网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
Your security policy requires that users authenticating to the Junos Pulse Access Control Service are connecting from a domain member endpoint on the internal corporate network.Which set of role access restrictions must you configure to enforce this security policy?()
- A、Source IP and browser
- B、Source IP and certificate
- C、Certificate and Host Checker
- D、Host Checker and source IP
参考答案
更多 “Your security policy requires that users authenticating to the Junos Pulse Access Control Service are connecting from a domain member endpoint on the internal corporate network.Which set of role access restrictions must you configure to enforce this security policy?()A、Source IP and browserB、Source IP and certificateC、Certificate and Host CheckerD、Host Checker and source IP” 相关考题
考题
Your security policy requires that users authenticating to the Junos Pulse Access Control Service are connecting from a domain member endpoint on the internal corporate network.Which set of role access restrictions must you configure to enforce this security policy?()A. Source IP and browserB. Source IP and certificateC. Certificate and Host CheckerD. Host Checker and source IP
考题
Your corporate security policy requires that a user performing attacks must have limited network access and activities until an administrator can investigate.In the admin GUI, which sensor event policy action must you configure in "Configuration" >"Sensors" >"Sensor Event Policies" >[rule name] to accomplish this?()A. IgnoreB. Replace users roleC. Terminate user sessionD. Disable user account
考题
Which statement describes the behavior of a security policy?()A、The implicit default security policy permits all traffic.B、Traffic destined to the device itself always requires a security policy.C、Traffic destined to the device’s incoming interface does not require a security policy.D、The factory-default configuration permits all traffic from all interfaces.
考题
Which two are needed components when designing and implementing a security solution?()A、detailed VLAN informationB、an incident response planC、results of testing the new network configurationD、an existing hierarchical network topologyE、a security policy for your organization
考题
ou are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. All client computers run Windows XP Professional.Two of the servers on the network contain highly confidential documents. The company’s written security policy states that all network connections with these servers must be encrypted by using an IPSec policy.You place the two servers in an organizational unit (OU) named SecureServers. You configure a Group Policy object (GPO) that requires encryption for all connections. You assign the GPO to the SecureServers OU. You need to verify that users are connecting to the two servers by using encrypted connections. What should you do?()A、Run the net view command.B、Run the gpresult command.C、Use the IP Security Monitor console.D、Use the IPSec Policy Management console.
考题
Your company uses network access protection (NAP) to enforce policies on client computers that connect to the network. Client computers run windows vista. A group Policy is used to configure client computers to obtain updates from WSUS. Company policy requires that updates labeled important and critical must be applied before client computers can access network resources. You need to ensure that client computes meet the company policy requirement. What should you do?()A、Enable automatic updates on each client.B、Enable the security center on each client.C、Quarantine clients that do not have all available security updates installed.D、Disconnect the remote connection until the required updates are installed.
考题
Your company uses Network Access Protection (NAP) to enforce policies on client computers that connect to the network. Client computers run Windows 7. A Group Policy is used to configure client computers to obtain updates from Windows Server Update Services (WSUS).Company policy requires that updates labeled Important and Critical must be applied before client computers can access network resources.You need to ensure that client computers meet the company policy requirement. What should you do?()A、Enable automatic updates on each client.B、Enable the Security Center on each client.C、Quarantine clients that do not have all available security updates installed.D、Disconnect the connection until the required updates are installed.
考题
You are the administrator of your company’s network. You use Security Templates to configure a Security Policy on the Windows 2000 Professional Computers in the Sales organizational unit (OU). You notice that the Computers in the Sales OU are not downloading the Security Policy settings. On each computer, the Security Policy appears in the Local Computer Policy, but is not listed as the effective policy. You want all computers in the Sales OU to have the Security Policy listed as the effective policy. How should you accomplish this task? ()A、Use Security Templates to correct the setting and export the security file.B、Use Security Configuration and Analysis to import the security setting. Then create a Group policy object (GPO) for the Sales QU.C、Use Secedit /RefreshPolicy Machine_Policy command.D、Use the Basicwk.inf security file settings, save the security file, and then import the fileto theComputers.
