单选题You navigate to "UAC" > "Infranet Enforcer" > "Auth Table Mapping" in the admin GUI. You see one policy, which is the unmodified, original default policy.Which statement is true?()A Dynamic auth table mapping is not enabled.B A successful authenticatio

题目
单选题
You navigate to "UAC" > "Infranet Enforcer" > "Auth Table Mapping" in the admin GUI. You see one policy, which is the unmodified, original default policy.Which statement is true?()
A

Dynamic auth table mapping is not enabled.

B

A successful authentication attempt will result in a new authentication table entry, which will be delivered only to the Junos enforcer protecting the network from which the user has authenticated.

C

To create a static auth table mapping, you must delete the default policy.

D

The default policy applies only to the factory-default role User.


相似考题
更多“单选题You navigate to "UAC" "Infranet Enforcer" "Auth Table Mapping" in the admin GUI. You see one policy, which is the unmodified, original default policy.Which statement is true?()A Dynamic auth table mapping is not enabled.B A successful authentication ”相关问题
  • 第1题:

    You have a firewall enforcer protecting resources in a data center. A user is experiencing difficulty connecting to a protected resource.Which two elements must exist so the user can access the resource?()

    A. Resource access policy on the MAG Series device

    B. IPsec routing policy on the MAG Series device

    C. General traffic policy blocking access through the firewall enforcer

    D. Auth table entry on the firewall enforcer


    参考答案:A, D

  • 第2题:

    Which action is optional when adding an authentication realm for use on an Infranet Controller? ()

    A. Modify sign-in policy.

    B. Configure role mapping.

    C. Assign authentication server.

    D. Configure authentication policy.


    参考答案:D

  • 第3题:

    Which statement is correct about defining an Infranet Enforcer for use as a RADIUS Client? ()

    A. You do not need to configure a RADIUS client policy.

    B. You must know the exact model number of the Infranet Enforcer.

    C. You must specify the NACN password of the device in the RADIUS client policy.

    D. You do not need to designate a location group to which the Infranet Enforcer will belong.


    参考答案:A

  • 第4题:

    Which statement is correct about defining an Infranet Enforcer for use as a RADIUS Client? ()

    • A、You do not need to configure a RADIUS client policy.
    • B、You must know the exact model number of the Infranet Enforcer.
    • C、You must specify the NACN password of the device in the RADIUS client policy.
    • D、You do not need to designate a location group to which the Infranet Enforcer will belong.

    正确答案:A

  • 第5题:

    Which action is optional when adding an authentication realm for use on an Infranet Controller? ()

    • A、Modify sign-in policy.
    • B、Configure role mapping.
    • C、Assign authentication server.
    • D、Configure authentication policy.

    正确答案:D

  • 第6题:

    You have a firewall enforcer protecting resources in a data center. A user is experiencing difficulty connecting to a protected resource.Which two elements must exist so the user can access the resource?()

    • A、Resource access policy on the MAG Series device
    • B、IPsec routing policy on the MAG Series device
    • C、General traffic policy blocking access through the firewall enforcer
    • D、Auth table entry on the firewall enforcer

    正确答案:A,D

  • 第7题:

    You navigate to "UAC" > "Infranet Enforcer" > "Auth Table Mapping" in the admin GUI. You see one policy, which is the unmodified, original default policy.Which statement is true?()

    • A、Dynamic auth table mapping is not enabled.
    • B、A successful authentication attempt will result in a new authentication table entry, which will be delivered only to the Junos enforcer protecting the network from which the user has authenticated.
    • C、To create a static auth table mapping, you must delete the default policy.
    • D、The default policy applies only to the factory-default role User.

    正确答案:A

  • 第8题:

    In your test database, you have created the ORDERS table as an index/x7forganized table (IOT). To facilitate faster querying, you have created a mapping table and a bitmap index on the ORDER_FILLED column. You observe that the query performance degrades when users perform a large volume of transactions.  While investigating the reason, you find that the mapping table segment is fragmented, leading to poor performance. Which option would you use to defragment the mapping table without affecting the original table data?()

    • A、export and import the mapping table
    • B、drop and re­create the mapping table
    • C、truncate the mapping table and reinsert the values
    • D、use the ALTER TABLE .. REBUILD command to defragment the mapping table

    正确答案:B

  • 第9题:

    单选题
    Which action is optional when adding an authentication realm for use on an Infranet Controller? ()
    A

    Modify sign-in policy.

    B

    Configure role mapping.

    C

    Assign authentication server.

    D

    Configure authentication policy.


    正确答案: B
    解析: 暂无解析

  • 第10题:

    单选题
    What is true about the operation of the Infranet Enforcer? ()
    A

    It assigns users a set of roles.

    B

    It allows access based on auth table entries.

    C

    It verifies whether an endpoint meets security requirements.

    D

    It configures the UAC agent to allow or deny access to resources.


    正确答案: A
    解析: 暂无解析

  • 第11题:

    多选题
    You are configuring an LDAP authentication server, and you want to configure role-mapping rules based on group membership. When you attempt to search for groups in the server catalog, no groups appear.Assuming the LDAP server is reachable and functioning properly, in the admin GUI. Which two parts of the configuration should you verify are correct?()
    A

    Finding user entries

    B

    Authentication required

    C

    LDAP Server Type

    D

    Determining group membership


    正确答案: D,B
    解析: 暂无解析

  • 第12题:

    多选题
    A user is successfully authenticating to the network but is unable to access protected resources behind a ScreenOS enforcer. You log in to the ScreenOS enforcer and issue the command get auth table infranet and you do not see the user listed.Which two event log settings on the Junos Pulse Access Control Service must you enable to troubleshootthis issue?()
    A

    Connection Requests

    B

    System Errors

    C

    Enforcer Events

    D

    Enforcer Command Trace


    正确答案: B,A
    解析: 暂无解析

  • 第13题:

    You navigate to "UAC" > "Infranet Enforcer" > "Auth Table Mapping" in the admin GUI. You see one policy, which is the unmodified, original default policy.Which statement is true?()

    A. Dynamic auth table mapping is not enabled.

    B. A successful authentication attempt will result in a new authentication table entry, which will be delivered only to the Junos enforcer protecting the network from which the user has authenticated.

