网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
How are the commands a user is allowed to enter defined in JUNOS?()
A

Permissions are configured individually for each user.

B

Users are associated with user classes, and each class defines the permissions for entering commands.

C

There are four default classes with different permissions and you can only use these four.

D

Permissions are associated with each user ID


参考答案

参考解析
解析: 暂无解析
更多 “单选题How are the commands a user is allowed to enter defined in JUNOS?()A Permissions are configured individually for each user.B Users are associated with user classes, and each class defines the permissions for entering commands.C There are four default classes with different permissions and you can only use these four.D Permissions are associated with each user ID” 相关考题
考题 You are the administrator of a Windows 2000 Professional computer that is shared by several users in the Sales department. User accounts have been created for current users. Current users can log on to the computers. To accommodate new users, you add two new user accounts named User7 and User8 to computer5. When User7 attempts to log on o the computer, she receives the following error message: "Windows cannot copy file C:\Documents and Settings\Default User\ to location C:\Documents and Settings\User7. Contact your network administrator. Detail - Access is denied." When User8 attempts to log on to the computer, he receives the same type of error message.You want to allow the two new users, as well as other users in the Sales department, to be able to log on to the computer.Which two methods can you use to accomplish your goal? (Choose two.)A.Add the User7 and User8 user accounts to the DACL for the Profiles shared folder on the network server.B.Add the User7 and User8 user accounts to the DACL for the C:\Documents and Settings\Default User folder.C.Add the Everyone group to the DACL for the C:\Documents and Settings\Default User folder.D.Add a Group Policy object (GPO) for the Sales OU that redirects user profiles to a shared folder.E.Log on by using the local Administrator account and create new folders for User7 and User8 in the C:\Documents and Settings folder.F.Select the allow inheritable permissions from parent to propagate to this object option on the C:\Documents and Settings\Default User folder, and reset the permissions on all child objects.G.Move and retain permissions and compressions.

考题 A company has completed two acquisitions over the previous year. Each of the acquired companies was allowed to keep its own independent authentication server. The network administrator has been asked to roll out the Junos Pulse Access Control Service to users within the original company along with each of the two acquired organizations.The administrator configures three authentication realms, one for each independent authentication server, and associates them all with a single sign-in policy. All of the client endpoints are running Junos Pulse on their Windows XP desktops.When a user signs in to the Junos Pulse Access Control Service, which statement is correct?()A. The first authentication realm that was added to the sign-in policy is used by default.B. The user is allowed to choose the correct authentication realm from a list presented by Junos Pulse.C. When Junos Pulse is initially installed on the desktop, it must be configured with the correct realm.D. This is not an allowed configuration; the administrator should configure separate sign-in policies for each realm.

考题 Which two statements are true of login classes?() A. Users can be members of multiple login classes.B. Login classes define authorization parameters for a user.C. There are five system-defined login classes.D. Login class permission flags can be overridden for certain commands.

考题 Which two statements about login classes correctly define their usage within the JUNOS software?() A.A different login class must be configured for each user.B.Individual commands can be explicitly allowed or denied.C.A user must be assigned to one of the default login classes.D.Each login class is associated with one or more permissions flags.

考题 How are the commands a user is allowed to enter defined in JUNOS?() A.Permissions are configured individually for each user.B.Users are associated with user classes, and each class defines the permissions for entering commands.C.There are four default classes with different permissions and you can only use these four.D.Permissions are associated with each user ID

考题 When a new trunk link is configured on an IOS based switch, which VLANs are allowed over the link?() A. All defined VLANs are allowed on the trunk by default.B. Each VLAN, or VLAN range, that is specified with the switchport mode command.C. Each VLAN, or VLAN range, that is specified with the vtp domain command.D. Each VLAN, or VLAN range, that is specified with the vlan database command.

考题 How are the commands a user is allowed to enter defined in JUNOS?()A、Permissions are configured individually for each user.B、Users are associated with user classes, and each class defines the permissions for entering commands.C、There are four default classes with different permissions and you can only use these four.D、Permissions are associated with each user ID

考题 Which two statements are true of login classes?()A、Users can be members of multiple login classes.B、Login classes define authorization parameters for a user.C、There are five system-defined login classes.D、Login class permission flags can be overridden for certain commands.

考题 You need to configure port security on switch R1.  Which two statements are true about this  technology? ()A、 Port security can be configured for ports supporting VoIP.B、 With port security configured, four MAC addresses are allowed by default.C、 The network administrator must manually enter the MAC address for each device in order for  the switch to allow connectivity.D、Withsecurity configured, only one MAC addresses is allowed by default.  E、 Port security cannot be configured for ports supporting VoIP.

考题 Which two statements about login classes correctly define their usage within the JUNOS software?()A、A different login class must be configured for each user.B、Individual commands can be explicitly allowed or denied.C、A user must be assigned to one of the default login classes.D、Each login class is associated with one or more permissions flags.

