网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
What is the primary purpose of creating a Location Group Policy? ()
A

to associate more than one realm with an authentication server

B

to logically group network access devices and associate them with specific sign-in policies

C

to allow or prevent users from accessing resources in specific locations on the network

D

to define the URL that users of network access devices can use to access the Infranet Controller


参考答案

参考解析
解析: 暂无解析
更多 “单选题What is the primary purpose of creating a Location Group Policy? ()A to associate more than one realm with an authentication serverB to logically group network access devices and associate them with specific sign-in policiesC to allow or prevent users from accessing resources in specific locations on the networkD to define the URL that users of network access devices can use to access the Infranet Controller” 相关考题
考题 Your network contains a server that runs Windows Server 2008 R2. The server has the Network Policy and Access Services server role installed. You need to allow only members of a global group named Group1 VPN access to the network.What should you do? ()A. Add Group1 to the RAS and IAS Servers group.B. Add Group1 to the Network Configuration Operators group.C. Create a new network policy and define a group-based condition for Group1. Set the access permission of the policy to Access granted. Set the processing order of the policy to 1.D. Create a new network policy and define a group-based condition for Group1. Set the access permission of the policy to Access granted. Set the processing order of the policy to 3.

考题 A company has completed two acquisitions over the previous year. Each of the acquired companies was allowed to keep its own independent authentication server. The network administrator has been asked to roll out the Junos Pulse Access Control Service to users within the original company along with each of the two acquired organizations.The administrator configures three authentication realms, one for each independent authentication server, and associates them all with a single sign-in policy. All of the client endpoints are running Junos Pulse on their Windows XP desktops.When a user signs in to the Junos Pulse Access Control Service, which statement is correct?()A. The first authentication realm that was added to the sign-in policy is used by default.B. The user is allowed to choose the correct authentication realm from a list presented by Junos Pulse.C. When Junos Pulse is initially installed on the desktop, it must be configured with the correct realm.D. This is not an allowed configuration; the administrator should configure separate sign-in policies for each realm.

考题 What is the primary purpose of creating a Location Group Policy? () A. to associate more than one realm with an authentication serverB. to logically group network access devices and associate them with specific sign-in policiesC. to allow or prevent users from accessing resources in specific locations on the networkD. to define the URL that users of network access devices can use to access the Infranet Controller

考题 You configure a Group Policy Object for the Marketing organizational unit (OU) to prevent users from accessing My Network Places and from running System in Control Panel. You want the Managers domain local group to be able to access My Network Places, but you still want to prevent them from running System in Control Panel.What should you do?A.Add the managers group to the access control list of the GPO. Disable the permission of the managers group to read and apply the group policy.B.Add the managers group to the access control list of the GPO. Deny the permission of the managers group to read and apply the group policy.C.Create a second GPO in the OU. Add the managers group to the access control list. Allow the managers group to apply the group policy. Deny the authenticated users group permission to read and apply group policy. Configure the new GPO to deny the ability to run System in Control Panel. Give the original GPO a higher priority than the new GPO.D.Create a second GPO in the OU. Add the managers group to the access control list. Allow the managers group to read and apply the group policy. Disable the permission of the authenticated user group to read and apply the group policy. Configure the new GPO to allow access to My Network Places. Give the new GPO a higher priority than the original GPO.

考题 What are three valid reasons to assign ports on VLANs on a switch?() A. to make VTP easier to implementB. to isolate broadcast trafficC. to increase the size of the collision domainD. to allow more devices to connect to the networkE. to logically group hosts according to functionF. to increase network security

考题 What are two steps to configure user authentication for a Junos Pulse Access Control Service?()A、Configure an authentication policy as part of the user role definitions.B、Configure a Sign-in Policy.C、Configure authentication agents as part of the user role definitionsD、Configure an authentication policy as part of the authentication realm definition.

