网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

You want to create a security policy on an SRX240 that redirects unauthenticated users back to the Junos Pulse Access Control Service.Which two steps must you take to accomplish this task?()

  • A、Configure a captive-portal service that redirects all traffic back to the Junos Pulse Access Control Service.
  • B、Configure a security policy that references the unified-access-control captive-portal service.
  • C、Configure a captive-portal service that redirects unauthenticated traffic back to the Junos Pulse Access Control Service.
  • D、Configure a security policy that references the unified-access-control intranet-controller service.

参考答案

更多 “You want to create a security policy on an SRX240 that redirects unauthenticated users back to the Junos Pulse Access Control Service.Which two steps must you take to accomplish this task?()A、Configure a captive-portal service that redirects all traffic back to the Junos Pulse Access Control Service.B、Configure a security policy that references the unified-access-control captive-portal service.C、Configure a captive-portal service that redirects unauthenticated traffic back to the Junos Pulse Access Control Service.D、Configure a security policy that references the unified-access-control intranet-controller service.” 相关考题
考题 You create a Web application for your company‘s intranet. You want to enable users to customize their versions of the intranet home page. You create sections of content as Web Parts. You need to ensure that users can customize content at any time.Which two code segments should you use?()A.B.C.D.

考题 You are using Windows Communication Foundation (WCF) to create a service. You need to implement a custom message-level security binding element. Which binding element should you use?() A. Transport Security Binding ElementB. Https Transport Binding ElementC. Ssl Stream Secunty Binding ElementD. Windows Stream Security Binding Element

考题 You want to create a security policy allowing traffic from any host in the Trust zone to hostb.example.com (172.19.1.1) in the Untrust zone.How do you create this policy?() A. Specify the IP address (172.19.1.1/32) as the destination address in the policy.B. Specify the DNS entry (hostb.example.com) as the destination address in the policy.C. Create an address book entry in the Trust zone for the 172.19.1.1/32 prefix and reference this entry in the policy.D. Create an address book entry in the Untrust zone for the 172.19.1.1/32 prefix and reference this entry in the policy.

考题 You want to create a Host Checker policy that looks for a specific antivirus product that is running on your client machines, but the predefined antivirus options do not include the antivirus product version that you use.Which feature should you verify the antivirus product is up to date?()A. Enhanced Endpoint SecurityB. DP signaturesC. Antivirus licensingD. Endpoint Security Assessment Plug-in

考题 You need to design a method to deploy security configuration settings to servers. What should you do?()A、Run the Resultant Set of Policy wizard with a Windows Management Instrumentation (WMI) filter on each department’s Server OUB、Log on to each server and use local policy to configure and manage the security settingsC、Create a customer security template. Log on to a domain controller and run the seceditcommand to import the security templateD、Create a customer security template. Create a GPO and import the security template. Link the GPO to each department’s Server OU

考题 You need to design a method to standardize and deploy a baseline security configuration for servers. You solution must meet business requirements. What should you do?()A、Create a script that installs the Hisecdc.inf security templateB、Use a GPO to distribute and apply the Hisec.inf security templateC、Use the System Policy Editor to configure each server’s security settingsD、Use a GPO to distribute and apply a custom security template

考题 You want to create a new optimized database for your transactional production environment to be used by a financial application. While creating the database, you want the Oracle software to take care of all basic settings to optimize the database performance. Which method would you use to achieve this objective?()A、Use the CREATE DATABASE .. command to create the database with Oracle-managed files. B、Use the Database Configuration Assistant (DBCA) to create the database with Oracle-managed files. C、Use Enterprise Manager to create a new database with the Online Transaction Processing (OLTP) option. D、Use Database Configuration Assistant (DBCA) to create the database with Transaction Processing template. E、Use the CREATE DATABASE .. command to create the database with Automatic Storage Management (ASM) file system.

