问题:单选题What is the primary purpose of creating a Location Group Policy? ()A to associate more than one realm with an authentication serverB to logically group network access devices and associate them with specific sign-in policiesC to allow or prevent users from accessing resources in specific locations on the networkD to define the URL that users of network access devices can use to access the Infranet Controller
Sunday, February 18, 2024
问题:单选题Your company has a mix of employees and contractors. Contractor usernames always begin with"con-"; employee usernames never begin with "con-". You need to give employees access to allresources and give contractors access to a limited set of resources. Employee and contractor roles have been created with the appropriate access privileges, and the realm is set to merge settings for all assigned roles. Which role mapping ruleset would result in the correct access privileges being assigned?()A username=* -> Employee-role Stop username=con-* -> Contractor-roleB username=* -> Employee-role username=con-* -> Contractor-role StopC username=con-* -> Contractor-role Stop username=* -> Employee-roleD username=con-* -> Contractor-role username=* -> Employee-role Stop
Friday, May 17, 2024
问题:单选题What must be updated regularly to detect the newest versions of personal firewalls on endpoints? ()A Infranet Enforcer firmwareB Infranet Controller rollback softwareC Host Security Assessment Plug-in (HSAP)D Endpoint Security Assessment Plug-in (ESAP)
问题:单选题What is true about the operation of the Infranet Enforcer? ()A It assigns users a set of roles.B It allows access based on auth table entries.C It verifies whether an endpoint meets security requirements.D It configures the UAC agent to allow or deny access to resources.
Friday, April 12, 2024
问题:单选题Which log contains information about service restarts, system errors, warnings, and requests to check server connectivity? ()A Events logB System logC User Access logD Admin Access log
问题:单选题When the Infranet Enforcer is set up in transparent mode, which additional resource policy must be configured to use OAC for IPsec enforcement? ()A IPsec RoutingB Access ControlC IP Address PoolD Source Interface
问题:单选题Which action is optional when adding an authentication realm for use on an Infranet Controller? ()A Modify sign-in policy.B Configure role mapping.C Assign authentication server.D Configure authentication policy.
问题:单选题Which statement is correct about defining an Infranet Enforcer for use as a RADIUS Client? ()A You do not need to configure a RADIUS client policy.B You must know the exact model number of the Infranet Enforcer.C You must specify the NACN password of the device in the RADIUS client policy.D You do not need to designate a location group to which the Infranet Enforcer will belong.
问题:多选题Which two statements are true about applying Host Checker at the realm level?()AIf Evaluate is checked then the client must pass policy to get the sign-in page.BIf Evaluate is checked then the client can fail policy and still get the sign-in page.CIf Require and Enforce is checked then the client must pass policy to get the sign-in page.DIf Require and Enforce is checked then the client can fail policy and still get the sign-in page.
问题:单选题Which additional configuration must be completed when setting up role restrictions using certificates? ()A Set up a certificate authentication server.B Configure the authentication realm to remember certificate information.C Configure the authentication realm to use a certificate server for authentication.D Configure a role mapping rule requiring certification information to map user to role.
问题:单选题A customer has installed UAC in their network. They have both Windows and Linux endpoints andmust choose a deployment method that everyone can use. Which deployment method allows for multiple platforms? ()A IPsec enforcementB 802.1X enforcementC Source IP enforcementD Odyssey Access Client
问题:单选题What happens when Host Checker is configured to perform checks every "0" minutes? ()A Host Checker is disabled.B Host Checker will perform continous checks.C Host Checker will perform checks when user logs out.D Host Checker will perform checks when user first logs in.
问题:多选题If Host Checker restrictions are applied at the role level and the "Allow access to the role if any ONE of the select policies is passed" option is unchecked, which two statements are true?()AAll roles are evaluated together.BEach role is evaluated separately.CClients must pass all policies to access the role.DClients will pass as long as one policy is accepted.