网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
When configuring resource access policies in a Junos Pulse Access Control Service device, which entry is permitted when defining the specific resources?()
- A、Hostname
- B、fully qualified domain name
- C、IP address
- D、address book entry
参考答案
更多 “When configuring resource access policies in a Junos Pulse Access Control Service device, which entry is permitted when defining the specific resources?()A、HostnameB、fully qualified domain nameC、IP addressD、address book entry” 相关考题
考题
For which two situations would you use functionality provided by the Resource Manager?()
A. setting idle timeout limits on resource plansB. saving storage space by using compressed backup setsC. creating jobs that will run automatically at a scheduled timeD. assigning priorities to jobs to manage access to system resourcesE. creating alerts to perform notification when tablespaces are low on available space resources
考题
You are configuring captive portal on your SRX Series device for guest user access.When would you use the redirect-traffic all command?()
A. When you want all unauthenticated traffic to be redirectedB. When you want all clear text traffic to be redirected.C. When you want all authenticated traffic to be redirected.D. When you want all encrypted traffic to be redirected.
考题
When configuring resource access policies in a Junos Pulse Access Control Service device, which entry is permitted when defining the specific resources?()
A. HostnameB. fully qualified domain nameC. IP addressD. address book entry
考题
When the Infranet Enforcer is set up in transparent mode, which additional resource policy must be configured to use OAC for IPsec enforcement? ()
A. IPsec RoutingB. Access ControlC. IP Address PoolD. Source Interface
考题
Which of the general policies on the wlan edit page on the wlan controller would be used when configuring a radio for a single antenna for an outdoor application?()A、802.11b/gB、radioC、access pointD、802.11a
考题
A site administrator is configuring Resource-level access control. Which of the following statements about Resource-level access control are true? Resource-level access control policies:()A、are optionalB、are used to protect data beansC、provide coarse-grained access controlD、never specify a relationship
考题
Which two pieces of information are needed when declaring the web resource collection in the deployment descriptor?()A、 the URL pattern that requires authorizationB、 the HTTP methods that require authorizationC、 the users allowed access to the web resourceD、 the J2EE roles allowed access to the web resourceE、 the authentication mechanism required by the web resource
考题
What are three necessary steps for enabling 802.1X access when configuring Layer 2 enforcement?()A、Configure a location groupB、Createan authentication protocol setC、Configure the RADIUS AV pair listD、Configure RADIUS clientsE、Configure role and role-mapping rules
考题
When configuring Cisco Secure ACS to support wireless EAP authentication, which device must be configured as a AAA client?()A、Wireless Control SystemB、wireless clientsC、wireless controllersD、controller-based access pointsE、Location Appliance
考题
When configuring port security on a Cisco Catalyst switch port, what is the default action taken by the switch if a violation occurs? ()A、protect (drop packets with unknown source addresses)B、restrict (increment SecurityViolation counter)C、shut down (access or trunk port)D、transition (the access port to a trunking port)
考题
Which wireless LAN design ensures that a mobile wireless client will not lose connectivity when moving from one access point to another?()A、using adapters and access points manufactured by the same companyB、overlapping the wireless cell coverage by at least 10%C、configuring all access points to use the same channelD、utilizing MAC address filtering to allow the client MAC address to authenticate with the surrounding APs
考题
A site administrator is configuring Command-level access control. Which of the following statements about Command-level access control are true? Command level access control policies: ()A、are mandatoryB、specify action group ExecuteCommandActionGroup for Controller commandsC、specify action group ViewCommandActionGroup for View commandsD、specify resource group ControllerCommandResourceGroup for Controller commandsE、specify resource group ViewCommandResourceGroup for View commands
考题
When defining resources for a concurrent resource group, which of the following is NOT supported?() A、 Application Servers using diskB、 Definition of Multiple IP aliasesC、 Volume Groups using raw logical volumesD、 Volume Groups supporting concurrent access
考题
When the Infranet Enforcer is set up in transparent mode, which additional resource policy must be configured to use OAC for IPsec enforcement? ()A、IPsec RoutingB、Access ControlC、IP Address PoolD、Source Interface
考题
You have a firewall enforcer protecting resources in a data center. A user is experiencing difficulty connecting to a protected resource.Which two elements must exist so the user can access the resource?()A、Resource access policy on the MAG Series deviceB、IPsec routing policy on the MAG Series deviceC、General traffic policy blocking access through the firewall enforcerD、Auth table entry on the firewall enforcer
考题
You are configuring captive portal on your SRX Series device for guest user access.When would you use the redirect-traffic all command?()A、When you want all unauthenticated traffic to be redirectedB、When you want all clear text traffic to be redirected.C、When you want all authenticated traffic to be redirected.D、When you want all encrypted traffic to be redirected.