    C. To create a static auth table mapping, you must delete the default policy.

    D. The default policy applies only to the factory-default role User.


    参考答案:A

  • 第14题:

    What is true about the operation of the Infranet Enforcer? ()

    A. It assigns users a set of roles.

    B. It allows access based on auth table entries.

    C. It verifies whether an endpoint meets security requirements.

    D. It configures the UAC agent to allow or deny access to resources.


    参考答案:B

  • 第15题:

    What is true about the operation of the Infranet Enforcer? ()

    • A、It assigns users a set of roles.
    • B、It allows access based on auth table entries.
    • C、It verifies whether an endpoint meets security requirements.
    • D、It configures the UAC agent to allow or deny access to resources.

    正确答案:B

  • 第16题:

    You notice that during peak hours, some firewall enforcers contain a high number of auth table entries. As you investigate the issue, you discover that all users are getting auth table mappings to all firewalls, which is not acceptable. What should you do on the Junos Pulse Access Control Service to resolve this problem?()

    • A、Delete the default auth table mapping policy
    • B、Create auth table mapping policies that route users to specific resources
    • C、Create Resource Access policies that permit access to specific resources
    • D、Create Source Interface policies that route users to specific resources

    正确答案:A

  • 第17题:

    A user is successfully authenticating to the network but is unable to access protected resources behind a ScreenOS enforcer. You log in to the ScreenOS enforcer and issue the command get auth table infranet and you do not see the user listed.Which two event log settings on the Junos Pulse Access Control Service must you enable to troubleshootthis issue?()

    • A、Connection Requests
    • B、System Errors
    • C、Enforcer Events
    • D、Enforcer Command Trace

    正确答案:C,D

  • 第18题:

    Which parameter do you use to enable Junos Pulse Access Control Service enforcement on a policy on a ScreenOS platform?()

    • A、uac-policy
    • B、ic-policy
    • C、inyranet-auth
    • D、uac-auth

    正确答案:C

  • 第19题:

    You are configuring an LDAP authentication server, and you want to configure role-mapping rules based on group membership. When you attempt to search for groups in the server catalog, no groups appear.Assuming the LDAP server is reachable and functioning properly, in the admin GUI. Which two parts of the configuration should you verify are correct?()

    • A、Finding user entries
    • B、Authentication required
    • C、LDAP Server Type
    • D、Determining group membership

    正确答案:B,D

  • 第20题:

    单选题
    In your test database, you have created the ORDERS table as an index-organized table (IOT). To facilitate faster querying, you have created a mapping table and a bitmap index on the ORDER_FILLED column. You observe that the query performance degrades when users perform a large volume of transactions.  While investigating the reason, you find that the mapping table segment is fragmented, leading to poor performance.   Which option would you use to defragment the mapping table without affecting the original table data?()
    A

    export and import the mapping table

    B

    drop and re-create the mapping table

    C

    truncate the mapping table and reinsert the values

    D

    use the ALTER TABLE···REBUILD command to defragment the mapping table


    正确答案: B
    解析: 暂无解析

  • 第21题:

    单选题
    You have created a Host Checker policy that contains multiple rules. You want to inform end users which rule specifically has failed.In the admin GUI, which configuration setting would you enable?()
    A

    Enable Custom Instructions

    B

    Pre-auth notification

    C

    Remediation message

    D

    Send reason strings


    正确答案: C
    解析: 暂无解析

  • 第22题:

    单选题
    In your test database, you have created the ORDERS table as an index-organized table (IOT). To facilitate faster querying, you have created a mapping table and a bitmap index on the ORDER_FILLED column. You observe that the query performance degrees when users perform a large volume of transactions. While investigating the reason, you find that the mapping table segment is fragmented, leading to poor performance. Which option would you use to defragment the mapping table without affecting the original table data?()
    A

     Export and import the mapping table.

    B

     Drop and re-create the mapping table.

    C

     Truncate the mapping table and reinsert the values.

    D

     Use the ALTER TABLE .. REBUILD command to defragment the mapping table.


    正确答案: B
    解析: 暂无解析

  • 第23题:

    单选题
    You notice that during peak hours, some firewall enforcers contain a high number of auth table entries. As you investigate the issue, you discover that all users are getting auth table mappings to all firewalls, which is not acceptable. What should you do on the Junos Pulse Access Control Service to resolve this problem?()
    A

    Delete the default auth table mapping policy

    B

    Create auth table mapping policies that route users to specific resources

    C

    Create Resource Access policies that permit access to specific resources

    D

    Create Source Interface policies that route users to specific resources


    正确答案: A
    解析: 暂无解析

  • 第24题:

    单选题
    You navigate to "UAC" > "Infranet Enforcer" > "Auth Table Mapping" in the admin GUI. You see one policy, which is the unmodified, original default policy.Which statement is true?()
    A

    Dynamic auth table mapping is not enabled.

    B

    A successful authentication attempt will result in a new authentication table entry, which will be delivered only to the Junos enforcer protecting the network from which the user has authenticated.

    C

    To create a static auth table mapping, you must delete the default policy.

    D

    The default policy applies only to the factory-default role User.


    正确答案: A
    解析: 暂无解析