Set up a certificate authentication server.
Configure the authentication realm to remember certificate information.
Configure the authentication realm to use a certificate server for authentication.
Configure a role mapping rule requiring certification information to map user to role.
第1题:
Which additional configuration step is necessary in order to connect to an access point that has SSID broadcasting disabled?()
第2题:
Using an LDAP authentication server, what do you configure to validate certificate attributes?()
第3题:
You want to enforce a Host Checker policy so that only users who pass the policy receive the Employee role. In the admin GUI, which two parameters must you configure?()
第4题:
Which action is optional when adding an authentication realm for use on an Infranet Controller? ()
第5题:
You need to design a remote access solution for the mobile sales users in the litwareinc.com domain. Which two actions should you perform?()
第6题:
You have a Windows Server 2008 R2 Enterprise Root CA . Security policy prevents port 443 and port 80 from being opened on domain controllers and on the issuing CA . You need to allow users to request certificates from a Web interface. You install the Active Directory Certificate Services (AD CS) server role. What should you do next()
第7题:
You are designing an authentication solution to meet the security needs of the network administrators. You install an enterprise certification authority (CA). Which three additional actions should you take?()
第8题:
You are a network administrator for your company. The network consists of two Active Directory domains. You are responsible for administering one domain, which contains users who work in the sales department. User objects for the users in the sales department are stored in an organizational unit (OU) named Sales in your domain. Users in the sales department use a public key infrastructure (PKI) enabled application that requires users to present client authentication certificates before they are granted access. You install Certificate Services on two member servers running Windows Server 2003. You configure one server as an enterprise subordinate certification authority (CA) and the other server as a stand-alone root CA. You need to issue certificates that support client authentication to sales users only. You need to achieve this goal by using the minimum amount of administrative effort. What should you do? ()
第9题:
Configure the Web site to the Require SSL setting.
Configure the /orders/ virtual directory to the Require SSL setting.
Configure the Digest Authentication setting to Enabled for the /orders/ virtual directory.
Configure the Basic Authentication setting to Enabled and the Anonymous Authentication setting to Disabled for the Web site.
Configure the Basic Authentication setting to Enabled and the Anonymous Authentication setting to Disabled for the /orders/ virtual directory.
第10题:
Use the is exactly or contains operators.
Create a user filter matching the dn of the certificate.
Verify that the certificate is issued by a publicly trusted cs.
Match the certificate type and value with an attribute from the ldap server.
第11题:
Select Require and Enforce for the Host Checker Policy in the realm authentication policy.
Select Evaluate Policies for the Host Checker policy in the realm authentication policy.
Configure the Host Checker policy as a role restriction for the Employee role.
Configure the Host Checker policy as a resource access policy for the Employee role.
第12题:
You should consider using Basic authentication on Outlook Anywhere and set up only Basic authentication on the RPC virtual directory.
You should consider using NTLM authentication on Outlook Anywhere and set up Basic authentication and NTLM authentication on the RPC virtual directory.
You should consider using NTLM authentication on Outlook Anywhere and set up only Basic authentication on the RPC virtual directory.
You should consider using Basic authentication on Outlook Anywhere and set up Basic authentication and NTLM authentication on the RPC virtual directory.
第13题:
What are two steps to configure user authentication for a Junos Pulse Access Control Service?()
第14题:
When using RADIUS as an external authentication method for 802.1X authentication for the Junos Pulse Access Control Service, what must you do to ensure that the RADIUS authentication works properly?()
第15题:
Your security policy requires that users authenticating to the Junos Pulse Access Control Service are connecting from a domain member endpoint on the internal corporate network.Which set of role access restrictions must you configure to enforce this security policy?()
第16题:
Which additional configuration must be completed when setting up role restrictions using certificates? ()
第17题:
You need to design an access control solution for customer information. Your solution must meet security requirements.What should you do?()
第18题:
You manage a server named Server2 that runs Windows Server 2008. You install and test the Terminal Services role on Server2. You publish an application by using Terminal Services. All users must connect to the Terminal Services application by using the Remote Desktop Protocol. You install and configure the Terminal Services Gateway (TS Gateway) role service on Server2. You configure a default domain policy to enable the Enable Connection through TS Gateway setting. Users report that they cannot connect to the Terminal Services application. You need to ensure that users can access the Terminal Services application on the intranet and from the Internet. What should you do?()
第19题:
You are the administrator of your company’s network. The dial-up server on your network is configured to support certificate authentication. A user named Tom wants to use smart card authentication on his Windows 2000 Professional portable computer. You that Tom’s computer has a PC Card smart card reader and the appropriate drivers installed. You give Tom a smart card to use. What else should you do to enable smart card authentication on Tom’s computer? ()
第20题:
You manage a server that runs Windows Server 2008. The server has the Web Server (IIS) role installed. The server hosts an Internet-accessible Web site that has a virtual directory named /orders/. A Web server certificate is installed and an SSL listener has been configured for the Web site. The /orders/ virtual directory must meet the following company policy requirements: Be accessible to authenticated users only. Allow authentication types to support all browsers. Encrypt all authentication traffic by using HTTPS. All other directories of the Web site must be accessible to anonymous users and be available withoutSSL. You need to configure the /orders/ virtual directory to meet the company policy requirements. Which two actions should you perform?()
第21题:
Configure an authentication policy as part of the user role definitions.
Configure a Sign-in Policy.
Configure authentication agents as part of the user role definitions
Configure an authentication policy as part of the authentication realm definition.
第22题:
Set up a certificate authentication server.
Configure the authentication realm to remember certificate information.
Configure the authentication realm to use a certificate server for authentication.
Configure a role mapping rule requiring certification information to map user to role.
第23题:
Configure the Web site to require SSL connections. Configure the Web site to require client certificates. Enable and configure client certificate mapping on the Web site
Configure the Web site to require SSL connections. Disable anonymous access to the Web site.Assign the Allow – Read permission to the customer user accounts for the folder that contains the Web site files
Configure the Web site to use only Microsoft .NET Passport authentication. Specify the den.corp.woodgrovebank.com domain as the default domain for .NET Passport authentication.Configure a custom local IPSec policy on the Web servers to require IPSec communications
Configure the Web site to use only Windows Integrated authentication. Configure a custom local IPSec policy on the Web servers to require IPSec communications. Configure the IPSec policy to use certificate-based authentication and encryption
第24题:
Create a duplicate of the User certificate template and configure it to support autoenrollment. Configure the enterprise subordinate CA to issue certificates based on the template. Configure the Default Domain Policy Group Policy object (GPO) to autoenroll users for certificates.
Create a duplicate of the Computer certificate template and configure it to support autoenrollment. Configure the enterprise subordinate CA to issue certificates based on the template. Configure the Default Domain Policy Group Policy object (GPO) to autoenroll computers for certificates.
Create a duplicate of the User certificate template and configure it to support autoenrollment. Configure the enterprise subordinate CA to issue certificates based on the template. Create a new Group Policy object (GPO) and link it to the Sales OU. Configure the GPO to autoenroll sales users for certificates.
Create a duplicate of the Computer certificate template and configure it to support autoenrollment. Configure the enterprise subordinate CA to issue certificates based on the template. Create a new Group Policy object (GPO) and link it to the Sales OU. Configure the GPO to autoenroll sales client computers for certificates.