考题 You need to design an audit strategy for Southbridge Video. Your solution must meet business requirements.What should you do?()A、Create a new security template that enables the Audit account logon events policy for successful and failed attempts. Create a new GPO, and link it to the domain. Import the new security template into the new GPOB、Create a new security template that enables the Audit account logon events policy for successful and failed attempts. Create a new GPO, and link it to the Domain Controllers OU. Import the new security template into the new GPOC、Create a new security template that enables the Audit logon events policy for successful and failed attempts. Create a new GPO, and link it to the Domain Controllers OU. Import the new security template into the new GPOD、Create a new security template that enables the Audit logon events policy for successful and failed attempts. Create a new GPO, and link it to the domain. Import the new security template into the new GPO

考题 You are the network administrator for Blue Yonder Airlines. You plan to create an Active Directory domain named blueyonderairlines.com that will have a functional level of Windows Server 2003.  Your company has one main office and four branch offices, which are all located in one country. A central security department in the main office is responsible for creating and administering all user accounts in all offices. Each office has a local help desk department that is responsible for resetting passwordswithin the individual department’s office only.  All user accounts are located in the default Users container.  You need to create an organizational unit (OU) structure to support the delegation of authority requirements. You want to minimize the amount of administrative effort required to maintain the environment.  What should you do?()A、 Create a top­level OU named BlueYonderAirlines_Users under the blueyonderairlines.com domain. Create a separate child OU for each office under BlueYonderAirlines_Users. Move the user accounts of all employees in each office to the child OU for that office.B、 Create a top­level OU named Main_Office under the blueyonderairlines.com domain. Move the user accounts of all users in the main office to the Main_Office OU.Create a separate child OU for each branch office under the Main_Office OU. Move the user accounts of all users in each branch office to the child OU for that office.C、 Create a top­level OU named BlueYonderAirlines_Users under the blueyonderairlines.com domain. Create a child OU named Central_Security under BlueYonderAirlines_Users. Move the user accounts of the central security department users to the Central_Security OU.Create a child OU named Help_Desk under BlueYonderAirlines_Users. Move the user accounts of the help desk users to the Help_Desk OU.D、 Create a top­level OU named BlueYonderAirlines_Users under the blueyonderairlines.com domain. Create a child OU named Central_Security under BlueYonderAirlines_Users. Move the user accounts of the central security department users to the Central_Security OU.Create a separate child OU under BlueYonderAirlines_Users for each office. Move the user accounts of the help desk users in each office to the child OU for that office.

考题 You are the administrator of your company's network. You want to configure a Security Policy for the Windows 2000 Professional Computers that are in the sales department.   On one of the computers, you use Security Templates to configure the Security Policy based on the desired security settings. You then export those settings to an .inf file that will be used on all of the Computers in the sales department. You want to configure each Computer to have a customized Security Policy. What steps should you follow in order to achieve your goal?()A、Use Secedit.exe to import the security settings from the .inf file to the computers in the sales department.B、Use a text editor to change the default security settings to the desired security settings. Then export those settings to the Computers in the sales department.C、Create an organizational unit (OU) named Sales. Add the users in the sales department to the Sales OU. Then apply the security template to the users in the Sales OU.D、Create an organizational unit (OU) named Sales. Add the computers in the sales department to the Sales OU. Then apply the security template to computers in the Sales OU.

考题 You are the administrator of your company’s network. Ten Windows 2000 Professional computers are located in the Research department. The computers contain highly confidential information. You want the 10 computers to be able to communicate with other Windows 2000 Professional computers on the network. However, you do not want them to communicate with computers that are not running Windows 2000, including those that are running Windows 95, Windows 98 and Windows NT.  You want to configure a security policy on each computer to ensure that the confidential information is secure. What should you do?()A、Use Security Configuration and Analysis to import the Hisecws.inf security template file to modify the default security settings.B、Use security templates to create a security template file and import the security settings to modify the default security settings.C、Use the local computer policy to disable the access to this computer from the network option.D、Use Secedit.exe to reconfigure the computers’ default security settings to not allow anonymous access to the computers.

考题 You have a combined Windows 2000 and Windows 98 network that contain sensitive data. You want to utilize as many new Windows 2000 security features as possible. You want to customize a security policy on each computer to ensure that data is kept confidential and secured. Allcomputers must still be able to communicate with each other over the network. What should you do?()A、Use the security configuration and analysis console to improve the HISECWS security  template file.B、Use the local computer policy to disable the access this computer from the network option.C、Use SECEDIT to reconfigure the computer default security settings to not allow anonymous  access to the computer.D、Create a policy that excludes write access to the windows 2000 computers then apply the  policy to all non-windows 2000 computers.E、None of the above, Windows 9X systems cannot be secured using security template files.

