网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

An authentication realm consists of which three authentication resources?()

  • A、Authentication server
  • B、Session options
  • C、Authentication policy
  • D、End-point security policy
  • E、Role-mapping rules

参考答案

更多 “An authentication realm consists of which three authentication resources?()A、Authentication serverB、Session optionsC、Authentication policyD、End-point security policyE、Role-mapping rules” 相关考题
考题 An authentication realm consists of which three authentication resources?() A. Authentication serverB. Session optionsC. Authentication policyD. End-point security policyE. Role-mapping rules

考题 What are two steps to configure user authentication for a Junos Pulse Access Control Service?() A. Configure an authentication policy as part of the user role definitions.B. Configure a Sign-in Policy.C. Configure authentication agents as part of the user role definitionsD. Configure an authentication policy as part of the authentication realm definition.

考题 Which three authentication resources are grouped within an authentication realm?() A. Authentication enforcerB. Directory serverC. Captive authenticationD. Authentication policyE. Role-mapping rules

考题 Which profile configurations allows either PAP or CHAP to be used for authentication?() A.ppp authentication chap papB.pppoe authentication chap papC.ppp authentication chap ppp authentication papD.pppoe authentication chap pppoe authentication pap

考题 Which action is optional when adding an authentication realm for use on an Infranet Controller? () A. Modify sign-in policy.B. Configure role mapping.C. Assign authentication server.D. Configure authentication policy.

考题 Which additional configuration must be completed when setting up role restrictions using certificates? () A. Set up a certificate authentication server.B. Configure the authentication realm to remember certificate information.C. Configure the authentication realm to use a certificate server for authentication.D. Configure a role mapping rule requiring certification information to map user to role.

考题 Company.com network consists of a single Active Directory domain named  Company.com.Company.com has an Exchange Server 2010 organization.The Company.com employees use Microsoft Office Outlook 2007 to connect to their mailboxes.RPC over HTTP and Auto discover are configured on Microsoft Office Outlook 2007. A new Company.com security policy requires that the employees connected to the domain does not need authentication when using Outlook Anywhere.However, those not connected t the domain needs to be authentication when using Outlook Anywhere.The employees need to comply with the new Company.com security policy.  What should you do?()A、You should consider using Basic authentication on Outlook Anywhere and set up only Basic authentication on the RPC virtual directory.B、You should consider using NTLM authentication on Outlook Anywhere and set up Basic authentication and NTLM authentication on the RPC virtual directory.C、You should consider using NTLM authentication on Outlook Anywhere and set up only Basic authentication on the RPC virtual directory.D、You should consider using Basic authentication on Outlook Anywhere and set up Basic authentication and NTLM authentication on the RPC virtual directory.

考题 Which security mechanism uses the concept of a realm?()A、AuthorizationB、Data integrityC、ConfidentialityD、Authentication

考题 You have multiple realms configured on a MAG Series device. A user is authenticating with a non- Junos Pulse Access Control Service client. The username does not contain a realm suffix.Which behavior will the user experience?()A、The user will not be able to log-in, as the Junos Pulse Access Control Service device cannot map the user to a realm when the realm value is empty.B、The user will be mapped to all realms available to the user.C、The Junos Pulse Access Control Service device displays a page where the user must choose from a list of realms.D、The endpoint is assigned to the first realm in the list whose authentication server is a match with the endpoints software.

考题 What is the primary purpose of creating a Location Group Policy? ()A、to associate more than one realm with an authentication serverB、to logically group network access devices and associate them with specific sign-in policiesC、to allow or prevent users from accessing resources in specific locations on the networkD、to define the URL that users of network access devices can use to access the Infranet Controller

考题 Which three authentication resources are grouped within an authentication realm?()A、Authentication enforcerB、Directory serverC、Captive authenticationD、Authentication policyE、Role-mapping rules

考题 Identify the two optional WebLogic security providers in an Oracle WebLogic security realm()A、 Authentication ProviderB、 Adjudication ProviderC、 Authorization ProviderD、 Auditing Provider

考题 单选题Which the security mechanism uses the concept of a realm?()A  authorizationB  data integrityC  confidentialityD  authentication

考题 单选题Which action is optional when adding an authentication realm for use on an Infranet Controller? ()A Modify sign-in policy.B Configure role mapping.C Assign authentication server.D Configure authentication policy.

考题 单选题Which additional configuration must be completed when setting up role restrictions using certificates? ()A Set up a certificate authentication server.B Configure the authentication realm to remember certificate information.C Configure the authentication realm to use a certificate server for authentication.D Configure a role mapping rule requiring certification information to map user to role.

