网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
What must be updated regularly to detect the newest versions of personal firewalls on endpoints? ()
A
Infranet Enforcer firmware
B
Infranet Controller rollback software
C
Host Security Assessment Plug-in (HSAP)
D
Endpoint Security Assessment Plug-in (ESAP)
参考答案
参考解析
解析:
暂无解析
更多 “单选题What must be updated regularly to detect the newest versions of personal firewalls on endpoints? ()A Infranet Enforcer firmwareB Infranet Controller rollback softwareC Host Security Assessment Plug-in (HSAP)D Endpoint Security Assessment Plug-in (ESAP)” 相关考题
考题
You want to create a Host Checker policy that looks for a specific antivirus product that is running on your client machines, but the predefined antivirus options do not include the antivirus product version that you use.Which feature should you verify the antivirus product is up to date?()A. Enhanced Endpoint SecurityB. DP signaturesC. Antivirus licensingD. Endpoint Security Assessment Plug-in
考题
You are configuring an active/passive cluster of SRX Series devices as the firewall enforcer on a MAG Series device.Which statement is true?()
A. Multiple Infranet Enforcer instances are created with a single serial number of an SRX Series device defined in each configuration.B. A single Infranet Enforcer instance is created with both serial numbers of the clustered SRX Series devices defined in the configuration.C. Multiple Infranet Enforcer instances are created with a single IP address of an SRX Series device defined in each configuration.D. A single Infranet enforcer instance is created with the VIP of the clustered SRX Series device defined in the configuration.
考题
What must be updated regularly to detect the newest versions of personal firewalls on endpoints? ()
A. Infranet Enforcer firmwareB. Infranet Controller rollback softwareC. Host Security Assessment Plug-in (HSAP)D. Endpoint Security Assessment Plug-in (ESAP)
考题
What is true about the operation of the Infranet Enforcer? ()
A. It assigns users a set of roles.B. It allows access based on auth table entries.C. It verifies whether an endpoint meets security requirements.D. It configures the UAC agent to allow or deny access to resources.
考题
Which statement is correct about defining an Infranet Enforcer for use as a RADIUS Client? ()
A. You do not need to configure a RADIUS client policy.B. You must know the exact model number of the Infranet Enforcer.C. You must specify the NACN password of the device in the RADIUS client policy.D. You do not need to designate a location group to which the Infranet Enforcer will belong.
考题
( )is not included in Information Security Risk Assessment Process.A.Establishing information security risk criteria
B.Identifying the information security risks
C.Formulating an information security risk treatment plan
D.Analysing the information security risk
考题
What is a primary objective of the security architecture assessment? ()A、document power and UPS availabilityB、to integrate routing and switching componentsC、create a design specification documentD、document the customer's current and future technology projects
考题
Which of the following wireless service components occur in the implement phase?()A、project kickoff,staging,systems acceptance testing,ongoing support handoff meetingB、wlan change management,security administration,technology assessment,operations planC、security assessment,operations assessment,supplier managementD、operations readiness assessment,systems requirements validation,planning project kickoff,service assurance
考题
What is true about the operation of the Infranet Enforcer? ()A、It assigns users a set of roles.B、It allows access based on auth table entries.C、It verifies whether an endpoint meets security requirements.D、It configures the UAC agent to allow or deny access to resources.
考题
You want to create a Host Checker policy that looks for a specific antivirus product that is running on your client machines, but the predefined antivirus options do not include the antivirus product version that you use.Which feature should you verify the antivirus product is up to date?()A、Enhanced Endpoint SecurityB、DP signaturesC、Antivirus licensingD、Endpoint Security Assessment Plug-in
考题
Which statement is correct about defining an Infranet Enforcer for use as a RADIUS Client? ()A、You do not need to configure a RADIUS client policy.B、You must know the exact model number of the Infranet Enforcer.C、You must specify the NACN password of the device in the RADIUS client policy.D、You do not need to designate a location group to which the Infranet Enforcer will belong.
