Create a custom sign-in page with specific instructions in the Instructions field.
Create a custom sign-in page with specific Missing Certificate messages in the Custom error messages field.
Create a custom sign-in policy with specific instructions in the Instructions field.
Create a custom sign-in notification and assign it to the Pre-Auth Sign-in Notification in the sign-in policy.
第1题:
You must configure access to the corporate network for employees using a client access method. Users require IPsec tunneling to protected resources and an 802.1X supplicant. Users will access the network using Windows platforms.Which two client access methods would support these requirements?()
A. Junos Pulse
B. Java Agent
C. Odyssey Access Client
D. Native 802.1X supplicant
第2题:
A. user name
B. password length
C. certificate
D. Host Checker
第3题:
A. to associate more than one realm with an authentication server
B. to logically group network access devices and associate them with specific sign-in policies
C. to allow or prevent users from accessing resources in specific locations on the network
D. to define the URL that users of network access devices can use to access the Infranet Controller
第4题:
You use a Windows 2000 Professional desktop computer. The corporate product information is stored on this computer. You want other users on the network to be able to read the product information on your computer. You use Windows Explorer to share the product information folder on the network. You want Sales staff to be able to keep a copy of the product information on their portable computers when they travel. Other users should not be able to synchronize the product information. What should you do?()
第5题:
On the Junos Pulse Access Control Service, you have created a role called Secret that you only want to provide to users who present a certificate.Using the admin GUI, which two features would you configure to satisfy this requirement?()
第6题:
Your security policy requires that users authenticating to the Junos Pulse Access Control Service are connecting from a domain member endpoint on the internal corporate network.Which set of role access restrictions must you configure to enforce this security policy?()
第7题:
You want to provide all users in your corporation with a single agent that provides access to multiple connection types conditionally. For example, you connect to the Junos Pulse Access Control Service if you are connected to the intranet, but you connect to the Junos Pulse Secure Access Service if you are on a remote network. Which agent should you use for this type of connection requirement?()
第8题:
You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains Windows Server 2003 file servers. The network also contains a Windows Server 2003 computer named Server1 that runs Routing and Remote Access and Internet Authentication Service (IAS). Server1 provides VPN access to the network for users’ home computers. You suspect that an external unauthorized user is attempting to access the network through Server1. You want to log the details of access attempts by VPN users when they attempt to access the network. You want to compare the IP addresses of users’ home computers with the IP addresses used in the access attempts to verify that the users are authorized. You need to configure Server1 to log the details of access attempts by VPN users. What should you do? ()
第9题:
Create an Ipsec enforcement network policy.
Create an 802.1xenforcemen tnetwork policy.
Createa wired network(IEEE802.3)Group policy.
Create an extensible authentication protocol(EAP)enforcement network policy.
第10题:
user name
password length
certificate
Host Checker
第11题:
Use a Shared Access Signature.
Use Windows Azure page blob storage.
Use Windows Azure block blob storage.
Use the Windows Azure Content Delivery Network (CDN).
第12题:
Create an IPsec Enforcement Network policy.
Create an 802.1X Enforcement Network policy.
Create a Wired Network (IEEE 802.3) Group policy.
Create an Extensible Authentication Protocol (EAP) Enforcement Network policy.
第13题:
On the Junos Pulse Access Control Service, you have created a role called Secret that you only want to provide to users who present a certificate.Using the admin GUI, which two features would you configure to satisfy this requirement?()
A. Sign-in Policy
B. Role Mapping Rule
C. Role Restrictions
D. Trusted Server CA
第14题:
A. Create a custom sign-in page with specific instructions in the "Instructions" field.
B. Create a custom sign-in page with specific "Missing Certificate" messages in the "Custom error messages" field.
C. Create a custom sign-in policy with specific instructions in the "Instructions" field.
D. Create a custom sign-in notification and assign it to the "Pre-Auth Sign-in Notification" in the sign-in policy.
第15题:
The LAN needs are expanding at the Testking corporate office, which is quickly growing. You are instructed to enlarge the area covered by a single LAN segment on the TestKing network.Which of the following are layer 1 devices that you can use?()
A. A switch.
B. A router.
C. A network adapter card.
D. A hub.
E. A repeater.
第16题:
You must configure access to the corporate network for employees using a client access method. Users require IPsec tunneling to protected resources and an 802.1X supplicant. Users will access the network using Windows platforms.Which two client access methods would support these requirements?()
第17题:
You notice that during peak hours, some firewall enforcers contain a high number of auth table entries. As you investigate the issue, you discover that all users are getting auth table mappings to all firewalls, which is not acceptable. What should you do on the Junos Pulse Access Control Service to resolve this problem?()
第18题:
What is the primary purpose of creating a Location Group Policy? ()
第19题:
You want to restrict access to a role based on the client machine from which the user is accessing the network.Which two role restrictions accomplish this goal? ()
第20题:
You are using Windows 2000 Professional on your desktop computer. You are working on the company’s financial report and you want other users on the network to able to modify your documents for the report. You want users to share the financial report folder on the network. Because the network contains confidential information you want to prevent users from the enabling off line access for the network share that contains the financial report. What should you do?()
第21题:
BehaviorEditorPart
AppearanceEditorPart
PropertyGridEditorPart
LayoutEditorPart
第22题:
Junos Pulse
Java Agent
Odyssey Access Client
Native 802.1X supplicant
第23题:
A switch.
A router.
A network adapter card.
A hub.
A repeater.