考题 You are the network administrator for Testking.com. The network consists of a single Active Directory domain named testking.com. The sales department is hiring employees. An OU named TestKingSales is created to hold objects for the new sales department users. Each sales department user has a portable computer. Each portable computer runs Windows XP Professional. The sales department users are responsible for joining their portable computers to the domain. You need to ensure that the computer accounts for the Sales department user's portable computers are created in the TestKingSales OU. You need to achieve this goal without granting any unnecessary permissions. What should you do?()A、Assign the sales department users the Allow - Read permissions for the Computer container.B、Configure the sales department users' user accounts to be trusted for delegationC、Prestage the computer accounts in the TestKingSales OU for the sales department users' portable computers.D、Assign the sales depertment users the Allow - Create all Child Objects permission for the TestKingSales OU.

考题 You need to design an administrative model for the Exchange Server environment. What should you do?()A、Create a single organizational unit (OU). Place the user accounts for each office in the OU. Delegate control over the OU to the office’s server administrators and the central IT staffB、Create a single Exchange administrative group. Place all Exchange servers into that administrative group. Assign permissions for the administrative group to the officer’s server administrators and the central IT staffC、Create an Exchange administrative group for each office. Place the Exchange severs for each office into that office’s administrative group. Assign permissions for the administrative group to the office’s server administrators. Allow the central IT staff to manage user mailboxesD、Create an organizational unit (OU) for each office. Place the user accounts for each office into the appropriate OU. Delegate control over each OU to the office’s server administrators. Allow the central IT staff to manager user mailboxes

考题 You are the administrator of your company’s network. You purchase 75 new Windows 2000 Professional computers that will be shared by the users in Graphic organizational unit (OU). All the computers are configured identically. You want the users to be able to maintain their individual desktop settings regardless of which computer they use. You want to accomplish this with the least amount of administrative effort. What should you do? ()A、Configure each computer to join a workgroup.      Create a user account and a local profile for each user. B、Configure each computer to join a workgroup.      Create a domain user account that uses roaming user profiles. C、Configure each computer to join the domain.      Create a user account for each user on a domain controller. D、Configure each computer to join the domain.      Create domain user accounts that use roaming user profiles.

考题 You need to design an access control and permission strategy for user objects in Active Directory.What should you do?()A、Make the members of the AdvancedSupport security group members of the Domain Admins security groupB、Give each desktop support technician permission to reset passwords for the top-level OU that contains user accounts at their own locationC、Delegate full control over all OUs that contain user accounts to all AllSupport  security groupD、Change the permissions on the domain object and its child objects so that the BasicSupport security group is denied permissions. Then, add a permission to each OU that contains user accounts that allows AllSupport security group members to reset passwords in that OU

考题 Your company has four offices.   The network contains a single Active Directory domain.   Each office has domain controller. Each office has an organitational unit (OU) that contains the  user accounts for the users in that office.   In each office, support technicians perform basic troubleshooting for the users in their respective  office.   You need to ensure that the support technicians can reset the password for the user accounts in  their respective office only. The solution must prevent the thechnicians from creating user  accounts.   What shoul you do()A、Four each OU, run the Delegation of Control Wizard.B、For the domain, run the Delegation of Control Wizard.C、For each office, create an Active Directory group, and then modify the security setting for each group.D、For each office, create an Active Directory group, and then modify the contorlAccessRights attirbute for each group

考题 You network contains a server named Server1. You have a computer named Computer1 that runs Windows XP Professional. Employees log on to Computer1 by using local user accounts. You need to configure the user profiles on Computer1 to be stored on Server1. What should you do?() A、On Computer1, map a drive to an administrative share on Server1.  Configure each user's profile path to point to the mapped drive. B、Create a shared folder on Server1.  Assign Full Control permissions to all users. On Computer1, configure each user's profile path to a folder in the shared folder. C、Create a shared folder on Server1.  Assign Full Control permissions to all users. On Computer1, configure each user's home folder path to a folder in the shared folder. D、On Computer1, map a drive from each client computer to an administrative share on Server1.  Configure each user's home folder path to point to the mapped drive. 

考题 单选题You are the network administrator for Testking.com. The network consists of a single Active Directory domain named testking.com. The sales department is hiring employees. An OU named TestKingSales is created to hold objects for the new sales department users. Each sales department user has a portable computer. Each portable computer runs Windows XP Professional. The sales department users are responsible for joining their portable computers to the domain. You need to ensure that the computer accounts for the Sales department user's portable computers are created in the TestKingSales OU. You need to achieve this goal without granting any unnecessary permissions. What should you do?()A Assign the sales department users the Allow - Read permissions for the Computer container.B Configure the sales department users' user accounts to be trusted for delegationC Prestage the computer accounts in the TestKingSales OU for the sales department users' portable computers.D Assign the sales depertment users the Allow - Create all Child Objects permission for the TestKingSales OU.

考题 多选题Which two statements are true of login classes?()AUsers can be members of multiple login classes.BLogin classes define authorization parameters for a user.CThere are five system-defined login classes.DLogin class permission flags can be overridden for certain commands.

