网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which action is optional when adding an authentication realm for use on an Infranet Controller? ()
A

Modify sign-in policy.

B

Configure role mapping.

C

Assign authentication server.

D

Configure authentication policy.


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which action is optional when adding an authentication realm for use on an Infranet Controller? ()A Modify sign-in policy.B Configure role mapping.C Assign authentication server.D Configure authentication policy.” 相关考题
考题 An authentication realm consists of which three authentication resources?() A. Authentication serverB. Session optionsC. Authentication policyD. End-point security policyE. Role-mapping rules

考题 What are two steps to configure user authentication for a Junos Pulse Access Control Service?() A. Configure an authentication policy as part of the user role definitions.B. Configure a Sign-in Policy.C. Configure authentication agents as part of the user role definitionsD. Configure an authentication policy as part of the authentication realm definition.

考题 What are three necessary steps for enabling 802.1X access when configuring Layer 2 enforcement?() A. Configure a location groupB. Createan authentication protocol setC. Configure the RADIUS AV pair listD. Configure RADIUS clientsE. Configure role and role-mapping rules

考题 You want to enforce a Host Checker policy so that only users who pass the policy receive the Employee role. In the admin GUI, which two parameters must you configure?() A. Select Require and Enforce for the Host Checker Policy in the realm authentication policy.B. Select Evaluate Policies for the Host Checker policy in the realm authentication policy.C. Configure the Host Checker policy as a role restriction for the Employee role.D. Configure the Host Checker policy as a resource access policy for the Employee role.

考题 When using RADIUS as an external authentication method for 802.1X authentication for the Junos Pulse Access Control Service, what must you do to ensure that the RADIUS authentication works properly?() A. Configure IP helper to forward the authentication requests from the clients to the external RADIUS serverB. Configure the supplicant as anexternal authentication serverC. Configure RADIUS proxy on the realmD. Specify the correct RADIUS port 389 on the Junos Pulse Access Control Service

考题 Which three authentication resources are grouped within an authentication realm?() A. Authentication enforcerB. Directory serverC. Captive authenticationD. Authentication policyE. Role-mapping rules

考题 A company has completed two acquisitions over the previous year. Each of the acquired companies was allowed to keep its own independent authentication server. The network administrator has been asked to roll out the Junos Pulse Access Control Service to users within the original company along with each of the two acquired organizations.The administrator configures three authentication realms, one for each independent authentication server, and associates them all with a single sign-in policy. All of the client endpoints are running Junos Pulse on their Windows XP desktops.When a user signs in to the Junos Pulse Access Control Service, which statement is correct?()A. The first authentication realm that was added to the sign-in policy is used by default.B. The user is allowed to choose the correct authentication realm from a list presented by Junos Pulse.C. When Junos Pulse is initially installed on the desktop, it must be configured with the correct realm.D. This is not an allowed configuration; the administrator should configure separate sign-in policies for each realm.

考题 Which action is optional when adding an authentication realm for use on an Infranet Controller? () A. Modify sign-in policy.B. Configure role mapping.C. Assign authentication server.D. Configure authentication policy.

考题 Which additional configuration must be completed when setting up role restrictions using certificates? () A. Set up a certificate authentication server.B. Configure the authentication realm to remember certificate information.C. Configure the authentication realm to use a certificate server for authentication.D. Configure a role mapping rule requiring certification information to map user to role.

考题 Which two methods of authentication are used by the Infranet Controller for IPSec enforcement?() A. dial-up VPNB. IKE authenticationC. XAuth authenticationD. shared IKE authentication

考题 What is the primary purpose of creating a Location Group Policy? () A. to associate more than one realm with an authentication serverB. to logically group network access devices and associate them with specific sign-in policiesC. to allow or prevent users from accessing resources in specific locations on the networkD. to define the URL that users of network access devices can use to access the Infranet Controller

考题 What are two steps to configure user authentication for a Junos Pulse Access Control Service?()A、Configure an authentication policy as part of the user role definitions.B、Configure a Sign-in Policy.C、Configure authentication agents as part of the user role definitionsD、Configure an authentication policy as part of the authentication realm definition.

