itgle.com

单选题Which statement is correct about defining an Infranet Enforcer for use as a RADIUS Client? ()A You do not need to configure a RADIUS client policy.B You must know the exact model number of the Infranet Enforcer.C You must specify the NACN password of t

题目
单选题
Which statement is correct about defining an Infranet Enforcer for use as a RADIUS Client? ()
A

You do not need to configure a RADIUS client policy.

B

You must know the exact model number of the Infranet Enforcer.

C

You must specify the NACN password of the device in the RADIUS client policy.

D

You do not need to designate a location group to which the Infranet Enforcer will belong.


相似考题
更多“单选题Which statement is correct about defining an Infranet Enforcer for use as a RADIUS Client? ()A You do not need to configure a RADIUS client policy.B You must know the exact model number of the Infranet Enforcer.C You must specify the NACN password of t”相关问题
  • 第1题:

    You are configuring the ERX Edge Router as an LNS in an L2TP network.Which statement is true about the value of the remote host parameter?()

    A.It must be the same as the server-name parameter on the LAC

    B.It must be the same as the client-name arameteron the LAC

    C.It must be the same as the remote-hostname parameter on the LAC

    D.It must be the same as the tunnel password parameter on the LAC


    参考答案:B

  • 第2题:

    Which statement is correct about defining an Infranet Enforcer for use as a RADIUS Client? ()

    A. You do not need to configure a RADIUS client policy.

    B. You must know the exact model number of the Infranet Enforcer.

    C. You must specify the NACN password of the device in the RADIUS client policy.

    D. You do not need to designate a location group to which the Infranet Enforcer will belong.


    参考答案:A

  • 第3题:

    You are configuring the ERX Edge Router as an LNS in an L2TP network.Which statement is true about the value of the remote host parameter?()

    • A、It must be the same as the server-name parameter on the LAC
    • B、It must be the same as the client-name arameteron the LAC
    • C、It must be the same as the remote-hostname parameter on the LAC
    • D、It must be the same as the tunnel password parameter on the LAC

    正确答案:B

  • 第4题:

    When using RADIUS as an external authentication method for 802.1X authentication for the Junos Pulse Access Control Service, what must you do to ensure that the RADIUS authentication works properly?()

    • A、Configure IP helper to forward the authentication requests from the clients to the external RADIUS server
    • B、Configure the supplicant as anexternal authentication server
    • C、Configure RADIUS proxy on the realm
    • D、Specify the correct RADIUS port 389 on the Junos Pulse Access Control Service

    正确答案:C

  • 第5题:

    You navigate to "UAC" > "Infranet Enforcer" > "Auth Table Mapping" in the admin GUI. You see one policy, which is the unmodified, original default policy.Which statement is true?()

    • A、Dynamic auth table mapping is not enabled.
    • B、A successful authentication attempt will result in a new authentication table entry, which will be delivered only to the Junos enforcer protecting the network from which the user has authenticated.
    • C、To create a static auth table mapping, you must delete the default policy.
    • D、The default policy applies only to the factory-default role User.

    正确答案:A

  • 第6题:

    You need to design an authentication solution for the wireless network. Your solution must meet the security requirements. What should you do?()

    • A、Create wireless VPNs using L2TP/IPSec between the client computers to the wireless access point
    • B、Configure IEEE 802.1x authentication with smart cards
    • C、Configure the wireless network to use Wired Equivalent Privacy (WEP)
    • D、Install and configure an Internet Authentication Service (IAS) server

    正确答案:C

  • 第7题:

    You create a Microsoft ASP.NET application by using the Microsoft .NET Framework version 3.5. The application must redirect the original URL to a different ASPX page.  You need to ensure that the users cannot view the original URL after the page is executed. You also need to ensure that each page execution requires only one request from the client browser. What should you do?()

    • A、Use the Server.Transfer method to transfer execution to the correct ASPX page.
    • B、Use the Response.Redirect method to transfer execution to the correct ASPX page.
    • C、Use the HttpContext.Current.RewritePath method to transfer execution to the correct ASPX page.
    • D、Add the Location: new URL value to the Response.Headers collection. Call the Response.End() statement. Send the header to the client computer to transfer execution to the correct ASPX page.

