网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
You want to customize access to the corporate network so that agentiess users are instructed to obtain a certificatebefore accessing the network.Which two configurations solve this problem? ()
- A、Create a custom sign-in page with specific instructions in the "Instructions" field.
- B、Create a custom sign-in page with specific "Missing Certificate" messages in the "Custom error messages" field.
- C、Create a custom sign-in policy with specific instructions in the "Instructions" field.
- D、Create a custom sign-in notification and assign it to the "Pre-Auth Sign-in Notification" in the sign-in policy.
参考答案
更多 “You want to customize access to the corporate network so that agentiess users are instructed to obtain a certificatebefore accessing the network.Which two configurations solve this problem? ()A、Create a custom sign-in page with specific instructions in the "Instructions" field.B、Create a custom sign-in page with specific "Missing Certificate" messages in the "Custom error messages" field.C、Create a custom sign-in policy with specific instructions in the "Instructions" field.D、Create a custom sign-in notification and assign it to the "Pre-Auth Sign-in Notification" in the sign-in policy.” 相关考题
考题
You create a Web application for your company‘s intranet. You want to enable users to customize their versions of the intranet home page. You create sections of content as Web Parts. You need to ensure that users can customize content at any time.Which two code segments should you use?()A.B.C.D.
考题
You are configuring captive portal on your SRX Series device for guest user access.When would you use the redirect-traffic all command?()
A. When you want all unauthenticated traffic to be redirectedB. When you want all clear text traffic to be redirected.C. When you want all authenticated traffic to be redirected.D. When you want all encrypted traffic to be redirected.
考题
You are receiving reports of possible unauthorized access to resources protected by a firewall enforcer running the Junos OS. You want to verity which users are currently accessing resources through the enforcer.Which command should you use to verify user access on the enforcer?()A. show services unified-access-control authentication-tableB. show auth tableC. show services unified-access-control policiesD. show services unified-access-control captive-portal
考题
You are a technician at TestKing. Your assistant applied an IP access control list to Router TK1. You want to check the placement and direction of the access control list.Which command should you use?()A. show access-listB. show ip access-listC. show ip interfaceD. show interfaceE. show interface list
考题
You are securing a network for TestKing and want to apply an ACL (access control list) to an interface of a router. Which one of the following commands would you use?()
A. permit access-list 101 outB. ip access-group 101 outC. apply access-list 101 outD. access-class 101 outE. ip access-list e0 out
考题
Which statement about access lists that are applied to an interface is true?()
A.you can apply multiple access lists with the same protocol or in different…B.you can config one access list,per direction,per layer 3 protocolC.you can placeasmanyaccess lists as you want on any interfaceD.you can apply ony one access list on any interface
考题
You want subclasses in any package to have access to members of a superclass. Which is the mostrestrictive access modifier that will accomplish this objective?() A、 PublicB、 PrivateC、 ProtectedD、 TransientE、 No access modifier is qualified
考题
You are securing a network for TestKing and want to apply an ACL (access control list) to an interface of a router. Which one of the following commands would you use?()A、permit access-list 101 outB、ip access-group 101 outC、apply access-list 101 outD、access-class 101 outE、ip access-list e0 out
考题
Which statement about access lists that are applied to an interface is true?()A、you can apply multiple access lists with the same protocol or in different direction.B、you can config one access list,per direction,per layer 3 protocolC、you can place as many access lists as you want on any interfaceD、you can apply only one access list on any interface
考题
You are a technician at TestKing. Your assistant applied an IP access control list to Router TK1. You want to check the placement and direction of the access control list.Which command should you use?()A、show access-listB、show ip access-listC、show ip interfaceD、show interfaceE、show interface list
考题
Which statement about access lists that are applied to an interface is true?()A、you can apply multiple access lists with the same protocol or in different…B、you can config one access list,per direction,per layer 3 protocolC、you can placeasmanyaccess lists as you want on any interfaceD、you can apply ony one access list on any interface
考题
Which statement about access lists that are applied to an interface is true?()A、you can apply multiple access lists with the same protocol or in different…B、you can config one access list,per direction,per layer 3 protocolC、you can place as many access lists as you want on any interfaceD、you can apply ony one access list on any interface
考题
You want to limit access to a method of a public class to members of the same class. Which access accomplishes this objective?() A、 publicB、 privateC、 protectedD、 transientE、 default access
考题
You want subclasses in any package to have access to members of a superclass. Which is the most restrictive access that accomplishes this objective?() A、 publicB、 privateC、 protectedD、 transientE、 default access
考题
You have a combined Windows 2000 and Windows 98 network that contain sensitive data. You want to utilize as many new Windows 2000 security features as possible. You want to customize a security policy on each computer to ensure that data is kept confidential and secured. Allcomputers must still be able to communicate with each other over the network. What should you do?()A、Use the security configuration and analysis console to improve the HISECWS security template file.B、Use the local computer policy to disable the access this computer from the network option.C、Use SECEDIT to reconfigure the computer default security settings to not allow anonymous access to the computer.D、Create a policy that excludes write access to the windows 2000 computers then apply the policy to all non-windows 2000 computers.E、None of the above, Windows 9X systems cannot be secured using security template files.