考题 You are the administrator of your company’s network. You use Security Templates to configure a Security Policy on the Windows 2000 Professional Computers in the Sales organizational unit (OU). You notice that the Computers in the Sales OU are not downloading the Security Policy settings. On each computer, the Security Policy appears in the Local Computer Policy, but is not listed as the effective policy. You want all computers in the Sales OU to have the Security Policy listed as the effective policy. How should you accomplish this task? ()A、Use Security Templates to correct the setting and export the security file.B、Use Security Configuration and Analysis to import the security setting. Then create a Group policy object (GPO) for the Sales QU.C、Use Secedit /RefreshPolicy Machine_Policy command.D、Use the Basicwk.inf security file settings, save the security file, and then import the fileto theComputers.

考题 You are the administrator of a Windows 2000 domain. You develop a graphics software application for users in the Graphics organizational unit (OU). You want to create a custom installation for three users named Carlos, Carmen, and Maria, who are members of the Graphics OU. You want these three users to be able to access additional text, filters, and other graphics options for the software. What should you do? ()A、 Create the Graphic Users OU in the domain. Add a custom .msi file to the Graphics OUB、 Create the Graphic Users OU in the domain. Add a custom .mst file to the Graphics OUC、 Create the Advanced Software OU within the Graphics OU, and add Carlos, Carmen, and  Maria.Create an .msi file, including changes, and apply the modifications to the Advanced Software OUD、 Create the Advanced Software OU within the Graphics OU, and add Carlos. Carmen, and Maria. Create an: mst file, including changes, and apply the modifications to the Advanced Software OU

考题 You have a server that runs Windows Server 2008. The server has the Terminal Services Gateway (TS Gateway) role service installed.  You need to provide a security group access to the TS Gateway server. What should you do?()A、Add the security group to the Remote Desktop Users group.B、Add the security group to the TS Web Access Computers group.C、Create and configure a Resource Authorization Policy.D、Create and configure a Connection Authorization Policy.

考题 You are developing an application to create a new file on the local file system.You need to define specific security settings for the file. You must deny the file inheritance of any default security settings during creation.What should you do?()A、Create the file by using a new FileStream object by passing the FileSecurity object as a parameter to the FileStream constructor.B、Create a new FileSecurity object.C、Apply the permissions by using the File class.D、Create a new FileSystem Access Rule object for each permission that you need,and add each rule to the FileSecurity object.E、Create a new FileSystem Audit Rule object and add it to the FileSecurity object.

考题 You need to recommend a solution for managing the public computers in the branch offices. What should you recommend?()A、Create a GPO that is linked to the domain and configure security filtering for the GPO.B、Create a GPO that is linked to the Public OU and configure security filtering for the GPO.C、Create a GPO that is linked to the Public OU and enable loopback processing in the GPO.D、Create a GPO that is linked to the domain and enable block inheritance on the Public OU.

考题 单选题You need to design an audit strategy for Southbridge Video. Your solution must meet business requirements.What should you do?()A Create a new security template that enables the Audit account logon events policy for successful and failed attempts. Create a new GPO, and link it to the domain. Import the new security template into the new GPOB Create a new security template that enables the Audit account logon events policy for successful and failed attempts. Create a new GPO, and link it to the Domain Controllers OU. Import the new security template into the new GPOC Create a new security template that enables the Audit logon events policy for successful and failed attempts. Create a new GPO, and link it to the Domain Controllers OU. Import the new security template into the new GPOD Create a new security template that enables the Audit logon events policy for successful and failed attempts. Create a new GPO, and link it to the domain. Import the new security template into the new GPO

考题 多选题You have a single Active Directory directory service forest named contoso.com. You create baseline  security settings for a group of computers, and you store the settings in a database. You deploy thebaseline security settings. You need to confirm that the security settings on one of the computers are  applied correctly.  What are two possible commands that you can run to achieve this goal?()AseceditBgpupdateCnetdomDscwcmd

考题 多选题You want to create a security policy on an SRX240 that redirects unauthenticated users back to the Junos Pulse Access Control Service.Which two steps must you take to accomplish this task?()AConfigure a captive-portal service that redirects all traffic back to the Junos Pulse Access Control Service.BConfigure a security policy that references the unified-access-control captive-portal service.CConfigure a captive-portal service that redirects unauthenticated traffic back to the Junos Pulse Access Control Service.DConfigure a security policy that references the unified-access-control intranet-controller service.

