itgle.com

单选题You have configured the Odyssey Access Client with a profile which has the "Disable Server Verification" setting cleared.What will be the result if the device certificate on the MAG Series device has expired and the user attempts to authenticate?()A Th

题目
单选题
You have configured the Odyssey Access Client with a profile which has the "Disable Server Verification" setting cleared.What will be the result if the device certificate on the MAG Series device has expired and the user attempts to authenticate?()
A

The user will be instructed to call the network administrator.

B

The user will fail authentication.

C

The user will be prompted to install a new device certificate on the MAG Series device.

D

The user will successfully authenticate and have full network access.


相似考题
更多“单选题You have configured the Odyssey Access Client with a profile which has the "Disable Server Verification" setting cleared.What will be the result if the device certificate on the MAG Series device has expired and the user attempts to authenticate?()A Th”相关问题
  • 第1题:

    You have configured the Odyssey Access Client with a profile which has the "Disable Server Verification" setting cleared.What will be the result if the device certificate on the MAG Series device has expired and the user attempts to authenticate?()

    A. The user will be instructed to call the network administrator.

    B. The user will fail authentication.

    C. The user will be prompted to install a new device certificate on the MAG Series device.

    D. The user will successfully authenticate and have full network access.


    参考答案:B

  • 第2题:

    Without calling JTAC, which two troubleshooting tools on a MAG Series device would you use to identify the cause of an authentication failure?()

    • A、Remote Debugging
    • B、System Snapshot
    • C、User Access logs
    • D、Policy Tracing

    正确答案:C,D

  • 第3题:

    Your IT manager has requested that you start providing weekly reports of CPU utilization on all network devices.Which monitoring function should be enabled on the MAG Series device?()

    • A、Admin logging
    • B、SNMP logging
    • C、Syslog server logging
    • D、Event logging

    正确答案:B

  • 第4题:

    A user is attempting to access a website but is getting a ‘Page cannot be displayed’ error. The technician checks the IP address of the computer and sees that it has been assigned 169.254.10.70. Which of the following is the MOST likely cause?()

    • A、The device is located behind a firewall.
    • B、The network card is disabled.
    • C、The device is not configured for DHCP.
    • D、The device cannot locate a DHCP server.

    正确答案:D

  • 第5题:

    You have multiple realms configured on a MAG Series device. A user is authenticating with a non- Junos Pulse Access Control Service client. The username does not contain a realm suffix.Which behavior will the user experience?()

    • A、The user will not be able to log-in, as the Junos Pulse Access Control Service device cannot map the user to a realm when the realm value is empty.
    • B、The user will be mapped to all realms available to the user.
    • C、The Junos Pulse Access Control Service device displays a page where the user must choose from a list of realms.
    • D、The endpoint is assigned to the first realm in the list whose authentication server is a match with the endpoints software.

    正确答案:D

  • 第6题:

    You are setting up a Junos Pulse Access Control Service. You cannot obtain a device certificate from an external certificate authority.Which tool should you use to generate a device certificate?()

    • A、OpenSSL
    • B、OpenSSH
    • C、OpenLDAP
    • D、OpenRADIUS

    正确答案:A

  • 第7题:

    You have a computer that runs Windows 7. Multiple users log on to the computer. The computer has fiveremovable devices. You need to ensure that users can only access removable  devices that have beenpreviously installed on the computer.  What should you modify in the Local Group Policy ?()

    • A、Enable the Prevent redirection of USB devices setting.
    • B、Enable the Prevent installation of removable devices setting.
    • C、Disable the WPD Devices: Deny read access setting.
    • D、Disable the Allow administrators to override Device Installation Restriction policies setting.

    正确答案:B

  • 第8题:

    多选题
    You are performing the initial setup of a new MAG Series device and have installed a valid CA- signed certificate on the MAG Series device. Connectivity to an existing SRX Series firewall enforcer cannot be obtained.What are two explanations for this behavior?()
    A

    The MAG Series device has multiple ports associated with the certificate.

    B

    The MAG Series device's serial number needs to be configured on the SRX Series device.

    C

    The SRX Series device must have a certificate signed by the same authority as the MAG Series device.

    D

    The MAG Series device and SRX Series device are not synchronized to an NTP server.


    正确答案: A,C
    解析: 暂无解析

  • 第9题:

    单选题
    You are installing a MAG Series device for access control using an SRX Series device as the firewall enforcer. The MAG Series device resides in the same security zone as users. However, the users reside in different subnets and use the SRX Series device as an IP gateway.Which statement is true?()
    A

    You must configure a security policy on the SRX Series device to allow traffic to flow from the user devices to the MAG Series device.

