itgle.com

单选题What must be updated regularly to detect the newest versions of personal firewalls on endpoints? ()A Infranet Enforcer firmwareB Infranet Controller rollback softwareC Host Security Assessment Plug-in (HSAP)D Endpoint Security Assessment Plug-in (ESAP)

题目
单选题
What must be updated regularly to detect the newest versions of personal firewalls on endpoints? ()
A

Infranet Enforcer firmware

B

Infranet Controller rollback software

C

Host Security Assessment Plug-in (HSAP)

D

Endpoint Security Assessment Plug-in (ESAP)


相似考题
更多“单选题What must be updated regularly to detect the newest versions of personal firewalls on endpoints? ()A Infranet Enforcer firmwareB Infranet Controller rollback softwareC Host Security Assessment Plug-in (HSAP)D Endpoint Security Assessment Plug-in (ESAP)”相关问题
  • 第1题:

    Which statement is correct about defining an Infranet Enforcer for use as a RADIUS Client? ()

    A. You do not need to configure a RADIUS client policy.

    B. You must know the exact model number of the Infranet Enforcer.

    C. You must specify the NACN password of the device in the RADIUS client policy.

    D. You do not need to designate a location group to which the Infranet Enforcer will belong.


    参考答案:A

  • 第2题:

    What is a primary objective of the security architecture assessment? ()

    • A、document power and UPS availability
    • B、to integrate routing and switching components
    • C、create a design specification document
    • D、document the customer's current and future technology projects

    正确答案:B

  • 第3题:

    What is true about the operation of the Infranet Enforcer? ()

    • A、It assigns users a set of roles.
    • B、It allows access based on auth table entries.
    • C、It verifies whether an endpoint meets security requirements.
    • D、It configures the UAC agent to allow or deny access to resources.

    正确答案:B

  • 第4题:

    Which statement is correct about defining an Infranet Enforcer for use as a RADIUS Client? ()

    • A、You do not need to configure a RADIUS client policy.
    • B、You must know the exact model number of the Infranet Enforcer.
    • C、You must specify the NACN password of the device in the RADIUS client policy.
    • D、You do not need to designate a location group to which the Infranet Enforcer will belong.

    正确答案:A

  • 第5题:

    Your security policy requires that users authenticating to the Junos Pulse Access Control Service are connecting from a domain member endpoint on the internal corporate network.Which set of role access restrictions must you configure to enforce this security policy?()

    • A、Source IP and browser
    • B、Source IP and certificate
    • C、Certificate and Host Checker
    • D、Host Checker and source IP

    正确答案:D

  • 第6题:

    What must be updated regularly to detect the newest versions of personal firewalls on endpoints? ()

    • A、Infranet Enforcer firmware
    • B、Infranet Controller rollback software
    • C、Host Security Assessment Plug-in (HSAP)
    • D、Endpoint Security Assessment Plug-in (ESAP)

    正确答案:D

  • 第7题:

    You administer a network containing SRX Series firewalls. New policy requires that you implement MAG Series devices to provide access control for end users. The policy requires that the SRX Series devices dynamically enforce security policy based on the source IP address of the user. The policy also requires that the users communicate with protected resources using encrypted traffic. Which two statements are true?()

    • A、The endpoints can use agentless access.
    • B、Encrypted traffic flows between the endpoint and the enforcer.
    • C、Encrypted traffic flows between the endpoint and the protected resource
    • D、The endpoints can use the Odyssey Access Client.

    正确答案:B,D

  • 第8题:

    单选题
    Which statement is correct about defining an Infranet Enforcer for use as a RADIUS Client? ()
    A

    You do not need to configure a RADIUS client policy.

    B

    You must know the exact model number of the Infranet Enforcer.

    C

    You must specify the NACN password of the device in the RADIUS client policy.

    D

    You do not need to designate a location group to which the Infranet Enforcer will belong.


    正确答案: C
    解析: 暂无解析

  • 第9题:

    单选题
    Which of the following wireless service components occur in the implement phase?()
    A

    project kickoff,staging,systems acceptance testing,ongoing support handoff meeting

    B

    wlan change management,security administration,technology assessment,operations plan

    C

    security assessment,operations assessment,supplier management

    D

    operations readiness assessment,systems requirements validation,planning project kickoff,service assurance


    正确答案: B
    解析: 暂无解析

  • 第10题:

    单选题
    What is a primary objective of the security architecture assessment? ()
    A

    document power and UPS availability

    B

    to integrate routing and switching components

    C

    create a design specification document

    D

    document the customer's current and future technology projects


    正确答案: B
    解析: 暂无解析

  • 第11题:

    单选题
    You want to create a Host Checker policy that looks for a specific antivirus product that is running on your client machines, but the predefined antivirus options do not include the antivirus product version that you use.Which feature should you verify the antivirus product is up to date?()
    A

    Enhanced Endpoint Security

    B

    DP signatures

    C

    Antivirus licensing

    D

    Endpoint Security Assessment Plug-in


    正确答案: A
    解析: 暂无解析

  • 第12题:

    多选题
    On a pre-existing OAC, which three options can the Infranet Controller overwrite when the useraccesses the Infranet Controller?()
    A

    SSID

    B

    login name

    C

    MAC address

    D

    wired adapters

    E

    encryption method


    正确答案: E,B
    解析: 暂无解析

  • 第13题:

    ( )is not included in Information Security Risk Assessment Process.