考题
For which two situations would you use functionality provided by the Resource Manager?()A、 setting idle timeout limits on resource plansB、 saving storage space by using compressed backup setsC、 creating jobs that will run automatically at a scheduled timeD、 assigning priorities to jobs to manage access to system resourcesE、 creating alerts to perform notification when tablespaces are low on available space resources
考题
多选题Which two pieces of information are needed when declaring the web resource collection in the deployment descriptor?()Athe URL pattern that requires authorizationBthe HTTP methods that require authorizationCthe users allowed access to the web resourceDthe J2EE roles allowed access to the web resourceEthe authentication mechanism required by the web resource
考题
多选题For which two situations would you use functionality provided by the Resource Manager? ()(Choose two.)Asetting idle timeout limits on resource plansBsaving storage space by using compressed backup setsCcreating jobs that will run automatically at a scheduled timeDassigning priorities to jobs to manage access to system resourcesEcreating alerts to perform notification when tablespaces are low on available space resources
考题
单选题When configuring VLANs on an autonomous access point,what must be configured on theconnected switchport?()A
802.1q trunkingB
VTP trunkingC
ISL trunkingD
DPT trunking
考题
多选题For which two situations would you use functionality provided by the Resource Manager?()Asetting idle timeout limits on resource plansBsaving storage space by using compressed backup setsCcreating jobs that will run automatically at a scheduled timeDassigning priorities to jobs to manage access to system resourcesEcreating alerts to perform notification when tablespaces are low on available space resources
考题
单选题When configuring vlans on an autonomous access point. What must be configured on the connected switchport?()A
802.1q trunkingB
vtp trunkingC
isl trunkingD
dpt trunking
考题
单选题When configuring Cisco Secure ACS to support wireless EAP authentication,which device mustbeconfigured as a AAA client?()A
Location ApplianceB
controller-based access pointsC
wireless clientsD
Wireless Control SystemE
wireless controllers
考题
多选题A site administrator is configuring Resource-level access control. Which of the following statements about Resource-level access control are true? Resource-level access control policies:()Aare optionalBare used to protect data beansCprovide coarse-grained access controlDnever specify a relationship
考题
多选题What are three necessary steps for enabling 802.1X access when configuring Layer 2 enforcement?()AConfigure a location groupBCreatean authentication protocol setCConfigure the RADIUS AV pair listDConfigure RADIUS clientsEConfigure role and role-mapping rules
考题
单选题When configuring Cisco Secure ACS to support wireless EAP authentication,which device must beconfigured as a AAA client?()A
Location ApplianceB
controller-based access pointsC
wireless clientsD
Wireless Control SystemE
wireless controllers
考题
单选题When defining resources for a concurrent resource group, which of the following is NOT supported?()A
Application Servers using diskB
Definition of Multiple IP aliasesC
Volume Groups using raw logical volumesD
Volume Groups supporting concurrent access
考题
单选题When configuring resource access policies in a Junos Pulse Access Control Service device, which entry is permitted when defining the specific resources?()A
HostnameB
fully qualified domain nameC
IP addressD
address book entry
热门标签
最新试卷