考题
You deploy mobile devices that run Microsoft Windows Mobile 5.0. Company security policy requires an authentication process that is stronger than a user name and password combination. You need to ensure that Microsoft ActiveSync sessions use an authentication process that meets the company security policy. What should you do?()A、Deploy a two-factor authentication process.B、Deploy a single-factor authentication process.C、Deploy a simple PIN policy for the Windows Mobilebased devices.D、Deploy a complex PIN policy for the Windows Mobilebased devices.
考题
Your network consists of a single Active Directory domain. The domain contains a server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). Your company’s security policy states that domain users must be prevented from logging on to Server1 if a domain controller is unavailable. You disconnect Server1 from the network and discover that you can log on to Server1. You need to configure Server1 to comply with the company’s security policy. What should you do on Server1? ()A、From the local security policy, modify the Security Options.B、From the local security policy, modify the User Rights Assignment.C、From Active Directory Users and Computers, modify the properties of the Server1 account.D、From Active Directory Users and Computers, modify the properties of the Domain Computers group.
考题
Your network consists of a single Active Directory domain. The functional level of the domain is Windows Server 2008 R2. All domain controllers run Windows Server 2008 R2. A corporate policy requires that the users from the research department have higher levels of account and password security than other users in the domain. You need to recommend a solution that meets the requirements of the corporate policy. Your solution must minimize hardware and software costs. What should you recommend?()A、Create a new Active Directory site. Deploy a Group Policy object (GPO) to the site.B、Create a new Password Settings Object (PSO) for the research department’s usersC、Create a new organizational unit (OU) named Research in the existing domain. Deploy a Group Policy object (GPO) to the Research OU.D、Create a new domain in the forest.Add the research department’s user accounts to the new domain.Configure a new security policy in the new domain.
考题
You upgrade your computer from Windows NT Workstation to a Windows 2000 Professional computer. Your computer is a member of justtalks.com domain. Prior to this upgrade your computer was configured by a system policy to require at-least a 12 alphanumeric character password. After the upgrade your computer will not apply security policy. What should you do?()A、Use secedit.exe to refresh the security policy.B、Use the local computer policy to configure the local security policy.C、Use security configuration and analysis to support the security files as a .pol file.D、Use computer management to configure the security policy setting.
考题
单选题You have an SRX Series Layer 2 enforcer providing 802.1X authentication for connected endpoints. Your security policy requires that users who fail their authentication be placed in a specific VLAN.On the Layer 2 enforcer, at the [edit protocols dot1x authenticator interface] hierarchy for each participating interface, what provides this functionality?()A
guest-vlanB
auth-fail-vlanC
server-reject-vlanD
server-fail-vlan
考题
单选题Your company security policy does not allow you to connect your servers directly to the internet. You would like to utilize some of theYour company? security policy does not allow you to connect your servers directly to the internet. You would like to utilize some of the functionality in Solaris 10 to analyze your systems for available OS updates, and also download and install those updates from Sun Microsystems. Which answer describes how to utilize this functionality to analyze your systems for available OS updates, and also download and install those updates without connecting your server directly to the internet? ()A
AB
BC
CD
D
考题
多选题You have a share on your local computer. Someone has been intentionally damaging your files. You want to be able to know which account is doing this. What do you do? ()ATurn on auditing for objects in the Local Security Policy and Select 'Process Tracking'.BTurn on auditing for objects in the Local Security Policy and Select 'Object Access'.CUse Windows Explorer to turn on auditing for the specific files.DHave the administrator for domains log you on as an administrator and enable auditing for a specific file.ETurn on auditing for objects in the Local Security Policy and Select 'Account Management'.FAllow only one account at a time to log on to your shared folder. Check the event viewer to see who logged on.
考题
单选题You have a share on your local computer. This share contains some sensitive applications in theform of .exe files. You want to audit the users who are trying to execute these programs. What should you do?()A
Turn on auditing for objects in the Local Security Policy and Select 'Process Tracking'.B
Turn on auditing for objects in the Local Security Policy and Select 'Object Access'.C
Use Windows Explorer to turn on auditing for the specific files. D
Have the administrator for domains log you on as an administrator and enable auditing for a specific file.E
Turn on auditing for objects in the Local Security Policy and Select 'Account Management'.F
Allow only one account at a time to log on to your shared folder. Check the event viewer to see who logged on.
