网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
A user calls the help desk and explains that they just purchased a Macintosh computer. When they log into the network, the Odyssey Access Client is not automatically downloaded as it was when the user used their Windows PC.How do you resolve this issue?()
A

Download the Macintosh installer from the Junos Pulse Access Control Service and manually install the Odyssey Access Client.

B

Provide the user with the sign-in URL you set up for Macintosh users; this will push the Odyssey Access Client to the user's machine.

C

Assist the user to configure the Macintosh native supplicant and provide the AppleScnptto expose the EAP-JUAC inner authentication protocol.

D

Configure the user's role to install the Java agent, which is a requirement to allow the Junos Pulse Access Control Service to deploy the Odyssey Access Client.


参考答案

参考解析
解析: 暂无解析
更多 “单选题A user calls the help desk and explains that they just purchased a Macintosh computer. When they log into the network, the Odyssey Access Client is not automatically downloaded as it was when the user used their Windows PC.How do you resolve this issue?()A Download the Macintosh installer from the Junos Pulse Access Control Service and manually install the Odyssey Access Client.B Provide the user with the sign-in URL you set up for Macintosh users; this will push the Odyssey Access Client to the user's machine.C Assist the user to configure the Macintosh native supplicant and provide the AppleScnptto expose the EAP-JUAC inner authentication protocol.D Configure the user's role to install the Java agent, which is a requirement to allow the Junos Pulse Access Control Service to deploy the Odyssey Access Client.” 相关考题
考题 You are the administrator of a Windows 2000 Active Directory network. The network consists of a single domain. The domain includes 20 Windows NT Workstation 4.0 client computers. All other client computers are Windows 2000 Professional computers.You create a Windows NT 4.0 default user policy on the Windows 2000 Server computer that is configured as the PDC emulator. This default user policy denies access to Network Neighborhood. You then install Terminal Services on one of the servers and Terminal Services Client on the 20 Windows NT Workstation client computers.You find that the users of the Terminal Server can still browse the network when they open My Network Places. You want to prevent all users from browsing the network.What should you do?A.Modify the Windows NT policy template file so that you can restrict access to both My Network Places and Network Neighborhood. Save the policy file on the Terminal Server.B.Copy the Windows NT policy file to the 20 Windows NT Workstation computers.C.Create a Windows 2000 Group Policy that denies user access to My Network Places.D.Edit the local registry on the Windows NT Workstation computers to deny access to Entire Network in Network Neighborhood.

考题 A user is successfully authenticating to the network but is unable to access protected resources behind a ScreenOS enforcer. You log in to the ScreenOS enforcer and issue the command get auth table infranet and you do not see the user listed.Which two event log settings on the Junos Pulse Access Control Service must you enable to troubleshootthis issue?()A. Connection RequestsB. System ErrorsC. Enforcer EventsD. Enforcer Command Trace

考题 A user calls the help desk and explains that they just purchased a Macintosh computer. When they log into the network, the Odyssey Access Client is not automatically downloaded as it was when the user used their Windows PC.How do you resolve this issue?()A、Download the Macintosh installer from the Junos Pulse Access Control Service and manually install the Odyssey Access Client.B、Provide the user with the sign-in URL you set up for Macintosh users; this will push the Odyssey Access Client to the user's machine.C、Assist the user to configure the Macintosh native supplicant and provide the AppleScnptto expose the EAP-JUAC inner authentication protocol.D、Configure the user's role to install the Java agent, which is a requirement to allow the Junos Pulse Access Control Service to deploy the Odyssey Access Client.

考题 You are using windows installer to deploy an application to 750 Windows 2000 Professional computers on your network. The network includes organizational unit (OU) named sales. A Group Policy object (GPO) is created for the Sales OU. You want to deploy that application in such a way that the shortcuts of that application should be created on the used desktop as well as in start-menu. When a user first click on the shortcut or try to open any file whose extension is associated with that application, then that application should automatically install on the computer. What should you do to accomplish this task?()A、Using GPO, publish that application at user levelB、Using GPO, assign that application at the user levelC、Using GPO, publish that application at computer levelD、Using GPO, assign that application at the computer level.

