网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
The use of pulse groups and extremely precise timing at each Loran-C station makes possible the use of().
A

High frequency pulses

B

Combinations of high and low frequency pulses

C

The same frequency for all stations in a chain

D

Varied long and short pulses


参考答案

参考解析
解析: 暂无解析
更多 “单选题The use of pulse groups and extremely precise timing at each Loran-C station makes possible the use of().A High frequency pulsesB Combinations of high and low frequency pulsesC The same frequency for all stations in a chainD Varied long and short pulses” 相关考题
考题 Because the timing of injection is crucial, _____ mounted on the camshaft, which is driven by the crankshaft are used to operate the fuel pumps, one of which is provided for each cylinder.A.gearsB.ramsC.barrelsD.cams

考题 Your IT director has decided to allow employees to use their laptops at home as well as in the office. You have deployed the Junos Pulse client to allow access to the offices 802.1X-enabled wired network. Your company also has the Junos Pulse Secure Access Service deployed. You want the Junos Pulse client to automatically launch the appropriate access method depending on each users location.Which three are supported to determine the users location?()A. MAC addressB. DNS serverC. DHCP serverD. resolve addressE. endpoint address

考题 You want to provide 802.1X access for Windows clients using Junos Pulse as the agent. Which two considerations must you take into account() A.Junos Pulse out erauth entication uses EAP-PEAP.B.Junos Pulse ou terauth entication uses EAP-TTLS.C.Junos Pulse innerauth entication uses EAP-MSCHAP-V2.D.Theend point must use thenative Microsoft 802.1X supplicant.

考题 What is the correct syntax for applying node-specific parameters to each node in a chassis cluster?() A. set apply-groups node$B. set apply-groups (node)C. set apply-groups $(node)D. set apply-groups (node)all

考题 The use of pulse groups and extremely precise timing at each Loran-C station makes possible the use of ______.A.High frequency pulsesB.Combinations of high and low frequency pulsesC.The same frequency for all stations in a chainD.Varied long and short pulses

考题 You have configured Junos Pulse on your Windows desktop and want to verify that the IPsec configuration policy is being pushed down to your workstation upon network authentication and login.Which utility program do you use to see this configuration and where do you find it?()A、the Pulse Diagnostics Tool in the "File" "Tools" menu option in the Pulse GUIB、the Pulse Diagnostics Tool in the "Start" "All Programs" "Juniper Networks" "Junos Pulse" menu folder next to the Junos Pulse applicationC、the Pulse Diagnostics Viewer, which you access by simultaneously pressing "Ctrl" and "F2"D、the Pulse Diagnostics Viewer in the "File" "Tools" menu option in the Pulse GUI

考题 You are the DNS administrator for Adventure Works. Adventure Works is an Internet service provider (ISP) that hosts Web sites for many companies.  Each Adventure Works DNS server hosts multiple DNS zones for customers. Several Adventure Works administrators are allowed to add DNS zones. You want to produce a weekly report that will list all the zones that are hosted on each DNS server.  What should you do?()A、Use the dnslint utility to query each DNS server.B、Use the dnscmd utility to query each DNS server.C、Use the nslookup utility to query each DNS server.D、Use the adsiedit utility to query Active Directory for a list of DNS zones.

考题 You are designing an application that will use Windows Azure Table storage to store millions of data points each day.  The application must retain each day’s data for only one week.   You need to recommend an approach for minimizing storage transactions.  What should you recommend?()A、 Use a separate table for each date.  Delete eachtable when it is one week old.B、 Use a separate table for each week.  Delete each table when it is one week old.C、 Use a single table, partitioned by date.  Use Entity Group Transactions to delete data when it is one week old.D、 Use a single table, partitioned by week.  Use Entity Group Transactions to delete data when it is one week old.

考题 You need to identify each help desk user who bypasses the new corporate security policy. What should you do?()A、Configure Audit Special Logon and define Special Groups.B、Configure Audit Other Privilege Use Events and define Special Groups.C、Configure Audit Sensitive Privilege Use and configure auditing for the HelpDesk group.D、Configure Audit Object Access and modify the auditing settings for the HelpDesk group.

考题 单选题You are validating the configuration of your SRX Series device and see the output shown below. What does this indicate?()A The SRX Series device has been configured correctly, the Junos Pulse Access Control Service is reachable on the network, and the SRX Series device is waiting to receive the initial connection from the Junos Pulse Access Control Service.B The SRX Series device has confirmed that the Junos Pulse Access Control Service is configured and is reachable on the network, the SRX Series device is waiting to receive the connection from the Junos Pulse Access Control Service, and all that remains to be accomplished is to configure the SRX Series device.C The SRX Series device is configured correctly and connected to the Junos Pulse Access Control Service. All that remains to be done to complete the configuration is to configure the SRX Series device on the Junos Pulse Access Control Service.D Both the Junos Pulse Access Control Service and the SRX Series device are configured correctly and communicating with each other.