考题 单选题You network contains a server named Server1. You have a computer named Computer1 that runs Windows XP Professional. Employees log on to Computer1 by using local user accounts. You need to configure the user profiles on Computer1 to be stored on Server1. What should you do?()A On Computer1, map a drive to an administrative share on Server1.  Configure each user's profile path to point to the mapped drive. B Create a shared folder on Server1.  Assign Full Control permissions to all users. On Computer1, configure each user's profile path to a folder in the shared folder. C Create a shared folder on Server1.  Assign Full Control permissions to all users. On Computer1, configure each user's home folder path to a folder in the shared folder. D On Computer1, map a drive from each client computer to an administrative share on Server1.  Configure each user's home folder path to point to the mapped drive. 

考题 单选题From the DX WebUI Dashboard, which steps are used for creating a new admin user? ()A Click Admin Users. Enter username, password, role, account status, and email.B Click Admin Users. Enter username, password, role, account status, and user class.C Click Users Manage Users. Enter username, password, role, account status, and user class.D Click Users Manage Users. Enter username, password, ActiveDirectory domain, account status, and role.

考题 单选题A company has completed two acquisitions over the previous year. Each of the acquired companies was allowed to keep its own independent authentication server. The network administrator has been asked to roll out the Junos Pulse Access Control Service to users within the original company along with each of the two acquired organizations.The administrator configures three authentication realms, one for each independent authentication server, and associates them all with a single sign-in policy. All of the client endpoints are running Junos Pulse on their Windows XP desktops. When a user signs in to the Junos Pulse Access Control Service, which statement is correct?()A The first authentication realm that was added to the sign-in policy is used by default.B The user is allowed to choose the correct authentication realm from a list presented by Junos Pulse.C When Junos Pulse is initially installed on the desktop, it must be configured with the correct realm.D This is not an allowed configuration; the administrator should configure separate sign-in policies for each realm.

考题 单选题You need to design an access control and permission strategy for user objects in Active Directory.What should you do?()A Make the members of the AdvancedSupport security group members of the Domain Admins security groupB Give each desktop support technician permission to reset passwords for the top-level OU that contains user accounts at their own locationC Delegate full control over all OUs that contain user accounts to all AllSupport  security groupD Change the permissions on the domain object and its child objects so that the BasicSupport security group is denied permissions. Then, add a permission to each OU that contains user accounts that allows AllSupport security group members to reset passwords in that OU

考题 单选题Your company has an Exchange Server 2010 organization. A user named User1 is configured as a Delegate for a user named User2. You need to ensure that User1 can add User2 in the From field when sending email messages. Messages that contain User2 in the From field must display User2 as the message sender when recipients receive the messages.  What should you do()?A Remove User1 as a delegate, and then grant User1 Send As permissions to User2¯s mailboxB Remove User1 as a delegate, and then grant User1 Send on Behalf permissions to User2¯s mailboxC Create a Sharing policy, and then grant User1 Modify permissions to User2¯s mailboxD Create a Sharing policy, and then grant User1 Full Mailbox permissions to User2¯s mailbox

考题 多选题You need to configure port security on switch R1.  Which two statements are true about this  technology? ()APort security can be configured for ports supporting VoIP.BWith port security configured, four MAC addresses are allowed by default.CThe network administrator must manually enter the MAC address for each device in order for  the switch to allow connectivity.DWithsecurity configured, only one MAC addresses is allowed by default.EPort security cannot be configured for ports supporting VoIP.

考题 单选题You are the administrator of your company’s network. You purchase 75 new Windows 2000 Professional computers that will be shared by the users in Graphic organizational unit (OU). All the computers are configured identically. You want the users to be able to maintain their individual desktop settings regardless of which computer they use. You want to accomplish this with the least amount of administrative effort. What should you do? ()A Configure each computer to join a workgroup.      Create a user account and a local profile for each user. B Configure each computer to join a workgroup.      Create a domain user account that uses roaming user profiles. C Configure each computer to join the domain.      Create a user account for each user on a domain controller. D Configure each computer to join the domain.      Create domain user accounts that use roaming user profiles.

考题 多选题Which two statements about login classes correctly define their usage within the JUNOS software?()AA different login class must be configured for each user.BIndividual commands can be explicitly allowed or denied.CA user must be assigned to one of the default login classes.DEach login class is associated with one or more permissions flags.

考题 单选题You need to design an administrative model for the Exchange Server environment. What should you do?()A Create a single organizational unit (OU). Place the user accounts for each office in the OU. Delegate control over the OU to the office’s server administrators and the central IT staffB Create a single Exchange administrative group. Place all Exchange servers into that administrative group. Assign permissions for the administrative group to the officer’s server administrators and the central IT staffC Create an Exchange administrative group for each office. Place the Exchange severs for each office into that office’s administrative group. Assign permissions for the administrative group to the office’s server administrators. Allow the central IT staff to manage user mailboxesD Create an organizational unit (OU) for each office. Place the user accounts for each office into the appropriate OU. Delegate control over each OU to the office’s server administrators. Allow the central IT staff to manager user mailboxes