网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
You administer a network with Windows-based endpoints that have custom software images. You want to use Host Checker to require that endpoints are running the custom software image.Which two Host Checker policy rules would be used to enforce this requirement?()
A

Isolate a file name unique to the custom image and create a custom rule-type of File which matches on the file. Select the Required option under the custom rule.

B

Identify the MAC address unique to network cards installed in PCs with the custom image and create a custom rule-type of MAC Address which matches on the appropriate MAC address.

C

Select the Required option under the custom rule Identify the IP address unique to the network cards installed in PCs with the custom image and create a custom rule-type of IP Address which matches on the appropriate IP address. Select the Required option under the custom rule.

D

Isolate or create a unique Windows registry key for the custom image and create a custom rule- type of Registry Setting which matches on the name of the registry key.


参考答案

参考解析
解析: 暂无解析
更多 “多选题You administer a network with Windows-based endpoints that have custom software images. You want to use Host Checker to require that endpoints are running the custom software image.Which two Host Checker policy rules would be used to enforce this requirement?()AIsolate a file name unique to the custom image and create a custom rule-type of File which matches on the file. Select the Required option under the custom rule.BIdentify the MAC address unique to network cards installed in PCs with the custom image and create a custom rule-type of MAC Address which matches on the appropriate MAC address.CSelect the Required option under the custom rule Identify the IP address unique to the network cards installed in PCs with the custom image and create a custom rule-type of IP Address which matches on the appropriate IP address. Select the Required option under the custom rule.DIsolate or create a unique Windows registry key for the custom image and create a custom rule- type of Registry Setting which matches on the name of the registry key.” 相关考题
考题 Your security policy requires that users authenticating to the Junos Pulse Access Control Service are connecting from a domain member endpoint on the internal corporate network.Which set of role access restrictions must you configure to enforce this security policy?()A. Source IP and browserB. Source IP and certificateC. Certificate and Host CheckerD. Host Checker and source IP

考题 You have created a Host Checker policy that contains multiple rules. You want to inform end users which rule specifically has failed.In the admin GUI, which configuration setting would you enable?() A. Enable Custom InstructionsB. Pre-auth notificationC. Remediation messageD. Send reason strings

考题 You want to restrict access to a role based on the client machine from which the user is accessing the network.Which two role restrictions accomplish this goal? () A. user nameB. password lengthC. certificateD. Host Checker

考题 You want to create a Host Checker policy that looks for a specific antivirus product that is running on your client machines, but the predefined antivirus options do not include the antivirus product version that you use.Which feature should you verify the antivirus product is up to date?()A. Enhanced Endpoint SecurityB. DP signaturesC. Antivirus licensingD. Endpoint Security Assessment Plug-in

考题 What happens when Host Checker is configured to perform checks every "0" minutes? () A. Host Checker is disabled.B. Host Checker will perform continous checks.C. Host Checker will perform checks when user logs out.D. Host Checker will perform checks when user first logs in.

考题 You are a network administrator for The network consists of a single Active Directory domain named.The domain contains two Windows Server 2003 terminal servers that host applications that are used by company employees. An organization unit (OU) named TerminalServers contains only the computer accounts for these two Terminal servers. A Group Policy object (GPO) named TSPolicy is linked to the TerminalServers OU, and you have been granted the right to modify the GPO.Users should use the terminal servers to run only authorized applications. A custom financial application suite is currently the only allowed application. The financial application suite is installed in the folder C:\Program Files\MT Apps. The financial application suite contains many executable files.Users must also be able to use Internet Explorer to access a browser-based application on the company intranet. The browser-based application makes extensive use of unsigned ActiveX components.The financial application suite and the browser-based application are frequently updates with patches or new versions.You need to configure the terminal servers to prevent users from running unauthorized applications. You plan to configure software restriction policies in the TSPolicy GPO. To reduce administrative overhead, you want to create a solution that can be implemented once, without requiring constant reconfiguration.Which three actions should you perform to configure software restriction polices?()(Each correct answer presents part of the solution. Choose three)

考题 You want to create a Host Checker policy that looks for a specific antivirus product that is running on your client machines, but the predefined antivirus options do not include the antivirus product version that you use.Which feature should you verify the antivirus product is up to date?()A、Enhanced Endpoint SecurityB、DP signaturesC、Antivirus licensingD、Endpoint Security Assessment Plug-in

考题 You want to enforce a Host Checker policy so that only users who pass the policy receive the Employee role. In the admin GUI, which two parameters must you configure?()A、Select "Require and Enforce" for the Host Checker Policy in the realm authentication policy.B、Select "Evaluate Policies" for the Host Checker policy in the realm authentication policy.C、Configure the Host Checker policy as a role restriction for the Employee role.D、Configure the Host Checker policy as a resource access policy for the Employee role.