考题 单选题You need to design an administrative model that meets all business and technical requirements. What should you do?()A Place the mailboxes for each region on a separate server. Create an administrative group for each region. Assign each regional technician Exchange Full Administrator permission over that region’s administrative groups. Assign the main office IT staff Exchange Full Administrator permission over each administrative group.B Place the mailboxes for each region on a separate server. Create an administrative group for each region. Assign each regional technician Exchange Full Administrator permission over all administrative groups. Assign the main office IT staff Exchange Full Administrator permission over each administrative groupC Place the mailboxes from multiple regions on each server. Create an administrative group for each server. Assign each regional technician Exchange Full Administrator permission over the administrative groups that contain servers that hold mailboxes for that region. Assign the main office IT staff Exchange Full Administrator permission over each administrative groupD Place the mailboxes from multiple regions on each server. Create a single administrative group for all servers. Assign each regional technician and the main office IT Staff Exchange Full Administrator permission over the administrative group

考题 单选题You are developing a Windows Communication Foundation (WCF) service that must be discoverable.You need to ensure that the ServiceHost instance supports multiple discovery versions. What should you do?()A - Specify a unique DiscoveryVersion parameter for each endpoint constructor. - Use the same value for the Address property of each endpoint.B - Use the endpoint constructor without the DiscoveryVersion parameter. - Use a unique value for the Address property of each endpoint.C - Specify a unique DiscoveryVersion parameter for each endpoint constructor. - Use a unique value for the Address property of each endpoint.D - Use the endpoint constructor without the DiscoveryVersion parameter. - Use the same value for the Address property of each endpoint.

考题 单选题What is the correct syntax for applying node-specific parameters to each node in a chassis cluster?()A set apply-groups node$B set apply-groups (node)C set apply-groups $(node)D set apply-groups (node)all

考题 单选题A company has completed two acquisitions over the previous year. Each of the acquired companies was allowed to keep its own independent authentication server. The network administrator has been asked to roll out the Junos Pulse Access Control Service to users within the original company along with each of the two acquired organizations.The administrator configures three authentication realms, one for each independent authentication server, and associates them all with a single sign-in policy. All of the client endpoints are running Junos Pulse on their Windows XP desktops. When a user signs in to the Junos Pulse Access Control Service, which statement is correct?()A The first authentication realm that was added to the sign-in policy is used by default.B The user is allowed to choose the correct authentication realm from a list presented by Junos Pulse.C When Junos Pulse is initially installed on the desktop, it must be configured with the correct realm.D This is not an allowed configuration; the administrator should configure separate sign-in policies for each realm.

考题 单选题You are deploying a Junos Pulse Access Control Service cluster in active/passive mode. How do you configure the IP address on the SRX Series devices?()A Configure a single Junos Pulse Access Control Service instance on the enforcer, specifying the VIP as the IP address the instance.B Configure multiple Junos Pulse Access Control Service instances on the enforcer, specifying the specific IP address each device in a separate instance.C Configure a single Junos Pulse Access Control Service instance on the enforcer, specifying the VIP and active node address in the instance.D Configure a single Junos Pulse Access Control Service instance on the enforcer, specifying the VIP and passive node address in the instance.

考题 单选题You need to design an access control strategy that meets business and security requirements. Your solution must minimize forestwide replication. What should you do?()A Create a global group for each department and a global group for each location. Add users to their respective departmental groups as members. Place the departmental global groups within the location global groups. Assign the location global groups to file and printer resources in their respective domains, and then assign permissions for the file and printer resources by using the location global groupsB Create a global group for each department, and add the respective users as members. Create domain local groups for file and printer resources. Add the global groups to the respective domain local groups. Then, assign permissions to the file and printer resources by using the domain local groupsC Create a local group on each server and add the authorized users as members. Assign appropriate permissions for the file and printer resources to the local groupsD Create a universal group for each location, and add the respective users as members. Assign the universal groups to file and printer resources. Then, assign permissions by using the universal groups

考题 多选题A customer has purchased a third-party switch to use for Layer 2 access with their Junos Pulse Access Controe Service. When configuring the switch on the Junos Pulse Access Control Service, the customer does not find a make/model entry for it . Which two actions should the customer take to make the switch work with the Junos Pulse Access Control Service?()AAdd the switch to the Junos Pulse Access Control Service as a standard RADIUS.BAdd the switch to the Junos Pulse Access Control Service using the Any make/model.CAdd the switch as a firewall enforcer.DObtain and configure the RADIUS dictionary for the switch and use that vendor listing for the make/model.