考题 A user is successfully authenticating to the network but is unable to access protected resources behind a ScreenOS enforcer. You log in to the ScreenOS enforcer and issue the command get auth table infranet and you do not see the user listed.Which two event log settings on the Junos Pulse Access Control Service must you enable to troubleshootthis issue?()A、Connection RequestsB、System ErrorsC、Enforcer EventsD、Enforcer Command Trace

考题 You have three classes of users on your network: employee, contractor, and IT administrator. You configure the Junos Pulse Access Control Service to assign roles to each user class and require that a specific wireless SSID be preconfigured for the Odyssey Access Client based on the role. Which configuration method should you use to satisfy this scenario?()A、Create a "Settings Update file" in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under "User Roles" "Agent" "Odyssey Settings" "Preconfigured Installer".B、Configure a wired adapter and assign the required SSID under "User Roles" "Agent" "Odyssey Settings".C、Create a script in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under "User Roles" "Agent" "Odyssey Settings" "Preconfigured Installer".D、Create a "Preconfiguration file" in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under "User Roles" "Agent" "Odyssey Settings" "Preconfigured Installer".

考题 A new software engineer has been hired. As part of the normal hiring process, the user was added to the Active Directory and placed into the Domain Users group and the SW_DEV group. The Domain Users group has access to the company's intranet website and time card system. The SW_DEV group has access to the source code library server. You have created roles that correspond to each Active Directory group. The user calls the help desk stating that they cannot access the source code library server. Which two troubleshooting tools would you use on the Junos Pulse Access Control Service to resolve the issue?()A、Perform a policy trace for the specific user and review the output to isolate the problem.B、Review the Events log.C、Review the Admin Access log to verify that the user has the correct permissions to access the SVVJDEV resource.D、Review the User Access log to verify that the user is getting mapped to both the Domain User role and the SW_DEV role.

考题 You are a security administrator for your company. The network consists of a single Active Directory domain. Servers run either Windows Server 2003 or Windows 2000 Server. All client computers run Windows XP Professional.    The company’s written security policy states that user accounts must be locked if an unauthorized user attempts to guess the users, passwords. The current account policy locks out a user after two invalid password attempts in five minutes. The user remains locked out until the account is reset by an administrator. Users frequently call the help desk to have their account unlocked. Calls related to account lockout constitute 25 percent of help desk calls.    You need to reduce the number of help desk calls related to account lockout.  What should you do?()A、 Modify the Default Domain Controllers Policy Group Policy object(GPO). Increase the maximum lifetime for serviceB、 Modify the Default Domain Policy Group Policy object(GPO). Configure an account lockout threshold of 10.C、 Modify the Default Domain Controllers Policy Group Policy object(GPO). Disable the enforcement of user logon resD、 Modify the Default Domain Policy Group Policy object(GPO). Increase the minimum password age.

考题 You are a network administrator for your company. The network consists of a single Active Directory domain. The domain contains three Windows Server 2003 domain controllers, 20 Windows Server 2003 member servers, and 750 Windows XP Professional computers. The domain is configured to use only Kerberos authentication for all server connections.A user reports that she receives an "Access denied" error message when she attempts to connect to one of the member servers. You want to test the functionality of Kerberos authentication on the user’s client computer.  Which command should you run from the command prompt on the user’s computer?()A、netshB、netdiagC、ktpassD、ksetup

考题 Your company’s network has client computers that run Windows 7.    When a user attempts to log on to the domain from a computer named Client1,she receives the following message:   The system cannot log you on to this domain because the system’s computer account in its primary domain is missing or the password on that account is incorrect.  You need to ensure that the user can log on to the domain from Client1.   What should you do?()A、Disjoin and rejoin Client1 to the domain.B、Add the computer account for Client1 to the Domain Computers Active Directory group.C、Reset the account password for Client1 through Active Directory Users and Computers.D、Reset the account password for the user through Active Directory Users and Computers.

考题 Your network consists of an Active Directory domain. The domain controllers run Windows Server 2008 R2. Client computers run Windows 7.   You need to implement Encrypting File System (EFS) for all client computers. You want to achieve this goal while meeting the following requirements:   èYou must minimize the amount of data that is transferred across the network when a user logs on to or off from a client computer.   èUsers must be able to access their EFS certificates on any client computers. èIf a client computer s disk fails, EFS certificates must be accessible    What should you do?()A、Enable credential roaming.B、Enable roaming user profiles.C、Enable a Data Recovery Agent.D、Issue smart cards to all users.

