Tcl
telephony
application
IP-telephony
telephony-service
第1题:
On the Junos Pulse Access Control Service, you have created a role called Secret that you only want to provide to users who present a certificate.Using the admin GUI, which two features would you configure to satisfy this requirement?()
A. Sign-in Policy
B. Role Mapping Rule
C. Role Restrictions
D. Trusted Server CA
第2题:
A. Configure a captive-portal service that redirects all traffic back to the Junos Pulse Access Control Service.
B. Configure a security policy that references the unified-access-control captive-portal service.
C. Configure a captive-portal service that redirects unauthenticated traffic back to the Junos Pulse Access Control Service.
D. Configure a security policy that references the unified-access-control intranet-controller service.
第3题:
A Windows Communication Foundation (WCF) service is required to log all authorization attempts to the Windows Event Log. You need to configure a behavior and apply it to the service to support this requirement. Which behavior should you configure and apply?()
A. service Authentication Manager
B. service Authorization
C. service Credentials
D. service Security Audit
第4题:
As an experienced technician, you are required to configure and verify SRM with SSO redundancy. In such a situation, you have to issue several commands in proper orders. Which of the following is correct?()
第5题:
A. It allows users to retain all uncommitted changes when exiting exclusive configuration mode.
B. It allows multiple users to edit private copies of the configuration concurrently.
C. It causes the loss of all uncommitted changes when exiting exclusive configuration mode.
D. It excludes other users from editing the configuration.
第6题:
A. Configure a single Junos Pulse Access Control Service instance on the enforcer, specifying the VIP as the IP address the instance.
B. Configure multiple Junos Pulse Access Control Service instances on the enforcer, specifying the specific IP address each device in a separate instance.
C. Configure a single Junos Pulse Access Control Service instance on the enforcer, specifying the VIP and active node address in the instance.
D. Configure a single Junos Pulse Access Control Service instance on the enforcer, specifying the VIP and passive node address in the instance.
第7题:
A. enable mode
B. configuration mode
C. operational mode
D. active mode
第8题:
A Windows Communication Foundation (WCF) service interacts with the database of a workflow engine. Data access authorization is managed by the database, which raises security exceptions if a user is unauthorized to access it.You need to ensure that the application transmits the exceptions raised by the database to the client that is calling the service.Which behavior should you configure and apply to the service?()
A.routing
B.service Debug
C.service Security Audit
D.workflow Unhandled Exception
第9题:
A. Configure the switch to be in VTP client mode.
B. Configure the switch to be in VTP domaint mode.
C. Configure the switch to be in VTP transparent mode.
D. Configure the switch to be in VTPv2.
第10题:
Assuming the default switch configuration,which approach should you use to configure the extended vlan range(1006 through 4094) on a cisco catalyst 3750 series switch?()