题目内容 (请给出正确答案)
[主观题]

You want to enforce a Host Checker policy so that only users who pass the policy receive the Employee role. In the admin GUI, which two parameters must you configure?()

A. Select "Require and Enforce" for the Host Checker Policy in the realm authentication policy.

B. Select "Evaluate Policies" for the Host Checker policy in the realm authentication policy.

C. Configure the Host Checker policy as a role restriction for the Employee role.

D. Configure the Host Checker policy as a resource access policy for the Employee role.

查看答案
如搜索结果不匹配,请 联系老师 获取答案
您可能会需要:
您的账号:,可能会需要:
您的账号:
发送账号密码至手机
发送
更多“You want to enforce a Host Che…”相关的问题

第1题

Which three features are part of the branch SRX series UTM suite?() (Choose three.)

A. antispam

B. antivirus

C. IPS

D. application firewalling

E. Web filtering

点击查看答案

第2题

Intheconfigurationshownintheexhibit,youdecidedtoeliminatethejunos-ftpapplicationfromthemat

chconditionofthepolicyMyTraffic.[editsecuritypolicies]user@hostlshowfrom-zonePrivateto-zoneExternal{policyMyTraffic{match{source-addressmyHosts;destination-addressExtServers;application[junos-ftpjunos-bgp];}then{permit{tunnel{ipsec-vpnvpnTunnel;}}}}}policy-rematch;WhatwillhappentotheexistingFTPandBGPsessions?()

A.TheexistingFTPandBGPsessionswillcontinue.

B.TheexistingFTPandBGPsessionswillbere-evaluatedandonlyFTPsessionswillbedropped.

C.TheexistingFTPandBGPsessionswillbere-evaluatedandallsessionswillbedropped.

D.TheexistingFTPsessionswillcontinueandonlytheexistingBGPsessionswillbedropped.

点击查看答案

第3题

What are two TCP flag settings that are considered suspicious? ()(Choose two.)

A. Do-Not-Fragment flag is set.

B. Both SYN and FIN flags are set.

C. Both ACK and PSH flags are set.

D. FIN flag is set and ACK flag is not set.

点击查看答案

第4题

You have three classes of users on your network: employee, contractor, and IT administrato

r. You configure the Junos Pulse Access Control Service to assign roles to each user class and require that a specific wireless SSID be preconfigured for the Odyssey Access Client based on the role.Which configuration method should you use to satisfy this scenario?()

A. Create a "Settings Update file" in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under "User Roles" > "Agent" > "Odyssey Settings" > "Preconfigured Installer".

B. Configure a wired adapter and assign the required SSID under "User Roles" > "Agent" > "Odyssey Settings".

C. Create a script in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under "User Roles" > "Agent" > "Odyssey Settings" > "Preconfigured Installer".

D. Create a "Preconfiguration file" in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under "User Roles" > "Agent" > "Odyssey Settings" > "Preconfigured Installer".

点击查看答案

第5题

What are three necessary steps for enabling 802.1X access when configuring Layer 2 enforcement?()

A. Configure a location group

B. Createan authentication protocol set

C. Configure the RADIUS AV pair list

D. Configure RADIUS clients

E. Configure role and role-mapping rules

点击查看答案

第6题

The Junos OS blocks an HTTP request due to a Websense server response.Which form of Web filtering is being used?()

A. redirect Web filtering

B. integrated Web filtering

C. categorized Web filtering

D. local Web filtering

点击查看答案

第7题

Which two statements are true regarding redundancy groups? ()(Choose two.)

A. When priority settings are equal and the members participating in a cluster are initialized at the same time, the primary assigned to node 0.

B. The preempt option determines the primary and secondary roles for redundancy group 0 during a failure and recovery

C. Redundancy group 0 manages the control plane failover between the nodes of a cluster.

D. The primary role can be shared for redundancy group 0 when the active-active option is enabled.

点击查看答案

第8题

Giventheconfigurationshownintheexhibit,whichstatementistrueabouttrafficfromhost_atohost_b?

()[editsecuritypoliciesfrom-zoneHRto-zonetrust]user@hostshowpolicytwo{match{source-addresssubnet_a;destination-addresshost_b;application[junos-telnetjunos-ping];}then{reject;}}policyone{match{source-addresshost_a;destination-addresssubnet_b;applicationany;}then{permit;}}host_aisinsubnet_aandhost_bisinsubnet_b.

A.DNStrafficisdenied.

B.Telnettrafficisdenied.

C.SMTPtrafficisdenied.

D.Pingtrafficispermitted

点击查看答案

第9题

What are two components of the Junos software architecture? ()(Choose two.)

A. Linux kernel

B. routing protocol daemon

C. session-based forwarding module

D. separate routing and security planes

点击查看答案

第10题

On the Junos Pulse Access Control Service, you have created a role called Secret that you

only want to provide to users who present a certificate.Using the admin GUI, which two features would you configure to satisfy this requirement?()

A. Sign-in Policy

B. Role Mapping Rule

C. Role Restrictions

D. Trusted Server CA

点击查看答案
热门考试 全部 >
相关试卷 全部 >
账号:
你好,尊敬的上学吧用户
发送账号至手机
密码将被重置
获取验证码
发送
温馨提示
该问题答案仅针对搜题卡用户开放,请点击购买搜题卡。
马上购买搜题卡
我已购买搜题卡, 登录账号 继续查看答案
重置密码
确认修改
谢谢您的反馈

您认为本题答案有误,我们将认真、仔细核查,
如果您知道正确答案,欢迎您来纠错

警告:系统检测到您的账号存在安全风险

为了保护您的账号安全,请在“上学吧”公众号进行验证,点击“官网服务”-“账号验证”后输入验证码“”完成验证,验证成功后方可继续查看答案!

微信搜一搜
上学吧
点击打开微信
警告:系统检测到您的账号存在安全风险
抱歉,您的账号因涉嫌违反上学吧购买须知被冻结。您可在“上学吧”微信公众号中的“官网服务”-“账号解封申请”申请解封,或联系客服
微信搜一搜
上学吧
点击打开微信