考题 单选题What is the primary purpose of creating a Location Group Policy? ()A to associate more than one realm with an authentication serverB to logically group network access devices and associate them with specific sign-in policiesC to allow or prevent users from accessing resources in specific locations on the networkD to define the URL that users of network access devices can use to access the Infranet Controller

考题 多选题You want to enforce a Host Checker policy so that only users who pass the policy receive the Employee role. In the admin GUI, which two parameters must you configure?()ASelect Require and Enforce for the Host Checker Policy in the realm authentication policy.BSelect Evaluate Policies for the Host Checker policy in the realm authentication policy.CConfigure the Host Checker policy as a role restriction for the Employee role.DConfigure the Host Checker policy as a resource access policy for the Employee role.

考题 单选题A company has completed two acquisitions over the previous year. Each of the acquired companies was allowed to keep its own independent authentication server. The network administrator has been asked to roll out the Junos Pulse Access Control Service to users within the original company along with each of the two acquired organizations.The administrator configures three authentication realms, one for each independent authentication server, and associates them all with a single sign-in policy. All of the client endpoints are running Junos Pulse on their Windows XP desktops. When a user signs in to the Junos Pulse Access Control Service, which statement is correct?()A The first authentication realm that was added to the sign-in policy is used by default.B The user is allowed to choose the correct authentication realm from a list presented by Junos Pulse.C When Junos Pulse is initially installed on the desktop, it must be configured with the correct realm.D This is not an allowed configuration; the administrator should configure separate sign-in policies for each realm.

考题 单选题Which security mechanism uses the concept of a realm?()A AuthorizationB Data integrityC ConfidentialityD Authentication

考题 单选题You work as the enterprise exchange administrator at Xxx .The Xxx network consists of a domain named xxx . Xxx has three Exchange Server 2007 mail servers named XXX-EX01, XXX-EX02 and XXX-EX03 that has the following implementation: records.What action must you take to make sure of the availability of the mailboxes on XXX-EX03 if the employees utilize the Exchange ActiveSync after the instrallation of XXX-EX04?()A You should use Basic authentication on Exchange ActiveSync and set up only Basic authentication on the RPC virtual directory.B You should use NTLM authentication on the RPC virtual directory.C You should use Microsoft Challenge Handshake Authentication Protocol version 2 (MS-CHAP v2) on XXX-EX01.D You should use the anonymous setting in the authentication type for the Microsoft-Server-ActiveSync virtual directory on XXX-EX01.

考题 多选题Which two statements regarding external authentication servers for firewall userauthentication are true?()AUp to three external authentication server types can be used simultaneously.BOnly one external authentication server type can be used simultaneously.CIf the local password database is not configured in the authentication order, and the configured authentication server is unreachable, authentication is not performed.DIf the local password database is not configured in the authentication order, and the configured authentication server rejects the authentication request, authentication is not performed

考题 多选题Your network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2).You have a VPN server named Server1. You have an Internet Authentication Service (IAS) server named Server2. You need to ensure that all VPN connections to Server1 are authenticated by Server2.Which two actions should you perform?()AFrom the Internet Authentication Service snap-in on Server2, create a new RADIUS client.BFrom the Internet Authentication Service snap-in on Server2, create a new remote access policy.CFrom the Routing and Remote Access snap-in, configure Server1 to use RADIUS accounting.DFrom the Routing and Remote Access snap-in, configure Server1 to use RADIUS authentication.

考题 多选题What are two steps to configure user authentication for a Junos Pulse Access Control Service?()AConfigure an authentication policy as part of the user role definitions.BConfigure a Sign-in Policy.CConfigure authentication agents as part of the user role definitionsDConfigure an authentication policy as part of the authentication realm definition.

考题 单选题Which profile configurations allows either PAP or CHAP to be used for authentication?()A ppp authentication chap papB pppoe authentication chap papC ppp authentication chap ppp authentication papD pppoe authentication chap pppoe authentication pap

考题 单选题You have multiple realms configured on a MAG Series device. A user is authenticating with a non- Junos Pulse Access Control Service client. The username does not contain a realm suffix.Which behavior will the user experience?()A The user will not be able to log-in, as the Junos Pulse Access Control Service device cannot map the user to a realm when the realm value is empty.B The user will be mapped to all realms available to the user.C The Junos Pulse Access Control Service device displays a page where the user must choose from a list of realms.D The endpoint is assigned to the first realm in the list whose authentication server is a match with the endpoints software.

考题 多选题An authentication realm consists of which three authentication resources?()AAuthentication serverBSession optionsCAuthentication policyDEnd-point security policyERole-mapping rules

考题 多选题Which three authentication resources are grouped within an authentication realm?()AAuthentication enforcerBDirectory serverCCaptive authenticationDAuthentication policyERole-mapping rules