考题 What are three valid reasons to assign ports to VLANs on a switch? ()A、to make VTP easier to implementB、to isolate broadcast trafficC、to increase the size of the collision domainD、to allow more devices to connect to the networkE、to logically group hosts according to functionF、to increase network security

考题 What is the primary purpose of creating a Location Group Policy? ()A、to associate more than one realm with an authentication serverB、to logically group network access devices and associate them with specific sign-in policiesC、to allow or prevent users from accessing resources in specific locations on the networkD、to define the URL that users of network access devices can use to access the Infranet Controller

考题 You are the network administrator for your company. Your network consists of a single Active   Directory domain. Three security groups named Accountants, Processors, and Management are located in an organizational unit (OU) named Accounting. All of the user accounts that belong to these three  groups are also in the Accounting OU. You create a Group Policy object (GPO) and link it to the  Accounting OU. You configure the GPO to disable the display options under the User Configuration  section of the GPO. You need to achieve the following goals: You need to ensure that the GPO applies to  all user accounts that are members of the Processors group. You need to prevent the GPO fromapplying  to any user account that is a member of the Accountants group. You need to prevent the GPO from  applying to any user account that is a member of the Management group, unless the user account is also  a member of the Processors group. What should you do?()A、 Modify the discretionary access control list (DACL) settings of the GPO to assign the Accountants and Management security groups the Deny - Read and the Deny - Apply Group Policy permissions. Modify the DACL of the GPO to assign the users who are in both the Accountants and Management security groups the Allow - Read and the Allow - Apply Group Policy permissions.B、 Modify the discretionary access control list (DACL) settings of the GPO to assign the Accountants and Management security groups the Deny - Read and the Deny - Apply Group Policy permissions. Create a new security group named Mixed that contains all the user accounts from the Processors group and the specific user accounts from the Management group to which you want the GPO to apply. Modify the DACL of the GPO to assign the Mixed security group the Allow - Read and the Allow - Apply Group Policy permissions.C、 Modify the discretionary access control list (DACL) settings of the GPO to assign the Accountants security group the Deny - Read and the Deny - Apply Group Policy permissions. Modify the DACL settings of the GPO to remove the Authenticated Users special group. Modify the DACL settings of the GPO to add the Processors group and assign the Allow - Read and the Allow - Apply Group Policy permissions.D、 Modify the discretionary access control list (DACL) settings of the GPO to assign the Accountants security group the Deny - Read and the Allow - Apply Group Policy permissions. Modify the DACL settings of the GPO to assign the Management security group the Deny - Read and the Deny - Apply Group Policy permissions.

考题 Your company has Active Directory Certificate Services (AD CS) and Network Access Protection (NAP) deployed on the network.You need to ensure that NAP policies are enforced on portable computers that use a wireless connection to access the network.  What should you do?()A、Configure all access points to use 802.1X authentication.B、Configure all portable computers to use MS-CHAP v2 authentication.C、Use the Group Policy Management Console to access the wireless Group Policy settings, and enable the Prevent connections to ad-hoc networks option.D、Use the Group Policy Management Console to access the wireless Group Policy settings, and disable the Prevent connections to infrastructure networks option.

考题 our network contains a server that runs window server 2008. The serve has the network policy server(NPS) service role installed. You need to allow only members of a global group named group1 VPN access to the network. What should you do?()A、Add group1 to the RAS and IAS servers group.B、Add group1 to the network configuration operators group..C、Create a new network policy and define a group-based connection for group1. Set the access permission of the policy to access granted. Set the processing order of the policy to 1.D、Create a new network policy and define a group-based condition for group1. Set the access permission of the policy to acces granted. Set the processing of the policy to 3.

考题 Your network contains a server that runs Windows Server 2008 R2. The server has the Network Policy and Access Services server role installed. You need to allow only members of a global group named Group1 VPN access to the network. What should you do? ()A、Add Group1 to the RAS and IAS Servers group.B、Add Group1 to the Network Configuration Operators group.C、Create a new network policy and define a group-based condition for Group1. Set the access permission of the policy to Access granted. Set the processing order of the policy to 1.D、Create a new network policy and define a group-based condition for Group1. Set the access permission of the policy to Access granted. Set the processing order of the policy to 3.

考题 You have a computer that runs Windows 7. Multiple users log on to the computer. The computer has fiveremovable devices. You need to ensure that users can only access removable  devices that have beenpreviously installed on the computer.  What should you modify in the Local Group Policy ?()A、Enable the Prevent redirection of USB devices setting.B、Enable the Prevent installation of removable devices setting.C、Disable the WPD Devices: Deny read access setting.D、Disable the Allow administrators to override Device Installation Restriction policies setting.

考题 Your network contains a server that runs Windows Server 2008. The server has the Network Policy Server (NPS) service role installed. You need to allow only members of a global group named Group1 VPN access to the network. What should you do?()A、Add Group1 to the RAS and IAS Servers GroupB、Add Group1 to the Network Configuration Operators groupC、Create a new network policy and define a group-based connection for Group1. Set the access permission of the policy to Access granted. Set the processing order of the policy to 1D、Create a new network policy and define a group-based condition for Group1. Set the access permission of the policy to Access Granted. Set the processing of the policy to 3.