考题 单选题The arrangement and shape of the cams on a diesel engine camshaft directly control which of the listed groups of operating conditions?()A speed, torque, and horsepower productionB firing order, valve timing, and valve liftC fuel consumption, efficiency, and cylinder pressureD scavenge pressure, compression ratio, and exhaust pressure

考题 多选题What are two use cases enabled by IF-MAP Federation?()AUsers authenticated to one Junos Pulse Access Control Service can transparently access resources protected by another Junos Pulse Access Control Service.BUsers authenticated to a Junos Pulse Access Control Service can transparently access resources protected by a Junos Pulse Secure Access Service.CRemote access users authenticated to a Junos Pulse Secure Access Service can transparently access resources protected by a Junos Pulse Access Control Service.DRemote access users authenticated to one Junos Pulse Secure Access Service can transparently access resources protected by another Junos Pulse Secure Access Service.

考题 多选题You have three classes of users on your network: employee, contractor, and IT administrator. You configure the Junos Pulse Access Control Service to assign roles to each user class and require that a specific wireless SSID be preconfigured for the Odyssey Access Client based on the role. Which configuration method should you use to satisfy this scenario?()ACreate a Settings Update file in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under User Roles Agent Odyssey Settings Preconfigured Installer.BConfigure a wired adapter and assign the required SSID under User Roles Agent Odyssey Settings.CCreate a script in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under User Roles Agent Odyssey Settings Preconfigured Installer.DCreate a Preconfiguration file in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under User Roles Agent Odyssey Settings Preconfigured Installer.

考题 单选题You have configured Junos Pulse on your Windows desktop and want to verify that the IPsec configuration policy is being pushed down to your workstation upon network authentication and login.Which utility program do you use to see this configuration and where do you find it?()A the Pulse Diagnostics Tool in the File Tools menu option in the Pulse GUIB the Pulse Diagnostics Tool in the Start All Programs Juniper Networks Junos Pulse menu folder next to the Junos Pulse applicationC the Pulse Diagnostics Viewer, which you access by simultaneously pressing Ctrl and F2D the Pulse Diagnostics Viewer in the File Tools menu option in the Pulse GUI

考题 单选题Which parameter do you use to enable Junos Pulse Access Control Service enforcement on a policy on a ScreenOS platform?()A uac-policyB ic-policyC inyranet-authD uac-auth

考题 多选题Your IT director has decided to allow employees to use their laptops at home as well as in the office. You have deployed the Junos Pulse client to allow access to the offices 802.1X-enabled wired network. Your company also has the Junos Pulse Secure Access Service deployed. You want the Junos Pulse client to automatically launch the appropriate access method depending on each users location. Which three are supported to determine the users location?()AMAC addressBDNS serverCDHCP serverDresolve addressEendpoint address

考题 单选题You are designing an application that will use Windows Azure Table storage to store millions of data points each day.  The application must retain each day’s data for only one week.   You need to recommend an approach for minimizing storage transactions.  What should you recommend?()A  Use a separate table for each date.  Delete eachtable when it is one week old.B  Use a separate table for each week.  Delete each table when it is one week old.C  Use a single table, partitioned by date.  Use Entity Group Transactions to delete data when it is one week old.D  Use a single table, partitioned by week.  Use Entity Group Transactions to delete data when it is one week old.

考题 多选题You want to provide 802.1X access for Windows clients using Junos Pulse as the agent. Which two considerations must you take into account()AJunos Pulse out erauth entication uses EAP-PEAP.BJunos Pulse ou terauth entication uses EAP-TTLS.CJunos Pulse innerauth entication uses EAP-MSCHAP-V2.DTheend point must use thenative Microsoft 802.1X supplicant.

考题 单选题You are the network administrator for your company. The network consists of a single Active   Directory forest. The forest consists of 19 Active Directory domains. Fifteen of the domains contain  Windows Server 2003 domain controllers. The functional level of all the domains is Windows 2000 native.  The network also consists of a single Microsoft Exchange 2000 Server organization. You need to create  groups that can be used only to send e-mail messages to user accounts throughout the company. You  want to achieve this goal by using the minimum amount of replication traffic and minimizing the size of the  Active Directory database. You need to create a plan for creating e-mail groups for your company.  What should you do?()A  Create global distribution groups in each domain. Make the appropriate users from each domain members of the global distribution group in the same domain. Create universal distribution groups. Make the global distribution groups in each domain members of the universal distribution groups.B  Create global security groups in each domain. Make the appropriate users from each domain members of the security group in the same domain. Create universal security groups. Make the global security groups in each domain members of the universal security groups.C  Create universal distribution groups. Make the appropriate users from each domain members of a universal distribution group.D  Create universal security groups. Make the appropriate users from each domain members of a universal security group.

考题 单选题According to Para. 3, all the followings are the cultural or technological innovation EXCEPT _____.A the transformation of these valleys and plainsB the use of these valleys’ soil and waterC the timing of flood seasonsD the calendar