考题 You are the network administrator for your company. The network consists of a single Active Directory domain named . All domain controllers run Windows Server 2003, and all client computers run Windows XP Professional. All client computer accounts are stored in the Computer container. A user named Peter reports that he cannot log on to the domain from his computer. Peter receives the logon message shown in the exhibit. Exhibit: Logon Message Your account is configured to prevent you from using this computer. Please try another computer. You need to enable Peter to log on. What should you do?()A、Create an account for Peter's computer in the Computers container.B、Grant the Log on locally user right to Peter's user account.C、Enable Peter's user account.D、Change the properties of Peter's user account so he can log on to any computer.

考题 You are a network administrator for Your network consists of a single Active Directory domain named All servers run Windows Server 2003. A help desk user reports that a user object was accidentally deleted and the user can no longer log on to the domain and access resources. You confirm that the user object was included in the most recent backup. You need to enable the user to log on to the domain. You must ensure that the user retains access to resources. What should you do?()A、Install a new domain controller. Install Active Directory from media by using the most recent backup. Manually initiate replication.B、Decrease the garbage collection interval. Perform a nonauthorative restoration of Active Directory by using the most recent backup.C、Perform a nonauthorative restoration of Active Directory by using the most recent backup. Authoritatively restore the user object that was deleted.D、Re-create a user object that has the same user principal name (UPN) as the user object that was deleted. Authoritatively restore this user object.

考题 You are the network administrator for TestKing.com. The network consists of a single Active Directory domain named testking.com. The domain contains Windows Server 2003 computers and Windows XP Professional computers. You use a non-administrative user account named Joseph to log on to a client computer. You need to change the password for a domain user account named Sophia. You open the Active Directory Users and Computers console. When you attempt to change Sophia's password, you receive the following error message: "Access is denied". You need to remain logged on to the client computer as Joseph, and you need to be able to change Sophia's password. What should you do?()A、Add the non-administrative domain user account to the local Administrators group.B、Use the runas command to run Active Directory Users and Computers with domain administrative credentials.C、From a command prompt, run the net user Sophia /add /passwordreq:yes command.D、From a command prompt, run the net accounts /uniquepw: /domain command.

考题 You are a network administrator for TestKing. The network consists of a single Active Directory domain named testking.com. All servers run Windows Server 2003. All client computers run Windows XP Professional. A server named Testking32 contains a folder that is shared as ManagerData$. A global group named AllManagers has permission to access the shared folder. A user reports that he needs access to the ManagerData$ shared folder. You add his user account to the All Managers global group. When the user attempts to connect to the shared folder by typing //Testking32/ManagerData$/ , he receives the following error message: "//Testking32/ManagerData$/ is not accessible. You might not have permissions to use the network resource. Contact the administrator of this server to find out if you have access permissions. Access is denied. You need to ensure that the user can access the ManagerData$ shared folder on Testking32. What should you do?()A、Instruct the user to type //Testking32/ManagerData/ when he attempts to access the folder.B、Add the Anonymous Logon group to the ACL for the ManagerData$ shared folder.C、Select the Replace permission entries on all child object with entries shown here that apply to child objects check box.D、Instruct the user to log off and log on again before he accesses the folder.

考题 You are the network administrator for The network consists of a single Active Directory domain named . For security reasons,management decides that a particular user must not be able to log on to the domain after 5:00 P.M. If the user is logged on to the domain at 5:00 P.M., he must be logged off automatically. You configure the Logon Hours setting for the appropriate user account. Thatnight, you verify that the user cannot log on to the domain after 5:00 P.M. The nextday, you notice that the user is still accessing domain resources at 6:00 P.M. Youverify that the time on the user's computer and on the domain controller arecorrect. You need to ensure that the user is logged off automatically if he is still working onthe domain after 5:00 P.M. What should you do?()A、In Active Directory Users and Computers, on the Sessions tab, configure the End Session setting for the user account. Instruct the user to log off from the domain and log on again.B、Modify the Default Domain Policy GPO to enforce logoff when logon hours expire. Ensure that the user's computer has the latest Group Policy settings applied.C、Remove the user's domain account from the local Administrators group on the user's client computer. Instruct the user to log off from the domain and log on again.D、Use Computer Management on the domain controller. Restart the Net Logon service.