考题 You are designing a Windows Azure application.   The application will store data in Windows Azure Blob storage.  Many of the application services will be interdependent.   You need to recommend an approach for optimizing the performance of the application.  What should you recommend? ()A、 Create one affinity group.  Associate only the storage services with the affinity group.B、 Create one affinity group.  Associate only the compute services with the affinity group.C、 Create one affinity group.  Associate the compute services and storage services with the affinity group.D、 Create two affinity groups.  Associate the compute services with one group and the storage services with the other group.

考题 Your company has active directory certificate services (AD CS) and network access protection (NAP) deployed on the network. You need to ensure that NAP policies are enforced on portable computers that use a wireless connection to access the network. What should you do?()A、Configure all access points to use 802.1x authentication.B、Configure all protable computers to use MS-CHAP v2 authentication.C、Use the group policy management console to access the wireless group policy settings, and enable the prevent connections to ad-hoc network option.D、Use the group policy management console to access the wireless group policy settings, and disable the prevent connections to infrastructure networks option.

考题 单选题Your network contains a server that runs Windows Server 2008. The server has the Network Policy Server (NPS) service role installed. You need to allow only members of a global group named Group1 VPN access to the network. What should you do?()A Add Group1 to the RAS and IAS Servers GroupB Add Group1 to the Network Configuration Operators groupC Create a new network policy and define a group-based connection for Group1. Set the access permission of the policy to Access granted. Set the processing order of the policy to 1D Create a new network policy and define a group-based condition for Group1. Set the access permission of the policy to Access Granted. Set the processing of the policy to 3.

考题 单选题You are designing a Windows Azure application.   The application will store data in Windows Azure Blob storage.  Many of the application services will be interdependent.   You need to recommend an approach for optimizing the performance of the application.  What should you recommend? ()A  Create one affinity group.  Associate only the storage services with the affinity group.B  Create one affinity group.  Associate only the compute services with the affinity group.C  Create one affinity group.  Associate the compute services and storage services with the affinity group.D  Create two affinity groups.  Associate the compute services with one group and the storage services with the other group.

考题 多选题What are three valid reasons to assign ports to VLANs on a switch?()Ato make VTP easier to implementBto isolate broadcast trafficCto increase the size of the collision domainDto allow more devices to connect to the networkEto logically group hosts according to functionFto increase network security

考题 单选题A company has completed two acquisitions over the previous year. Each of the acquired companies was allowed to keep its own independent authentication server. The network administrator has been asked to roll out the Junos Pulse Access Control Service to users within the original company along with each of the two acquired organizations.The administrator configures three authentication realms, one for each independent authentication server, and associates them all with a single sign-in policy. All of the client endpoints are running Junos Pulse on their Windows XP desktops. When a user signs in to the Junos Pulse Access Control Service, which statement is correct?()A The first authentication realm that was added to the sign-in policy is used by default.B The user is allowed to choose the correct authentication realm from a list presented by Junos Pulse.C When Junos Pulse is initially installed on the desktop, it must be configured with the correct realm.D This is not an allowed configuration; the administrator should configure separate sign-in policies for each realm.

考题 单选题What is the primary purpose of creating a Location Group Policy? ()A to associate more than one realm with an authentication serverB to logically group network access devices and associate them with specific sign-in policiesC to allow or prevent users from accessing resources in specific locations on the networkD to define the URL that users of network access devices can use to access the Infranet Controller

考题 单选题Your network contains a server that runs Windows Server 2008 R2. The server has the Network Policy and Access Services server role installed. You need to allow only members of a global group named Group1 VPN access to the network. What should you do? ()A Add Group1 to the RAS and IAS Servers group.B Add Group1 to the Network Configuration Operators group.C Create a new network policy and define a group-based condition for Group1. Set the access permission of the policy to Access granted. Set the processing order of the policy to 1.D Create a new network policy and define a group-based condition for Group1. Set the access permission of the policy to Access granted. Set the processing order of the policy to 3.

考题 单选题You have a computer that runs Windows 7. Multiple users log on to the computer. The computer has fiveremovable devices. You need to ensure that users can only access removable  devices that have beenpreviously installed on the computer.  What should you modify in the Local Group Policy ?()A Enable the Prevent redirection of USB devices setting.B Enable the Prevent installation of removable devices setting.C Disable the WPD Devices: Deny read access setting.D Disable the Allow administrators to override Device Installation Restriction policies setting.