考题 Your security policy requires that users authenticating to the Junos Pulse Access Control Service are connecting from a domain member endpoint on the internal corporate network.Which set of role access restrictions must you configure to enforce this security policy?()A、Source IP and browserB、Source IP and certificateC、Certificate and Host CheckerD、Host Checker and source IP

考题 Which two statements are true about applying Host Checker at the realm level?()A、If Evaluate is checked then the client must pass policy to get the sign-in page.B、If Evaluate is checked then the client can fail policy and still get the sign-in page.C、If Require and Enforce is checked then the client must pass policy to get the sign-in page.D、If Require and Enforce is checked then the client can fail policy and still get the sign-in page.

考题 What are two valid configurations for user-driven remediation when a Windows-based endpoint fails a Host Checker policy?()A、Kill a running process on the endpoint, based on executable name and MD5 checksum.B、Delete a file on the endpoint's file system.C、Download and run a remediation executable from the local software distribution server.D、Alter registry entries to prevent future execution of an executable, based on executable name and full path.

考题 You have created a Host Checker policy that contains multiple rules. You want to inform end users which rule specifically has failed.In the admin GUI, which configuration setting would you enable?()A、Enable Custom InstructionsB、Pre-auth notificationC、Remediation messageD、Send reason strings

考题 You administer a network with Windows-based endpoints that have custom software images. You want to use Host Checker to require that endpoints are running the custom software image.Which two Host Checker policy rules would be used to enforce this requirement?()A、Isolate a file name unique to the custom image and create a custom rule-type of "File" which matches on the file. Select the "Required" option under the custom rule.B、Identify the MAC address unique to network cards installed in PCs with the custom image and create a custom rule-type of "MAC Address" which matches on the appropriate MAC address.C、Select the "Required" option under the custom rule Identify the IP address unique to the network cards installed in PCs with the custom image and create a custom rule-type of "IP Address" which matches on the appropriate IP address. Select the "Required" option under the custom rule.D、Isolate or create a unique Windows registry key for the custom image and create a custom rule- type of "Registry Setting" which matches on the name of the registry key.

考题 You want to restrict access to a role based on the client machine from which the user is accessing the network.Which two role restrictions accomplish this goal? ()A、user nameB、password lengthC、certificateD、Host Checker

考题 You administer a network containing SRX Series firewalls. New policy requires that you implement MAG Series devices to provide access control for end users. The policy requires that the SRX Series devices dynamically enforce security policy based on the source IP address of the user. The policy also requires that the users communicate with protected resources using encrypted traffic. Which two statements are true?()A、The endpoints can use agentless access.B、Encrypted traffic flows between the endpoint and the enforcer.C、Encrypted traffic flows between the endpoint and the protected resourceD、The endpoints can use the Odyssey Access Client.

考题 You work as a database administrator for Supportcenter.cn. You want to administer your database servers, which are running on different host machines, using the Web-enabled grid control interface. You have configured the agent on the host machines. You have started the Oracle Database 10g Grid Control utility on your machine. Which two additional components would you configure to achieve this objective?()A、Application Server ControlB、Oracle Management ServiceC、Oracle Enterprise Manager RepositoryD、Oracle Enterprise Manager Database Control

考题 You are the administrator of a Windows 2000 domain. You develop a graphics software application for users in the Graphics organizational unit (OU). You want to create a custom installation for three users named Carlos, Carmen, and Maria, who are members of the Graphics OU. You want these three users to be able to access additional text, filters, and other graphics options for the software. What should you do? ()A、 Create the Graphic Users OU in the domain. Add a custom .msi file to the Graphics OUB、 Create the Graphic Users OU in the domain. Add a custom .mst file to the Graphics OUC、 Create the Advanced Software OU within the Graphics OU, and add Carlos, Carmen, and  Maria.Create an .msi file, including changes, and apply the modifications to the Advanced Software OUD、 Create the Advanced Software OU within the Graphics OU, and add Carlos. Carmen, and Maria. Create an: mst file, including changes, and apply the modifications to the Advanced Software OU

考题 多选题To ensure device security, Cisco Network Admission Control works with antivirus software onwhich two endpoints? ()AportBserverClaptopDwireless client

考题 多选题You are designing a Windows Azure application that will communicate with existing on-premise applications and services.  The application will be activated for Windows Azure Connect.  You need to recommend a solution for completing the Windows Azure Connect configuration.  Which two actions should you recommend?()APlace local endpoints in groups and then configure a connection between the groups and the application.BPlace hosted endpoints in groups and then configure a connection between the groups and the application.CInstall endpoint software on local computers or virtual machines.DInstall endpoint software on hosted virtual machines.