    A.Establishing information security risk criteria
    B.Identifying the information security risks
    C.Formulating an information security risk treatment plan
    D.Analysing the information security risk

    答案:A
    解析:
    信息安全风险评估过程不包括建立信息安全风险准则。

  • 第14题:

    Which of the following wireless service components occur in the implement phase?()

    • A、project kickoff,staging,systems acceptance testing,ongoing support handoff meeting
    • B、wlan change management,security administration,technology assessment,operations plan
    • C、security assessment,operations assessment,supplier management
    • D、operations readiness assessment,systems requirements validation,planning project kickoff,service assurance

    正确答案:A

  • 第15题:

    You want to create a Host Checker policy that looks for a specific antivirus product that is running on your client machines, but the predefined antivirus options do not include the antivirus product version that you use.Which feature should you verify the antivirus product is up to date?()

    • A、Enhanced Endpoint Security
    • B、DP signatures
    • C、Antivirus licensing
    • D、Endpoint Security Assessment Plug-in

    正确答案:D

  • 第16题:

    On a pre-existing OAC, which three options can the Infranet Controller overwrite when the useraccesses the Infranet Controller?()

    • A、SSID
    • B、login name
    • C、MAC address
    • D、wired adapters
    • E、encryption method

    正确答案:A,D,E

  • 第17题:

    When the Infranet Enforcer is set up in transparent mode, which additional resource policy must be configured to use OAC for IPsec enforcement? ()

    • A、IPsec Routing
    • B、Access Control
    • C、IP Address Pool
    • D、Source Interface

    正确答案:D

  • 第18题:

    What will serve as a RADIUS Client to the Infranet Controller for 802.1x authentication? ()

    • A、an ACE server
    • B、a wireless network
    • C、an Ethernet switch
    • D、Odyssey Access Client

    正确答案:C

  • 第19题:

    单选题
    () means the person designated by the Company for ensuring that a ship security assessment is carried out; that a ship security plan is developed, submitted for approval, and thereafter implemented and maintained and for liaison with port facility security officers and the ship security officer.
    A

    Ship security officer

    B

    Company security officer

    C

    Port facility security officer

    D

    PSC officer


    正确答案: A
    解析: 暂无解析

  • 第20题:

    单选题
    What is true about the operation of the Infranet Enforcer? ()
    A

    It assigns users a set of roles.

    B

    It allows access based on auth table entries.

    C

    It verifies whether an endpoint meets security requirements.

    D

    It configures the UAC agent to allow or deny access to resources.


    正确答案: A
    解析: 暂无解析

  • 第21题:

    单选题
    What must be updated regularly to detect the newest versions of personal firewalls on endpoints? ()
    A

    Infranet Enforcer firmware

    B

    Infranet Controller rollback software

    C

    Host Security Assessment Plug-in (HSAP)

    D

    Endpoint Security Assessment Plug-in (ESAP)


    正确答案: D
    解析: 暂无解析

  • 第22题:

    单选题
    The ship security assessment is an essential and integral part of the process of developing and updating()
    A

    the ship security plan

    B

    the company security plan

    C

    the port security plan

    D

    the national security plan


    正确答案: A
    解析: 暂无解析

  • 第23题:

    单选题
    When the Infranet Enforcer is set up in transparent mode, which additional resource policy must be configured to use OAC for IPsec enforcement? ()
    A

    IPsec Routing

    B

    Access Control

    C

    IP Address Pool

    D

    Source Interface


    正确答案: B
    解析: 暂无解析

  • 第24题:

    单选题
    You are configuring an active/passive cluster of SRX Series devices as the firewall enforcer on a MAG Series device.Which statement is true?()
    A

    Multiple Infranet Enforcer instances are created with a single serial number of an SRX Series device defined in each configuration.

    B

    A single Infranet Enforcer instance is created with both serial numbers of the clustered SRX Series devices defined in the configuration.

    C

    Multiple Infranet Enforcer instances are created with a single IP address of an SRX Series device defined in each configuration.

    D

    A single Infranet enforcer instance is created with the VIP of the clustered SRX Series device defined in the configuration.


    正确答案: D
    解析: 暂无解析