考题 What are three necessary steps for enabling 802.1X access when configuring Layer 2 enforcement?()A、Configure a location groupB、Createan authentication protocol setC、Configure the RADIUS AV pair listD、Configure RADIUS clientsE、Configure role and role-mapping rules

考题 An authentication realm consists of which three authentication resources?()A、Authentication serverB、Session optionsC、Authentication policyD、End-point security policyE、Role-mapping rules

考题 When using RADIUS as an external authentication method for 802.1X authentication for the Junos Pulse Access Control Service, what must you do to ensure that the RADIUS authentication works properly?()A、Configure IP helper to forward the authentication requests from the clients to the external RADIUS serverB、Configure the supplicant as anexternal authentication serverC、Configure RADIUS proxy on the realmD、Specify the correct RADIUS port 389 on the Junos Pulse Access Control Service

考题 You want to enforce a Host Checker policy so that only users who pass the policy receive the Employee role. In the admin GUI, which two parameters must you configure?()A、Select "Require and Enforce" for the Host Checker Policy in the realm authentication policy.B、Select "Evaluate Policies" for the Host Checker policy in the realm authentication policy.C、Configure the Host Checker policy as a role restriction for the Employee role.D、Configure the Host Checker policy as a resource access policy for the Employee role.

考题 Which two methods of authentication are used by the Infranet Controller for IPSec enforcement?()A、dial-up VPNB、IKE authenticationC、XAuth authenticationD、shared IKE authentication

考题 Which action is optional when adding an authentication realm for use on an Infranet Controller? ()A、Modify sign-in policy.B、Configure role mapping.C、Assign authentication server.D、Configure authentication policy.

考题 What is the primary purpose of creating a Location Group Policy? ()A、to associate more than one realm with an authentication serverB、to logically group network access devices and associate them with specific sign-in policiesC、to allow or prevent users from accessing resources in specific locations on the networkD、to define the URL that users of network access devices can use to access the Infranet Controller

考题 Which additional configuration must be completed when setting up role restrictions using certificates? ()A、Set up a certificate authentication server.B、Configure the authentication realm to remember certificate information.C、Configure the authentication realm to use a certificate server for authentication.D、Configure a role mapping rule requiring certification information to map user to role.

考题 Which three authentication resources are grouped within an authentication realm?()A、Authentication enforcerB、Directory serverC、Captive authenticationD、Authentication policyE、Role-mapping rules

考题 You need to design an access control solution for customer information. Your solution must meet security requirements.What should you do?()A、Configure the Web site to require SSL connections. Configure the Web site to require client certificates. Enable and configure client certificate mapping on the Web siteB、Configure the Web site to require SSL connections. Disable anonymous access to the Web site.Assign the Allow – Read  permission to the customer user accounts for the folder that contains the Web site filesC、Configure the Web site to use only Microsoft .NET Passport authentication. Specify the den.corp.woodgrovebank.com domain as the default domain for .NET Passport authentication.Configure a custom local IPSec policy on the Web servers to require IPSec communicationsD、Configure the Web site to use only Windows Integrated authentication. Configure a custom local IPSec policy on the Web servers to require IPSec communications. Configure the IPSec policy to use certificate-based authentication and encryption

考题 单选题A company has completed two acquisitions over the previous year. Each of the acquired companies was allowed to keep its own independent authentication server. The network administrator has been asked to roll out the Junos Pulse Access Control Service to users within the original company along with each of the two acquired organizations.The administrator configures three authentication realms, one for each independent authentication server, and associates them all with a single sign-in policy. All of the client endpoints are running Junos Pulse on their Windows XP desktops. When a user signs in to the Junos Pulse Access Control Service, which statement is correct?()A The first authentication realm that was added to the sign-in policy is used by default.B The user is allowed to choose the correct authentication realm from a list presented by Junos Pulse.C When Junos Pulse is initially installed on the desktop, it must be configured with the correct realm.D This is not an allowed configuration; the administrator should configure separate sign-in policies for each realm.

考题 单选题What is the primary purpose of creating a Location Group Policy? ()A to associate more than one realm with an authentication serverB to logically group network access devices and associate them with specific sign-in policiesC to allow or prevent users from accessing resources in specific locations on the networkD to define the URL that users of network access devices can use to access the Infranet Controller

考题 多选题What are two steps to configure user authentication for a Junos Pulse Access Control Service?()AConfigure an authentication policy as part of the user role definitions.BConfigure a Sign-in Policy.CConfigure authentication agents as part of the user role definitionsDConfigure an authentication policy as part of the authentication realm definition.

考题 单选题Which additional configuration must be completed when setting up role restrictions using certificates? ()A Set up a certificate authentication server.B Configure the authentication realm to remember certificate information.C Configure the authentication realm to use a certificate server for authentication.D Configure a role mapping rule requiring certification information to map user to role.

考题 多选题You want to enforce a Host Checker policy so that only users who pass the policy receive the Employee role. In the admin GUI, which two parameters must you configure?()ASelect Require and Enforce for the Host Checker Policy in the realm authentication policy.BSelect Evaluate Policies for the Host Checker policy in the realm authentication policy.CConfigure the Host Checker policy as a role restriction for the Employee role.DConfigure the Host Checker policy as a resource access policy for the Employee role.