    正确答案:C

  • 第8题:

    You are the domain administrator for TestKing's Active Directory domain named All client computers run Windows XP Professional. You need to implement a solution for managing security updates on client computers. You plan to use a Windows Server 2003 computer to manage security updates. Your solution for managing security updates must meet the following requirements: 1. You must not purchase additional software or licences. 2. Security updates must be installed automatically. 3. You must be able to control which updates are available to install. 4. Security updates must synchronize automatically with the latest updates offered by Microsoft. You need to implement a solution for managing security updates that meets the requirements. What should you do?()

    • A、Publish the security updates by using a Group Policy object (GPO). Assign the GPO to the client computers that require updates
    • B、Install Software Update Services (SUS). Configure the SUS software to synchronize daily with Microsoft. Use Group Policy to configure the appropriate Windows Update settings on the client computers.
    • C、Install Microsoft Internet Security and Acceleration (ISA) Server on a Windows Server 2003 computer.
    • D、Create a process to run Windows Update on all client computers.

    正确答案:B

  • 第9题:

    单选题
    What will serve as a RADIUS Client to the Infranet Controller for 802.1x authentication? ()
    A

    an ACE server

    B

    a wireless network

    C

    an Ethernet switch

    D

    Odyssey Access Client


    正确答案: C
    解析: 暂无解析

  • 第10题:

    单选题
    You are developing a client application that consumes a Windows Communication Foundation (WCF) service. You use the svcutil.exe utility to create a proxy for the service. You use the svcutil.exe switches that generate asynchronous calls. GetFlight is a service operation that takes no parameters and returns a string. The GetFlightCallback method must be called when the service operation returns.You create an instance of the client proxy with the following code:var client = new TranvelServiceClient( );You need to ensure that a callback is received when the GetFlight operation is called asynchronously. Which code segment should you use?()
    A

    client.BeginGetFlight(GetFlightCallback, null); client.GetFlight();

    B

    client.GetFlight(); client.BeginGetFlight(GetFlightCallback, null);

    C

    client.GetFlightCompleted += new EventHandler(GetFlightCallback); client.GetFlightAsync();

    D

    IAsyncResult asyncResult = client.BeginGetFlight(GetFlightCallback, client); client.EndGetFlight(asyncResult);


    正确答案: B
    解析: 暂无解析

  • 第11题:

    单选题
    You navigate to "UAC" > "Infranet Enforcer" > "Auth Table Mapping" in the admin GUI. You see one policy, which is the unmodified, original default policy.Which statement is true?()
    A

    Dynamic auth table mapping is not enabled.

    B

    A successful authentication attempt will result in a new authentication table entry, which will be delivered only to the Junos enforcer protecting the network from which the user has authenticated.

    C

    To create a static auth table mapping, you must delete the default policy.

    D

    The default policy applies only to the factory-default role User.


    正确答案: A
    解析: 暂无解析

  • 第12题:

    单选题
    You are configuring an active/passive cluster of SRX Series devices as the firewall enforcer on a MAG Series device.Which statement is true?()
    A

    Multiple Infranet Enforcer instances are created with a single serial number of an SRX Series device defined in each configuration.

    B

    A single Infranet Enforcer instance is created with both serial numbers of the clustered SRX Series devices defined in the configuration.

    C

    Multiple Infranet Enforcer instances are created with a single IP address of an SRX Series device defined in each configuration.

    D

    A single Infranet enforcer instance is created with the VIP of the clustered SRX Series device defined in the configuration.


    正确答案: D
    解析: 暂无解析

  • 第13题:

    What will serve as a RADIUS Client to the Infranet Controller for 802.1x authentication? ()

    A. an ACE server

    B. a wireless network

    C. an Ethernet switch

    D. Odyssey Access Client


    参考答案:C

  • 第14题:

    Which statement is correct about defining an Infranet Enforcer for use as a RADIUS Client? ()

    • A、You do not need to configure a RADIUS client policy.
    • B、You must know the exact model number of the Infranet Enforcer.
    • C、You must specify the NACN password of the device in the RADIUS client policy.
    • D、You do not need to designate a location group to which the Infranet Enforcer will belong.

    正确答案:A

  • 第15题:

    You develop a Windows Communication Foundation (WCF) service that uses basic authentication for client credentials. This service is currently configured to use message security. The service is hosted on a server in workgroup mode.Users report that their passwords are stolen when they use public computers.You need to ensure that messages are secure and users are authenticated.You prevent the service from being called over HTTP through Microsoft Internet Information Services (IIS) configuration. What should you do next?()

    • A、Use the transport security mode and specify None for transport client credential type.
    • B、Use the transportWithMessageCredential security mode and specify Basic for the transport client credential type.
    • C、Use the message security mode and specify Basic for the transport client credential type.
    • D、Use the transportWithMessageCredential security mode and specify None for the transport client credential type.

