juniper认证考试

You have created a Host Checker policy that contains multiple rules. You want to inform end users which rule specifically has failed.In the admin GUI, which configuration setting would you enable?()A、Enable Custom InstructionsB、Pre-auth notificationC、Reme

题目

You have created a Host Checker policy that contains multiple rules. You want to inform end users which rule specifically has failed.In the admin GUI, which configuration setting would you enable?()

  • A、Enable Custom Instructions
  • B、Pre-auth notification
  • C、Remediation message
  • D、Send reason strings
参考答案和解析
正确答案:D
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

You want to restrict access to a role based on the client machine from which the user is accessing the network.Which two role restrictions accomplish this goal? ()

A. user name

B. password length

C. certificate

D. Host Checker


参考答案:C, D

第2题:

After executing the "show host" command, which of the information below would you see?()

A. The IP addresses of workstations allowed gain access to the router via an access list

B. Permanent name-to-address mappings created using the ip host command.

C. Temporary and permanent DNS entries.

D. The names of the routers created using the hostname command.

E. The length of time of users logged into the router, as well as the duration


参考答案:B, D

第3题:

Your security policy requires that users authenticating to the Junos Pulse Access Control Service are connecting from a domain member endpoint on the internal corporate network.Which set of role access restrictions must you configure to enforce this security policy?()

A. Source IP and browser

B. Source IP and certificate

C. Certificate and Host Checker

D. Host Checker and source IP


参考答案:D

第4题:

Your security policy requires that users authenticating to the Junos Pulse Access Control Service are connecting from a domain member endpoint on the internal corporate network.Which set of role access restrictions must you configure to enforce this security policy?()

  • A、Source IP and browser
  • B、Source IP and certificate
  • C、Certificate and Host Checker
  • D、Host Checker and source IP

正确答案:D

第5题:

What happens when Host Checker is configured to perform checks every "0" minutes? ()

  • A、Host Checker is disabled.
  • B、Host Checker will perform continous checks.
  • C、Host Checker will perform checks when user logs out.
  • D、Host Checker will perform checks when user first logs in.

正确答案:D

第6题:

You want to create a Host Checker policy that looks for a specific antivirus product that is running on your client machines, but the predefined antivirus options do not include the antivirus product version that you use.Which feature should you verify the antivirus product is up to date?()

A. Enhanced Endpoint Security

B. DP signatures

C. Antivirus licensing

D. Endpoint Security Assessment Plug-in


参考答案:D

第7题:

While designing your database, you have created the EMPLOYEES table as an index/x7forganized table (IOT). You want to create a bitmap index on the JOB_ID column to make queries faster. Which task must have been completed so that you are able to create the bitmap index?()

  • A、A primary key must have been created.
  • B、A mapping table must have been created.
  • C、An overflow tablespace must have been specified.
  • D、The PCTTHRESHOLD option must have been specified.

正确答案:B

第8题:

You have created a Host Checker policy that contains multiple rules. You want to inform end users which rule specifically has failed.In the admin GUI, which configuration setting would you enable?()

A. Enable Custom Instructions

B. Pre-auth notification

C. Remediation message

D. Send reason strings


参考答案:D

第9题:

After executing the "show host" command, which of the information below would you see?()

  • A、The IP addresses of workstations allowed gain access to the router via an access list
  • B、Permanent name-to-address mappings created using the ip host command.
  • C、Temporary and permanent DNS entries.
  • D、The names of the routers created using the hostname command.
  • E、The length of time of users logged into the router, as well as the duration

正确答案:B,D

第10题:

You want to restrict access to a role based on the client machine from which the user is accessing the network.Which two role restrictions accomplish this goal? ()

  • A、user name
  • B、password length
  • C、certificate
  • D、Host Checker

正确答案:C,D

更多相关问题