考题
On a pre-existing OAC, which three options can the Infranet Controller overwrite when the useraccesses the Infranet Controller?()A、SSIDB、login nameC、MAC addressD、wired adaptersE、encryption method
考题
Your security policy requires that users authenticating to the Junos Pulse Access Control Service are connecting from a domain member endpoint on the internal corporate network.Which set of role access restrictions must you configure to enforce this security policy?()A、Source IP and browserB、Source IP and certificateC、Certificate and Host CheckerD、Host Checker and source IP
考题
When the Infranet Enforcer is set up in transparent mode, which additional resource policy must be configured to use OAC for IPsec enforcement? ()A、IPsec RoutingB、Access ControlC、IP Address PoolD、Source Interface
考题
What must be updated regularly to detect the newest versions of personal firewalls on endpoints? ()A、Infranet Enforcer firmwareB、Infranet Controller rollback softwareC、Host Security Assessment Plug-in (HSAP)D、Endpoint Security Assessment Plug-in (ESAP)
考题
What will serve as a RADIUS Client to the Infranet Controller for 802.1x authentication? ()A、an ACE serverB、a wireless networkC、an Ethernet switchD、Odyssey Access Client
考题
You administer a network containing SRX Series firewalls. New policy requires that you implement MAG Series devices to provide access control for end users. The policy requires that the SRX Series devices dynamically enforce security policy based on the source IP address of the user. The policy also requires that the users communicate with protected resources using encrypted traffic. Which two statements are true?()A、The endpoints can use agentless access.B、Encrypted traffic flows between the endpoint and the enforcer.C、Encrypted traffic flows between the endpoint and the protected resourceD、The endpoints can use the Odyssey Access Client.
考题
单选题() means the person designated by the Company for ensuring that a ship security assessment is carried out; that a ship security plan is developed, submitted for approval, and thereafter implemented and maintained and for liaison with port facility security officers and the ship security officer.A
Ship security officerB
Company security officerC
Port facility security officerD
PSC officer
考题
单选题Which statement is correct about defining an Infranet Enforcer for use as a RADIUS Client? ()A
You do not need to configure a RADIUS client policy.B
You must know the exact model number of the Infranet Enforcer.C
You must specify the NACN password of the device in the RADIUS client policy.D
You do not need to designate a location group to which the Infranet Enforcer will belong.
考题
单选题What is true about the operation of the Infranet Enforcer? ()A
It assigns users a set of roles.B
It allows access based on auth table entries.C
It verifies whether an endpoint meets security requirements.D
It configures the UAC agent to allow or deny access to resources.
考题
单选题Which of the following wireless service components occur in the implement phase?()A
project kickoff,staging,systems acceptance testing,ongoing support handoff meetingB
wlan change management,security administration,technology assessment,operations planC
security assessment,operations assessment,supplier managementD
operations readiness assessment,systems requirements validation,planning project kickoff,service assurance
考题
单选题What must be updated regularly to detect the newest versions of personal firewalls on endpoints? ()A
Infranet Enforcer firmwareB
Infranet Controller rollback softwareC
Host Security Assessment Plug-in (HSAP)D
Endpoint Security Assessment Plug-in (ESAP)
考题
单选题What is a primary objective of the security architecture assessment? ()A
document power and UPS availabilityB
to integrate routing and switching componentsC
create a design specification documentD
document the customer's current and future technology projects
考题
单选题The ship security assessment is an essential and integral part of the process of developing and updating()A
the ship security planB
the company security planC
the port security planD
the national security plan
考题
单选题You want to create a Host Checker policy that looks for a specific antivirus product that is running on your client machines, but the predefined antivirus options do not include the antivirus product version that you use.Which feature should you verify the antivirus product is up to date?()A
Enhanced Endpoint SecurityB
DP signaturesC
Antivirus licensingD
Endpoint Security Assessment Plug-in
考题
单选题When the Infranet Enforcer is set up in transparent mode, which additional resource policy must be configured to use OAC for IPsec enforcement? ()A
IPsec RoutingB
Access ControlC
IP Address PoolD
Source Interface
考题
多选题On a pre-existing OAC, which three options can the Infranet Controller overwrite when the useraccesses the Infranet Controller?()ASSIDBlogin nameCMAC addressDwired adaptersEencryption method
考题
单选题You are configuring an active/passive cluster of SRX Series devices as the firewall enforcer on a MAG Series device.Which statement is true?()A
Multiple Infranet Enforcer instances are created with a single serial number of an SRX Series device defined in each configuration.B
A single Infranet Enforcer instance is created with both serial numbers of the clustered SRX Series devices defined in the configuration.C
Multiple Infranet Enforcer instances are created with a single IP address of an SRX Series device defined in each configuration.D
A single Infranet enforcer instance is created with the VIP of the clustered SRX Series device defined in the configuration.
热门标签
最新试卷