    正确答案:B

  • 第16题:

    A user is successfully authenticating to the network but is unable to access protected resources behind a ScreenOS enforcer. You log in to the ScreenOS enforcer and issue the command get auth table infranet and you do not see the user listed.Which two event log settings on the Junos Pulse Access Control Service must you enable to troubleshootthis issue?()

    • A、Connection Requests
    • B、System Errors
    • C、Enforcer Events
    • D、Enforcer Command Trace

    正确答案:C,D

  • 第17题:

    What will serve as a RADIUS Client to the Infranet Controller for 802.1x authentication? ()

    • A、an ACE server
    • B、a wireless network
    • C、an Ethernet switch
    • D、Odyssey Access Client

    正确答案:C

  • 第18题:

    You are planning to upgrade Internet Explorer.   You have the following requirements:   Create a report that identifies which computers are successfully upgraded. Do not install additional software on the client computers.   You need to design a deployment method that meets the requirements.   What should you do?()

    • A、Use Internet Explorer Administration Kit (IEAK) and Group Policy.
    • B、Use Microsoft System Center Configuration Manager.
    • C、Use Windows Server Update Services (WSUS).
    • D、Use Microsoft System Center Essentials.

    正确答案:C

  • 第19题:

    You are developing a client application that consumes a Windows Communication Foundation (WCF) service. You use the svcutil.exe utility to create a proxy for the service. You use the svcutil.exe switches that generate asynchronous calls. GetFlight is a service operation that takes no parameters and returns a string. The GetFlightCallback method must be called when the service operation returns.You create an instance of the client proxy with the following code:var client = new TranvelServiceClient( );You need to ensure that a callback is received when the GetFlight operation is called asynchronously. Which code segment should you use?()

    • A、client.BeginGetFlight(GetFlightCallback, null); client.GetFlight();
    • B、client.GetFlight(); client.BeginGetFlight(GetFlightCallback, null);
    • C、client.GetFlightCompleted += new EventHandler(GetFlightCallback); client.GetFlightAsync();
    • D、IAsyncResult asyncResult = client.BeginGetFlight(GetFlightCallback, client); client.EndGetFlight(asyncResult);

    正确答案:C

  • 第20题:

    You work in a company which is named Wiikigo Corp. The company uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. Now your company CIO assigns a task to you. The company CIO wants you to configure FILESTREAM data and the two requirements below must be met: you must enable FILESTREAM for file I/O streaming access; remote client computers must be able to have streaming access to FILESTREAM data. You must make sure that FILESTREAM data is enabled. Which service should you configure? () 

    • A、You should configure SQL Server VSS Writer 
    • B、You should configure Distributed File System 
    • C、You should configure SQL Server 
    • D、You should configure SQL Server Full Text

    正确答案:C

  • 第21题:

    单选题
    You are configuring the ERX Edge Router as an LNS in an L2TP network.Which statement is true about the value of the remote host parameter?()
    A

    It must be the same as the server-name parameter on the LAC

    B

    It must be the same as the client-name arameteron the LAC

    C

    It must be the same as the remote-hostname parameter on the LAC

    D

    It must be the same as the tunnel password parameter on the LAC


    正确答案: A
    解析: 暂无解析

  • 第22题:

    多选题
    A user is successfully authenticating to the network but is unable to access protected resources behind a ScreenOS enforcer. You log in to the ScreenOS enforcer and issue the command get auth table infranet and you do not see the user listed.Which two event log settings on the Junos Pulse Access Control Service must you enable to troubleshootthis issue?()
    A

    Connection Requests

    B

    System Errors

    C

    Enforcer Events

    D

    Enforcer Command Trace


    正确答案: B,A
    解析: 暂无解析

  • 第23题:

    单选题
    You are the domain administrator for TestKing's Active Directory domain named All client computers run Windows XP Professional. You need to implement a solution for managing security updates on client computers. You plan to use a Windows Server 2003 computer to manage security updates. Your solution for managing security updates must meet the following requirements: 1. You must not purchase additional software or licences. 2. Security updates must be installed automatically. 3. You must be able to control which updates are available to install. 4. Security updates must synchronize automatically with the latest updates offered by Microsoft. You need to implement a solution for managing security updates that meets the requirements. What should you do?()
    A

    Publish the security updates by using a Group Policy object (GPO). Assign the GPO to the client computers that require updates

    B

    Install Software Update Services (SUS). Configure the SUS software to synchronize daily with Microsoft. Use Group Policy to configure the appropriate Windows Update settings on the client computers.

    C

    Install Microsoft Internet Security and Acceleration (ISA) Server on a Windows Server 2003 computer.

    D

    Create a process to run Windows Update on all client computers.


    正确答案: D
    解析: 暂无解析