题目详情
当前位置:首页 > 职业培训考试
题目详情:
发布时间:2023-12-02 05:45:53

[单项选择]You are configuring captive portal on your SRX Series device for guest user access.When would you use the redirect-traffic all command?()
A. When you want all unauthenticated traffic to be redirected
B. When you want all clear text traffic to be redirected.
C. When you want all authenticated traffic to be redirected.
D. When you want all encrypted traffic to be redirected.

更多"You are configuring captive portal "的相关试题:

[单项选择]You have an SRX Series Layer 2 enforcer providing 802.1X authentication for connected endpoints. Your security policy requires that users who fail their authentication be placed in a specific VLAN.On the Layer 2 enforcer, at the [edit protocols dot1x authenticator interface] hierarchy for each participating interface, what provides this functionality?()
A. guest-vlan
B. auth-fail-vlan
C. server-reject-vlan
D. server-fail-vlan
[多项选择] You administer a network containing SRX Series firewalls. New policy requires that you implement MAG Series devices to provide access control for end users. The policy requires that the SRX Series devices dynamically enforce security policy based on the source IP address of the user. The policy also requires that the users communicate with protected resources using encrypted traffic. Which two statements are true?()
A. The endpoints can use agentless access.
B. Encrypted traffic flows between the endpoint and the enforcer.
C. Encrypted traffic flows between the endpoint and the protected resource
D. The endpoints can use the Odyssey Access Client.
[多项选择]You are configuring an SRX210 as a firewall enforcer that will tunnel IPsec traffic from several Junos Pulse users.Which two parameters must you configure on the SRX210?()
A. access profile
B. IKE parameters
C. tunneled interface
D. redirect policy
[单项选择] You have created a security policy on an SRX240 that permits traffic from any source-address, any destination-address, and any application. The policy will be a source IP policy for use with the Junos Pulse Access Control Service. What must you add to complete the security policy configuration?()
A. The intranet-auth authentication option
B. The redirect-portal application service
C. The uac-policy application service
D. The ipsec-vpn tunnel
[多项选择]You want to create a security policy on an SRX240 that redirects unauthenticated users back to the Junos Pulse Access Control Service.Which two steps must you take to accomplish this task?()
A. Configure a captive-portal service that redirects all traffic back to the Junos Pulse Access Control Service.
B. Configure a security policy that references the unified-access-control captive-portal service.
C. Configure a captive-portal service that redirects unauthenticated traffic back to the Junos Pulse Access Control Service.
D. Configure a security policy that references the unified-access-control intranet-controller service.
[单项选择]Your company has an active directory domain. A server named server1 runs the network access policy server role. You need to disable IPv6 for all connections except for the tunnel interface and the IPv6 loopback interface. What should you do?()
A. Run the netsh ras ipv6 set command.
B. Run the netsh interface ipv6 delete command.
C. Run ipv6.exe and remove the ipv6 protocol.
D. From the local area connection properties, uncheck internet protocol versions 6 (TCP/IPv6).
[单项选择]You are deploying a Junos Pulse Access Control Service cluster in active/passive mode. How do you configure the IP address on the SRX Series devices?()
A. Configure a single Junos Pulse Access Control Service instance on the enforcer, specifying the VIP as the IP address the instance.
B. Configure multiple Junos Pulse Access Control Service instances on the enforcer, specifying the specific IP address each device in a separate instance.
C. Configure a single Junos Pulse Access Control Service instance on the enforcer, specifying the VIP and active node address in the instance.
D. Configure a single Junos Pulse Access Control Service instance on the enforcer, specifying the VIP and passive node address in the instance.
[单项选择] You have a domain controller that runs Windows Server 2003 Service Pack 2 (SP2). You need to prestage 1,000 computer accounts. Which tool should you use? ()
A. Compmgmt.msc
B. Dsadd.exe
C. Dsmove.exe
D. Sysdm.cpl
[单项选择]You install WSUS on a server that runs windows server 2008. You need to ensure that the traffic between the WSUS administrative web site and the server administrators computer is encrypted what should you do?()
A. Configure SSL encryption on the WSUS server website.
B. Run the netdom trust /SecurePasswordPrompt command on the WSUS server.
C. Configure the NTFS permissions on the content directory to deny Full control permission to the everyone group.
D. Configure the WSUS serve to require integrated windows authentication (WA) hen users connect to the WSUS serve.
[单项选择]You perform a security audit on a server named server1. You install the Microsoft network monitor 3.0 application on server1. You find that only some of the captured frames dsplay host mnemonic names in the source column and the destination column. All other frames display ip addresses. You need to display mnemonic host names instead of ip addresses for all the frames what should you do?()
A. Create a new display filter and apply the filter to the capture.
B. Create a new capture filter and apply the filter to the capture.
C. Populate the aliases table and apply the aliases to the capture.
D. Configure the network monitor application to enable the enable converstations option, recapture the data to a new file.
[单项选择]You perform a security audit on a server named Server1. You install the Microsoft Network Monitor 3.0 application on Server1.You find that only some of the captured frames display host mnemonic names in the Source column and the Destination column. All other frames display IP addresses.You need to display mnemonic host names instead of IP addresses for all the frames.What should you do?()
A. Create a new display filter and apply the filter to the capture.
B. Create a new capture filter and apply the filter to the capture.
C. Populate the Aliases table and apply the aliases to the capture.
D. Configure the Network Monitor application to enable the Enable Conversations option. Recapture the data to a new file.
[单项选择]You should check your answers after you finish the paper.
[单项选择]You should check your answers when you finish the paper.
[单项选择]When you are at your()end,you should not lose your head.
A. wit's
B. wit
C. wits'
D. wits's
[单项选择]You completed your Java procedure for your external Java function activity, and you now want todeploy this to your server. What would you do to deploy the Java procedure?()
A. take the Java sources (.java) files and include them in your $APPL_TOP
B. take the Java sources (.java) files and include them in your CLASSPATH
C. take the Java classes (.class) files and include them in your $APPL_TOP
D. take the Java classes (.class) files and include them in your CLASSPATH
[单项选择]You completed your workflow definition. You want to save a copy of the definition to the file system for source control purposes. How does Oracle Workflow Builder save that file?()
A. as a flat file
B. as a BPEL-compiled definition
C. as an XML file with an associated document type definition (DTD)
D. as an XML file without an associated document type definition (DTD)

我来回答:

购买搜题卡查看答案
[会员特权] 开通VIP, 查看 全部题目答案
[会员特权] 享免全部广告特权
推荐91天
¥36.8
¥80元
31天
¥20.8
¥40元
365天
¥88.8
¥188元
请选择支付方式
  • 微信支付
  • 支付宝支付
点击支付即表示同意并接受了《购买须知》
立即支付 系统将自动为您注册账号
请使用微信扫码支付

订单号:

请不要关闭本页面,支付完成后请点击【支付完成】按钮
恭喜您,购买搜题卡成功
重要提示:请拍照或截图保存账号密码!
我要搜题网官网:https://www.woyaosouti.com
我已记住账号密码