考题 单选题You want to create a Host Checker policy that looks for a specific antivirus product that is running on your client machines, but the predefined antivirus options do not include the antivirus product version that you use.Which feature should you verify the antivirus product is up to date?()A Enhanced Endpoint SecurityB DP signaturesC Antivirus licensingD Endpoint Security Assessment Plug-in

考题 单选题You need to prevent a custom application from connecting to the Internet. What should you do?()A From Windows Firewall, add a program.B From Windows Defender, modify the Allowed items list.C From Windows Firewall with Advanced Security, create an inbound rule.D From Windows Firewall with Advanced Security, create an outbound rule.

考题 单选题You are the administrator of your company's network. You want to configure a Security Policy for the Windows 2000 Professional Computers that are in the sales department.   On one of the computers, you use Security Templates to configure the Security Policy based on the desired security settings. You then export those settings to an .inf file that will be used on all of the Computers in the sales department. You want to configure each Computer to have a customized Security Policy. What steps should you follow in order to achieve your goal?()A Use Secedit.exe to import the security settings from the .inf file to the computers in the sales department.B Use a text editor to change the default security settings to the desired security settings. Then export those settings to the Computers in the sales department.C Create an organizational unit (OU) named Sales. Add the users in the sales department to the Sales OU. Then apply the security template to the users in the Sales OU.D Create an organizational unit (OU) named Sales. Add the computers in the sales department to the Sales OU. Then apply the security template to computers in the Sales OU.

考题 单选题Your network consists of a single Active Directory domain. The functional level of the forest is Windows Server 2008. You need to create multiple password policies for users in your domain. What should you do()A From the Schema snap-in, create multiple class schema objects.B From the ADSI Edit snap-in, create multiple Password Setting objects.C From the Security Configuration Wizard, create multiple security policies.D From the Group Policy Management snap-in, create multiple Group Policy objects.

考题 单选题You want to create an out-of-band management zone and assign the ge-0/0/0.0 interface to that zone.From the [edit] hierarchy, which command do you use to configure this assignment?()A set security zones management interfaces ge-0/0/0.0B set zones functional-zone management interfaces ge-0/0/0.0C set security zones functional-zone management interfaces ge-0/0/0.0D set security zones functional-zone out-of-band interfaces ge-0/0/0.0

考题 单选题You are the network administrator for your company. The network consists of a single Active   Directory forest. The forest consists of 19 Active Directory domains. Fifteen of the domains contain  Windows Server 2003 domain controllers. The functional level of all the domains is Windows 2000 native.  The network also consists of a single Microsoft Exchange 2000 Server organization. You need to create  groups that can be used only to send e-mail messages to user accounts throughout the company. You  want to achieve this goal by using the minimum amount of replication traffic and minimizing the size of the  Active Directory database. You need to create a plan for creating e-mail groups for your company.  What should you do?()A  Create global distribution groups in each domain. Make the appropriate users from each domain members of the global distribution group in the same domain. Create universal distribution groups. Make the global distribution groups in each domain members of the universal distribution groups.B  Create global security groups in each domain. Make the appropriate users from each domain members of the security group in the same domain. Create universal security groups. Make the global security groups in each domain members of the universal security groups.C  Create universal distribution groups. Make the appropriate users from each domain members of a universal distribution group.D  Create universal security groups. Make the appropriate users from each domain members of a universal security group.

考题 单选题You want to create a security policy allowing traffic from any host in the Trust zone to hostb.example.com(172.19.1.1) in the Untrust zone. How do you create this policy?()A Specify the IP address (172.19.1.1/32) as the destination address in the policy.B Specify the DNS entry (hostb.example.com.) as the destination address in the policy.C Create an address book entry in the Trust zone for the 172.19.1.1/32 prefix and reference this entry in the policy.D Create an address book entry in the Untrust zone for the 172.19.1.1/32 prefix and reference this entry in the policy

考题 单选题You are using Windows Communication Foundation (WCF) to create a service. You need to implement a custom message-level security binding element. Which binding element should you use?()A Transport Security Binding ElementB Https Transport Binding ElementC Ssl Stream Secunty Binding ElementD Windows Stream Security Binding Element