考题 单选题You are a network administrator for Your network consists of a single Active Directory domain named All servers run Windows Server 2003. A help desk user reports that a user object was accidentally deleted and the user can no longer log on to the domain and access resources. You confirm that the user object was included in the most recent backup. You need to enable the user to log on to the domain. You must ensure that the user retains access to resources. What should you do?()A Install a new domain controller. Install Active Directory from media by using the most recent backup. Manually initiate replication.B Decrease the garbage collection interval. Perform a nonauthorative restoration of Active Directory by using the most recent backup.C Perform a nonauthorative restoration of Active Directory by using the most recent backup. Authoritatively restore the user object that was deleted.D Re-create a user object that has the same user principal name (UPN) as the user object that was deleted. Authoritatively restore this user object.

考题 单选题A user calls the help desk and explains that they just purchased a Macintosh computer. When they log into the network, the Odyssey Access Client is not automatically downloaded as it was when the user used their Windows PC.How do you resolve this issue?()A Download the Macintosh installer from the Junos Pulse Access Control Service and manually install the Odyssey Access Client.B Provide the user with the sign-in URL you set up for Macintosh users; this will push the Odyssey Access Client to the user's machine.C Assist the user to configure the Macintosh native supplicant and provide the AppleScnptto expose the EAP-JUAC inner authentication protocol.D Configure the user's role to install the Java agent, which is a requirement to allow the Junos Pulse Access Control Service to deploy the Odyssey Access Client.

考题 单选题You are the network administrator for The network consists of a single Active Directory domain named . For security reasons,management decides that a particular user must not be able to log on to the domain after 5:00 P.M. If the user is logged on to the domain at 5:00 P.M., he must be logged off automatically. You configure the Logon Hours setting for the appropriate user account. Thatnight, you verify that the user cannot log on to the domain after 5:00 P.M. The nextday, you notice that the user is still accessing domain resources at 6:00 P.M. Youverify that the time on the user's computer and on the domain controller arecorrect. You need to ensure that the user is logged off automatically if he is still working onthe domain after 5:00 P.M. What should you do?()A In Active Directory Users and Computers, on the Sessions tab, configure the End Session setting for the user account. Instruct the user to log off from the domain and log on again.B Modify the Default Domain Policy GPO to enforce logoff when logon hours expire. Ensure that the user's computer has the latest Group Policy settings applied.C Remove the user's domain account from the local Administrators group on the user's client computer. Instruct the user to log off from the domain and log on again.D Use Computer Management on the domain controller. Restart the Net Logon service.

考题 单选题You are a security administrator for your company. The network consists of a single Active Directory domain. Servers run either Windows Server 2003 or Windows 2000 Server. All client computers run Windows XP Professional.    The company’s written security policy states that user accounts must be locked if an unauthorized user attempts to guess the users, passwords. The current account policy locks out a user after two invalid password attempts in five minutes. The user remains locked out until the account is reset by an administrator. Users frequently call the help desk to have their account unlocked. Calls related to account lockout constitute 25 percent of help desk calls.    You need to reduce the number of help desk calls related to account lockout.  What should you do?()A  Modify the Default Domain Controllers Policy Group Policy object(GPO). Increase the maximum lifetime for serviceB  Modify the Default Domain Policy Group Policy object(GPO). Configure an account lockout threshold of 10.C  Modify the Default Domain Controllers Policy Group Policy object(GPO). Disable the enforcement of user logon resD  Modify the Default Domain Policy Group Policy object(GPO). Increase the minimum password age.

考题 单选题Your company’s network has client computers that run Windows 7.    When a user attempts to log on to the domain from a computer named Client1,she receives the following message:   The system cannot log you on to this domain because the system’s computer account in its primary domain is missing or the password on that account is incorrect.  You need to ensure that the user can log on to the domain from Client1.   What should you do?()A Disjoin and rejoin Client1 to the domain.B Add the computer account for Client1 to the Domain Computers Active Directory group.C Reset the account password for Client1 through Active Directory Users and Computers.D Reset the account password for the user through Active Directory Users and Computers.