考题 单选题You are the administrator of a Windows 2000 domain. You develop a graphics software application for users in the Graphics organizational unit (OU). You want to create a custom installation for three users named Carlos, Carmen, and Maria, who are members of the Graphics OU. You want these three users to be able to access additional text, filters, and other graphics options for the software. What should you do? ()A  Create the Graphic Users OU in the domain. Add a custom .msi file to the Graphics OUB  Create the Graphic Users OU in the domain. Add a custom .mst file to the Graphics OUC  Create the Advanced Software OU within the Graphics OU, and add Carlos, Carmen, and  Maria.Create an .msi file, including changes, and apply the modifications to the Advanced Software OUD  Create the Advanced Software OU within the Graphics OU, and add Carlos. Carmen, and Maria. Create an: mst file, including changes, and apply the modifications to the Advanced Software OU

考题 多选题You administer a network with Windows-based endpoints that have custom software images. You want to use Host Checker to require that endpoints are running the custom software image.Which two Host Checker policy rules would be used to enforce this requirement?()AIsolate a file name unique to the custom image and create a custom rule-type of File which matches on the file. Select the Required option under the custom rule.BIdentify the MAC address unique to network cards installed in PCs with the custom image and create a custom rule-type of MAC Address which matches on the appropriate MAC address.CSelect the Required option under the custom rule Identify the IP address unique to the network cards installed in PCs with the custom image and create a custom rule-type of IP Address which matches on the appropriate IP address. Select the Required option under the custom rule.DIsolate or create a unique Windows registry key for the custom image and create a custom rule- type of Registry Setting which matches on the name of the registry key.

考题 单选题Your security policy requires that users authenticating to the Junos Pulse Access Control Service are connecting from a domain member endpoint on the internal corporate network.Which set of role access restrictions must you configure to enforce this security policy?()A Source IP and browserB Source IP and certificateC Certificate and Host CheckerD Host Checker and source IP

考题 多选题What are two valid configurations for user-driven remediation when a Windows-based endpoint fails a Host Checker policy?()AKill a running process on the endpoint, based on executable name and MD5 checksum.BDelete a file on the endpoint's file system.CDownload and run a remediation executable from the local software distribution server.DAlter registry entries to prevent future execution of an executable, based on executable name and full path.

考题 多选题You administer a network containing SRX Series firewalls. New policy requires that you implement MAG Series devices to provide access control for end users. The policy requires that the SRX Series devices dynamically enforce security policy based on the source IP address of the user. The policy also requires that the users communicate with protected resources using encrypted traffic. Which two statements are true?()AThe endpoints can use agentless access.BEncrypted traffic flows between the endpoint and the enforcer.CEncrypted traffic flows between the endpoint and the protected resourceDThe endpoints can use the Odyssey Access Client.

考题 多选题You want to enforce a Host Checker policy so that only users who pass the policy receive the Employee role. In the admin GUI, which two parameters must you configure?()ASelect Require and Enforce for the Host Checker Policy in the realm authentication policy.BSelect Evaluate Policies for the Host Checker policy in the realm authentication policy.CConfigure the Host Checker policy as a role restriction for the Employee role.DConfigure the Host Checker policy as a resource access policy for the Employee role.

考题 多选题You work as a database administrator for Certkiller .com. You want to administer your database servers,which are running on different host machines,using the Web-enabled grid control interface. You have configured the agent on the host machines. You have started the Oracle Database 10g Grid Control utility on your machine. Which two additional components would you configure to achieve this objective?()AApplication Server ControlBOracle Management ServiceCOracle Enterprise Manager RepositoryDOracle Enterprise Manager Database Control

考题 多选题Which two statements are true about applying Host Checker at the realm level?()AIf Evaluate is checked then the client must pass policy to get the sign-in page.BIf Evaluate is checked then the client can fail policy and still get the sign-in page.CIf Require and Enforce is checked then the client must pass policy to get the sign-in page.DIf Require and Enforce is checked then the client can fail policy and still get the sign-in page.

考题 单选题You are the desktop administrator for your company's sales department. The IT manager for the sales department needs to distribute a custom application to the Windows XP Professional computers in the sales department. He deploys the software by using Group Policy. Susan is a user in the sales department. She reports that the custom application is not available. You examine her computer, and you verify that the application is not present on her computer. You want to ensure that the software is deployed the next time Susan logs on. Which command should you run?()A Secedit /refreshpolicy user_policy /enforceB Secedit /refreshpolicy machine_policy /enforceC Gpupdate /target:computer /syncD Gpupdate /target:user /sync