Location Group Policy? ()

    • A、to associate more than one realm with an authentication server
    • B、to logically group network access devices and associate them with specific sign-in policies
    • C、to allow or prevent users from accessing resources in specific locations on the network
    • D、to define the URL that users of network access devices can use to access the Infranet Controller

    正确答案:B

  • 第19题:

    You want to restrict access to a role based on the client machine from which the user is accessing the network.Which two role restrictions accomplish this goal? ()

    • A、user name
    • B、password length
    • C、certificate
    • D、Host Checker

    正确答案:C,D

  • 第20题:

    You are using Windows 2000 Professional on your desktop computer. You are working on the company’s financial report and you want other users on the network to able to modify your documents for the report. You want users to share the financial report folder on the network. Because the network contains confidential information you want to prevent users from the enabling off line access for the network share that contains the financial report. What should you do?()

    • A、Use Windows Explorer to receive the offline files
    • B、Using the Windows Explorer, disable the cache for the reports on the network share
    • C、Use the Windows NT explorer to grant the special access for the reports on the network  share
    • D、Use the synchronization manager to configure synchronization not to occur when users are  connected to the LAN connection. 

    正确答案:B

  • 第21题:

    多选题
    You create a Web site. You add an EditorZone control to the home page on the Web site. You need to enable users to customize the size and location of the Web Parts on their home pages. Which two controls should you add to the EditorZone control? ()
    A

    BehaviorEditorPart

    B

    AppearanceEditorPart

    C

    PropertyGridEditorPart

    D

    LayoutEditorPart


    正确答案: D,C
    解析: 暂无解析

  • 第22题:

    多选题
    You must configure access to the corporate network for employees using a client access method. Users require IPsec tunneling to protected resources and an 802.1X supplicant. Users will access the network using Windows platforms.Which two client access methods would support these requirements?()
    A

    Junos Pulse

    B

    Java Agent

    C

    Odyssey Access Client

    D

    Native 802.1X supplicant


    正确答案: C,A
    解析: 暂无解析

  • 第23题:

    多选题
    The LAN needs are expanding at the Testking corporate office, which is quickly growing. You are instructed to enlarge the area covered by a single LAN segment on the TestKing network.Which of the following are layer 1 devices that you can use?()
    A

    A switch.

    B

    A router.

    C

    A network adapter card.

    D

    A hub.

    E

    A repeater.


    正确答案: B,E
    解析: 暂无解析