更多"You are configuring captive portal "的相关试题:
[单项选择]You have an SRX Series Layer 2 enforcer providing 802.1X authentication for connected endpoints. Your security policy requires that users who fail their authentication be placed in a specific VLAN.On the Layer 2 enforcer, at the [edit protocols dot1x authenticator interface] hierarchy for each participating interface, what provides this functionality?()
A. guest-vlan
B. auth-fail-vlan
C. server-reject-vlan
D. server-fail-vlan
[多项选择] You administer a network containing SRX Series firewalls. New policy requires that you implement MAG Series devices to provide access control for end users. The policy requires that the SRX Series devices dynamically enforce security policy based on the source IP address of the user. The policy also requires that the users communicate with protected resources using encrypted traffic. Which two statements are true?()
A. The endpoints can use agentless access.
B. Encrypted traffic flows between the endpoint and the enforcer.
C. Encrypted traffic flows between the endpoint and the protected resource
D. The endpoints can use the Odyssey Access Client.
[多项选择]You are configuring an SRX210 as a firewall enforcer that will tunnel IPsec traffic from several Junos Pulse users.Which two parameters must you configure on the SRX210?()
A. access profile
B. IKE parameters
C. tunneled interface
D. redirect policy
[单项选择] You have created a security policy on an SRX240 that permits traffic from any source-address, any destination-address, and any application. The policy will be a source IP policy for use with the Junos Pulse Access Control Service. What must you add to complete the security policy configuration?()
A. The intranet-auth authentication option
B. The redirect-portal application service
C. The uac-policy application service
D. The ipsec-vpn tunnel
[多项选择]You want to create a security policy on an SRX240 that redirects unauthenticated users back to the Junos Pulse Access Control Service.Which two steps must you take to accomplish this task?()
A. Configure a captive-portal service that redirects all traffic back to the Junos Pulse Access Control Service.
B. Configure a security policy that references the unified-access-control captive-portal service.
C. Configure a captive-portal service that redirects unauthenticated traffic back to the Junos Pulse Access Control Service.
D. Configure a security policy that references the unified-access-control intranet-controller service.
[单项选择]Your company has an active directory domain. A server named server1 runs the network access policy server role. You need to disable IPv6 for all connections except for the tunnel interface and the IPv6 loopback interface. What should you do?()
A. Run the netsh ras ipv6 set command.
B. Run the netsh interface ipv6 delete command.
C. Run ipv6.exe and remove the ipv6 protocol.
D. From the local area connection properties, uncheck internet protocol versions 6 (TCP/IPv6).
[单项选择]You are deploying a Junos Pulse Access Control Service cluster in active/passive mode. How do you configure the IP address on the SRX Series devices?()
A. Configure a single Junos Pulse Access Control Service instance on the enforcer, specifying the VIP as the IP address the instance.
B. Configure multiple Junos Pulse Access Control Service instances on the enforcer, specifying the specific IP address each device in a separate instance.
C. Configure a single Junos Pulse Access Control Service instance on the enforcer, specifying the VIP and active node address in the instance.
D. Configure a single Junos Pulse Access Control Service instance on the enforcer, specifying the VIP and passive node address in the instance.
[单项选择] You have a domain controller that runs Windows Server 2003 Service Pack 2 (SP2). You need to prestage 1,000 computer accounts. Which tool should you use? ()
A. Compmgmt.msc
B. Dsadd.exe
C. Dsmove.exe
D. Sysdm.cpl
[单项选择]You install WSUS on a server that runs windows server 2008. You need to ensure that the traffic between the WSUS administrative web site and the server administrators computer is encrypted what should you do?()
A. Configure SSL encryption on the WSUS server website.
B. Run the netdom trust /SecurePasswordPrompt command on the WSUS server.
C. Configure the NTFS permissions on the content directory to deny Full control permission to the everyone group.
D. Configure the WSUS serve to require integrated windows authentication (WA) hen users connect to the WSUS serve.
[单项选择]You perform a security audit on a server named server1. You install the Microsoft network monitor 3.0 application on server1. You find that only some of the captured frames dsplay host mnemonic names in the source column and the destination column. All other frames display ip addresses. You need to display mnemonic host names instead of ip addresses for all the frames what should you do?()
A. Create a new display filter and apply the filter to the capture.
B. Create a new capture filter and apply the filter to the capture.
C. Populate the aliases table and apply the aliases to the capture.
D. Configure the network monitor application to enable the enable converstations option, recapture the data to a new file.
[单项选择]You perform a security audit on a server named Server1. You install the Microsoft Network Monitor 3.0 application on Server1.You find that only some of the captured frames display host mnemonic names in the Source column and the Destination column. All other frames display IP addresses.You need to display mnemonic host names instead of IP addresses for all the frames.What should you do?()
A. Create a new display filter and apply the filter to the capture.
B. Create a new capture filter and apply the filter to the capture.
C. Populate the Aliases table and apply the aliases to the capture.
D. Configure the Network Monitor application to enable the Enable Conversations option. Recapture the data to a new file.
[单项选择]You should check your answers after you finish the paper.
[单项选择]You should check your answers when you finish the paper.
[单项选择]When you are at your()end,you should not lose your head.
A. wit's
B. wit
C. wits'
D. wits's
[单项选择]You completed your Java procedure for your external Java function activity, and you now want todeploy this to your server. What would you do to deploy the Java procedure?()
A. take the Java sources (.java) files and include them in your $APPL_TOP
B. take the Java sources (.java) files and include them in your CLASSPATH
C. take the Java classes (.class) files and include them in your $APPL_TOP
D. take the Java classes (.class) files and include them in your CLASSPATH
[单项选择]You completed your workflow definition. You want to save a copy of the definition to the file system for source control purposes. How does Oracle Workflow Builder save that file?()
A. as a flat file
B. as a BPEL-compiled definition
C. as an XML file with an associated document type definition (DTD)
D. as an XML file without an associated document type definition (DTD)