考题 单选题Your network consists of an Active Directory domain. The domain controllers run Windows Server 2008 R2. Client computers run Windows 7.   You need to implement Encrypting File System (EFS) for all client computers. You want to achieve this goal while meeting the following requirements:   èYou must minimize the amount of data that is transferred across the network when a user logs on to or off from a client computer.   èUsers must be able to access their EFS certificates on any client computers. èIf a client computer s disk fails, EFS certificates must be accessible    What should you do?()A Enable credential roaming.B Enable roaming user profiles.C Enable a Data Recovery Agent.D Issue smart cards to all users.

考题 单选题You are using windows installer to deploy an application to 750 Windows 2000 Professional computers on your network. The network includes organizational unit (OU) named sales. A Group Policy object (GPO) is created for the Sales OU. You want to deploy that application in such a way that the shortcuts of that application should be created on the used desktop as well as in start-menu. When a user first click on the shortcut or try to open any file whose extension is associated with that application, then that application should automatically install on the computer. What should you do to accomplish this task?()A Using GPO, publish that application at user levelB Using GPO, assign that application at the user levelC Using GPO, publish that application at computer levelD Using GPO, assign that application at the computer level.

考题 单选题You are a network administrator for your company. The network consists of a single Active Directory domain. The domain contains three Windows Server 2003 domain controllers, 20 Windows Server 2003 member servers, and 750 Windows XP Professional computers. The domain is configured to use only Kerberos authentication for all server connections.A user reports that she receives an "Access denied" error message when she attempts to connect to one of the member servers. You want to test the functionality of Kerberos authentication on the user’s client computer.  Which command should you run from the command prompt on the user’s computer?()A netshB netdiagC ktpassD ksetup

考题 单选题You are a network administrator for TestKing. The network consists of a single Active Directory domain named testking.com. All servers run Windows Server 2003. All client computers run Windows XP Professional. A server named Testking32 contains a folder that is shared as ManagerData$. A global group named AllManagers has permission to access the shared folder. A user reports that he needs access to the ManagerData$ shared folder. You add his user account to the All Managers global group. When the user attempts to connect to the shared folder by typing //Testking32/ManagerData$/ , he receives the following error message: "//Testking32/ManagerData$/ is not accessible. You might not have permissions to use the network resource. Contact the administrator of this server to find out if you have access permissions. Access is denied. You need to ensure that the user can access the ManagerData$ shared folder on Testking32. What should you do?()A Instruct the user to type //Testking32/ManagerData/ when he attempts to access the folder.B Add the Anonymous Logon group to the ACL for the ManagerData$ shared folder.C Select the Replace permission entries on all child object with entries shown here that apply to child objects check box.D Instruct the user to log off and log on again before he accesses the folder.

考题 单选题You are the network administrator for TestKing.com. The network consists of a single Active Directory domain named testking.com. The domain contains Windows Server 2003 computers and Windows XP Professional computers. You use a non-administrative user account named Joseph to log on to a client computer. You need to change the password for a domain user account named Sophia. You open the Active Directory Users and Computers console. When you attempt to change Sophia's password, you receive the following error message: "Access is denied". You need to remain logged on to the client computer as Joseph, and you need to be able to change Sophia's password. What should you do?()A Add the non-administrative domain user account to the local Administrators group.B Use the runas command to run Active Directory Users and Computers with domain administrative credentials.C From a command prompt, run the net user Sophia /add /passwordreq:yes command.D From a command prompt, run the net accounts /uniquepw: /domain command.

考题 单选题You are the network administrator for your company. The network consists of a single Active Directory domain named . All domain controllers run Windows Server 2003, and all client computers run Windows XP Professional. All client computer accounts are stored in the Computer container. A user named Peter reports that he cannot log on to the domain from his computer. Peter receives the logon message shown in the exhibit. Exhibit: Logon Message Your account is configured to prevent you from using this computer. Please try another computer. You need to enable Peter to log on. What should you do?()A Create an account for Peter's computer in the Computers container.B Grant the Log on locally user right to Peter's user account.C Enable Peter's user account.D Change the properties of Peter's user account so he can log on to any computer.

考题 单选题A network technician is troubleshooting a network issue that has just been reported. Which of thefollowing troubleshooting steps should the technician take FIRST to help resolve this issue?()A Record the solution in the appropriate logs for future use.B Ask the user who reported the issue what past documentation they have.C Ask the user who reported the issue to explain the symptoms in detail.D Record what steps should be taken to resolve the issue.