考题
单选题Your security policy requires that users authenticating to the Junos Pulse Access Control Service are connecting from a domain member endpoint on the internal corporate network.Which set of role access restrictions must you configure to enforce this security policy?()A
Source IP and browserB
Source IP and certificateC
Certificate and Host CheckerD
Host Checker and source IP
考题
单选题Your corporate security policy requires that a user performing attacks must have limited network access and activities until an administrator can investigate.In the admin GUI, which sensor event policy action must you configure in "Configuration" "Sensors" "Sensor Event Policies" [rule name] to accomplish this?()A
IgnoreB
Replace users roleC
Terminate user sessionD
Disable user account
考题
多选题You administer a network containing SRX Series firewalls. New policy requires that you implement MAG Series devices to provide access control for end users. The policy requires that the SRX Series devices dynamically enforce security policy based on the source IP address of the user. The policy also requires that the users communicate with protected resources using encrypted traffic. Which two statements are true?()AThe endpoints can use agentless access.BEncrypted traffic flows between the endpoint and the enforcer.CEncrypted traffic flows between the endpoint and the protected resourceDThe endpoints can use the Odyssey Access Client.
考题
多选题You are designing a strategy of enforce the corporate security policy. Which action or actions should you perform?()AConfigure a password policy that requires strong passwordsBConfigure a password policy that requires all users to change their passwords once a month.CAllow users in the branch offices to log on between the hours of 8:00 AM and 5:00 PM, Monday through Friday.DAllow users in the retail outlets to log on between the hours of 6:00 AM and 11:00 PM, daily.EEnable a policy that forces users to log off when their logon hours expire.
考题
单选题You are the administrator of your company's network. You want to configure a Security Policy for the Windows 2000 Professional Computers that are in the sales department. On one of the computers, you use Security Templates to configure the Security Policy based on the desired security settings. You then export those settings to an .inf file that will be used on all of the Computers in the sales department. You want to configure each Computer to have a customized Security Policy. What steps should you follow in order to achieve your goal?()A
Use Secedit.exe to import the security settings from the .inf file to the computers in the sales department.B
Use a text editor to change the default security settings to the desired security settings. Then export those settings to the Computers in the sales department.C
Create an organizational unit (OU) named Sales. Add the users in the sales department to the Sales OU. Then apply the security template to the users in the Sales OU.D
Create an organizational unit (OU) named Sales. Add the computers in the sales department to the Sales OU. Then apply the security template to computers in the Sales OU.
考题
单选题Which statement describes the behavior of a security policy?()A
The implicit default security policy permits all traffic.B
Traffic destined to the device itself always requires a security policy.C
Traffic destined to the device’s incoming interface does not require a security policy.D
The factory-default configuration permits all traffic from all interfaces.
考题
单选题Your network contains an Active Directory domain. All client computers run Windows XP Service Pack 3 (SP3). The domain contains a member server named Server1 that runs Windows Server 2008 R2. On Server1, you create a connection security rule that requires authentication for inbound and outbound connections. You configure the connection security rule to use Kerberos authentication. You need to ensure that the client computers can connect to Server1. The solution must ensure that all connections to Server1 are encrypted. What should you do?()A
From the Windows Firewall with Advanced Security console, create an inbound rule on Server1.B
From the Windows Firewall with Advanced Security console, create an outbound rule on Server1.C
From a Group Policy object (GPO), enable the Client (Respond Only) IPSec policy on all client computers.D
From a Group Policy object (GPO), configure the Network Security: LDAP client signing requirements policy setting for all client computers.
考题
多选题Which two are needed components when designing and implementing a security solution?()Adetailed VLAN informationBan incident response planCresults of testing the new network configurationDan existing hierarchical network topologyEa security policy for your organization
热门标签
最新试卷