考题 单选题Your company has Active Directory Certificate Services (AD CS) and Network Access Protection (NAP) deployed on the network.You need to ensure that NAP policies are enforced on portable computers that use a wireless connection to access the network.  What should you do?()A Configure all access points to use 802.1X authentication.B Configure all portable computers to use MS-CHAP v2 authentication.C Use the Group Policy Management Console to access the wireless Group Policy settings, and enable the Prevent connections to ad-hoc networks option.D Use the Group Policy Management Console to access the wireless Group Policy settings, and disable the Prevent connections to infrastructure networks option.

考题 单选题our network contains a server that runs window server 2008. The serve has the network policy server(NPS) service role installed. You need to allow only members of a global group named group1 VPN access to the network. What should you do?()A Add group1 to the RAS and IAS servers group.B Add group1 to the network configuration operators group..C Create a new network policy and define a group-based connection for group1. Set the access permission of the policy to access granted. Set the processing order of the policy to 1.D Create a new network policy and define a group-based condition for group1. Set the access permission of the policy to acces granted. Set the processing of the policy to 3.

考题 单选题Your company has active directory certificate services (AD CS) and network access protection (NAP) deployed on the network. You need to ensure that NAP policies are enforced on portable computers that use a wireless connection to access the network. What should you do?()A Configure all access points to use 802.1x authentication.B Configure all protable computers to use MS-CHAP v2 authentication.C Use the group policy management console to access the wireless group policy settings, and enable the prevent connections to ad-hoc network option.D Use the group policy management console to access the wireless group policy settings, and disable the prevent connections to infrastructure networks option.

考题 单选题You are the network administrator for your company. Your network consists of a single Active   Directory domain. Three security groups named Accountants, Processors, and Management are located in an organizational unit (OU) named Accounting. All of the user accounts that belong to these three  groups are also in the Accounting OU. You create a Group Policy object (GPO) and link it to the  Accounting OU. You configure the GPO to disable the display options under the User Configuration  section of the GPO. You need to achieve the following goals: You need to ensure that the GPO applies to  all user accounts that are members of the Processors group. You need to prevent the GPO fromapplying  to any user account that is a member of the Accountants group. You need to prevent the GPO from  applying to any user account that is a member of the Management group, unless the user account is also  a member of the Processors group. What should you do?()A  Modify the discretionary access control list (DACL) settings of the GPO to assign the Accountants and Management security groups the Deny - Read and the Deny - Apply Group Policy permissions. Modify the DACL of the GPO to assign the users who are in both the Accountants and Management security groups the Allow - Read and the Allow - Apply Group Policy permissions.B  Modify the discretionary access control list (DACL) settings of the GPO to assign the Accountants and Management security groups the Deny - Read and the Deny - Apply Group Policy permissions. Create a new security group named Mixed that contains all the user accounts from the Processors group and the specific user accounts from the Management group to which you want the GPO to apply. Modify the DACL of the GPO to assign the Mixed security group the Allow - Read and the Allow - Apply Group Policy permissions.C  Modify the discretionary access control list (DACL) settings of the GPO to assign the Accountants security group the Deny - Read and the Deny - Apply Group Policy permissions. Modify the DACL settings of the GPO to remove the Authenticated Users special group. Modify the DACL settings of the GPO to add the Processors group and assign the Allow - Read and the Allow - Apply Group Policy permissions.D  Modify the discretionary access control list (DACL) settings of the GPO to assign the Accountants security group the Deny - Read and the Allow - Apply Group Policy permissions. Modify the DACL settings of the GPO to assign the Management security group the Deny - Read and the Deny - Apply Group Policy permissions.

考题 单选题You are the administrator of a Junos Pulse Access Control Service implementation. You must restrict authenticated users connected from the branch offices to a few specific resources within the data center. However, when the authenticated users are connected at the corporate office, they are allowed more access to the data center resources. You have created two roles with different levels of access and are trying to determine the best way of controlling when a user is mapped to a specific role. Having the user prompted to manually select their role is possible, but you want to automate the process. Which configuration solves this problem?()A Implement a RADIUS request attribute policy to assist with realm selection and create different role-mapping rules for the user in each realm.B Implement a directory/attribute server on the realm and set up this server to determine by group membership the proper role to which a user should be mapped.C Reorder the role-mapping rules to allow for the more open role to be mapped first and then enable the stop processing rules when this rule matches function on this role.D Implement a Host Checker policy on the realm that determines the geographic location of the device and restricts the user based on the results of the policy.