考题
You want a class to have access to members of another class in the same package. Which is the most restrictive access modifier that will accomplish that will accomplish this objective?()A、 PublicB、 PrivateC、 ProtectedD、 TransientE、 No access modifier is required.
考题
单选题You are configuring captive portal on your SRX Series device for guest user access.When would you use the redirect-traffic all command?()A
When you want all unauthenticated traffic to be redirectedB
When you want all clear text traffic to be redirected.C
When you want all authenticated traffic to be redirected.D
When you want all encrypted traffic to be redirected.
考题
单选题A policy-based IPsec VPN is ideal for which scenario?()A
when you want to conserve tunnel resourcesB
when the remote peer is a dialup or remote access clientC
when you want to configure a tunnel policy with an action of denyD
when a dynamic routing protocol such as OSPF must be sent across the VPN
考题
单选题You want subclasses in any package to have access to members of a superclass. Which is the most restrictive access modifier that will accomplish this objective?()A
PublicB
PrivateC
ProtectedD
TransientE
No access modifier is qualified.
考题
单选题You want to limit access to a method of a public class to members of the same class. Which access accomplishes this objective?()A
publicB
privateC
protectedD
transientE
default access
考题
单选题You are using Windows 2000 Professional on your desktop computer. You are working on the company’s financial report and you want other users on the network to able to modify your documents for the report. You want users to share the financial report folder on the network. Because the network contains confidential information you want to prevent users from the enabling off line access for the network share that contains the financial report. What should you do?()A
Use Windows Explorer to receive the offline filesB
Using the Windows Explorer, disable the cache for the reports on the network shareC
Use the Windows NT explorer to grant the special access for the reports on the network shareD
Use the synchronization manager to configure synchronization not to occur when users are connected to the LAN connection.
考题
单选题You are receiving reports of possible unauthorized access to resources protected by a firewall enforcer running the Junos OS. You want to verity which users are currently accessing resources through the enforcer.Which command should you use to verify user access on the enforcer?()A
show services unified-access-control authentication-tableB
show auth tableC
show services unified-access-control policiesD
show services unified-access-control captive-portal
考题
单选题You are a technician at TestKing. Your assistant applied an IP access control list to Router TK1. You want to check the placement and direction of the access control list.Which command should you use?()A
show access-listB
show ip access-listC
show ip interfaceD
show interfaceE
show interface list
考题
单选题You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains Windows Server 2003 file servers. The network also contains a Windows Server 2003 computer named Server1 that runs Routing and Remote Access and Internet Authentication Service (IAS). Server1 provides VPN access to the network for users’ home computers. You suspect that an external unauthorized user is attempting to access the network through Server1. You want to log the details of access attempts by VPN users when they attempt to access the network. You want to compare the IP addresses of users’ home computers with the IP addresses used in the access attempts to verify that the users are authorized. You need to configure Server1 to log the details of access attempts by VPN users. What should you do? ()A
Configure the system event log to Do not overwrite.B
In IAS, in Remote Access Logging, enable the Authentication requests setting.C
Configure the Remote Access server to Log all events.D
Create a custom remote access policy and configure it for Authentication-Type.
考题
单选题You want a class to have access to members of another class in the same package. Which is the most restrictive access modifier that will accomplish that will accomplish this objective?()A
PublicB
PrivateC
ProtectedD
TransientE
No access modifier is required.
考题
单选题You want subclasses in any package to have access to members of a superclass. Which is the most restrictive access that accomplishes this objective?()A
publicB
privateC
protectedD
transientE
default access
考题
单选题You are securing a network for TestKing and want to apply an ACL (access control list) to an interface of a router. Which one of the following commands would you use?()A
permit access-list 101 outB
ip access-group 101 outC
apply access-list 101 outD
access-class 101 outE
ip access-list e0 out
考题
单选题You want a class to have access to members of another class in the same package. Which is the most restrictive access that accomplishes this objective?()A
publicB
privateC
protectedD
transientE
default access
热门标签
最新试卷