    B

    No security policy is necessary on the SRX Series device to allow traffic to flow from the user devices to the MAG Series device.

    C

    You must configure host-inbound traffic on the SRX Series device to allow SSL traffic between the MAG Series device and the user devices.

    D

    You must configure host-inbound traffic on the SRX Series device to allow EAP traffic between the MAG Series device and the user devices.


    正确答案: C
    解析: 暂无解析

  • 第10题:

    单选题
    You have multiple realms configured on a MAG Series device. A user is authenticating with a non- Junos Pulse Access Control Service client. The username does not contain a realm suffix.Which behavior will the user experience?()
    A

    The user will not be able to log-in, as the Junos Pulse Access Control Service device cannot map the user to a realm when the realm value is empty.

    B

    The user will be mapped to all realms available to the user.

    C

    The Junos Pulse Access Control Service device displays a page where the user must choose from a list of realms.

    D

    The endpoint is assigned to the first realm in the list whose authentication server is a match with the endpoints software.


    正确答案: D
    解析: 暂无解析

  • 第11题:

    多选题
    A user would like to have a roaming profile configured. Which of the following is necessary when setting up a roaming profile? ()(Select TWO).
    A

    The user must configure the settings.

    B

    Roaming profile must be stored on every client.

    C

    The user must be on a domain.

    D

    Roaming profile has to be stored on a network server.

    E

    The user must have an IP address on their client.


    正确答案: A,B
    解析: 暂无解析

  • 第12题:

    单选题
    Your company has an Active Directory Domain Services (AD DS) domain. You have m ultiple Remote Desktop Session Host (RD Session Host) servers. You have 100 Windows Server 2008 R2 Remote Desktop Services client access licenses (RDS CALs) installed on your license server. You need to return 10 RDS CALs to the pool on the license server. What should you do?()
    A

    Remove the Per User RDS CALs.

    B

    Revoke the Per Device RDS CALs.

    C

    Remove the Per Device RDS CALs.

    D

    Revoke the Per User RDS CALs.


    正确答案: C
    解析: 暂无解析

  • 第13题:

    You are setting up a Junos Pulse Access Control Service. You cannot obtain a device certificate from an external certificate authority.Which tool should you use to generate a device certificate?()

    A.OpenSSL

    B.OpenSSH

    C.OpenLDAP

    D.OpenRADIUS


    参考答案:A

  • 第14题:

    A users Junos Pulse client uses 802.1X to access a wired network and is failing to authenticate. You run a packet capture from the users PC and notice that immediately after the client machine sends an EAPoL-start packet, an EAP-failure packet is returned. You review the RADIUS troubleshooting logs on the MAG Series device and do not see any authentication attempts from the user. Other users on the same Ethernet switch are successfully authenticating. Which device is sending the EAP-failure packet to the workstation?()

    • A、The RADIUS server
    • B、The EAPoL server
    • C、The workstation's network adapter
    • D、The Ethernet switch

    正确答案:D

  • 第15题:

    A user would like to have a roaming profile configured. Which of the following is necessary when setting up a roaming profile? ()(Select TWO).

    • A、The user must configure the settings.
    • B、Roaming profile must be stored on every client.
    • C、The user must be on a domain.
    • D、Roaming profile has to be stored on a network server.
    • E、The user must have an IP address on their client.

    正确答案:C,D

  • 第16题:

    You are installing a MAG Series device for access control using an SRX Series device as the firewall enforcer. The MAG Series device resides in the same security zone as users. However, the users reside in different subnets and use the SRX Series device as an IP gateway.Which statement is true?()

    • A、You must configure a security policy on the SRX Series device to allow traffic to flow from the user devices to the MAG Series device.
    • B、No security policy is necessary on the SRX Series device to allow traffic to flow from the user devices to the MAG Series device.
    • C、You must configure host-inbound traffic on the SRX Series device to allow SSL traffic between the MAG Series device and the user devices.
    • D、You must configure host-inbound traffic on the SRX Series device to allow EAP traffic between the MAG Series device and the user devices.

    正确答案:A

  • 第17题:

    Which three situations will trigger an e-mail to be flagged as spam if a branch SRX Series device has been properly configured with antispam inspection enabled for the appropriate security policy? ()(Choose three.)

    • A、The server sending the e-mail to the SRX Series device is a known open SMTP relay.
    • B、The server sending the e-mail to the SRX Series device is running unknown SMTP server software.
    • C、The server sending the e-mail to the SRX Series device is on an IP address range that is known to be dynamically assigned.
    • D、The e-mail that the server is sending to the SRX Series device has a virus in its attachment.
    • E、The server sending the e-mail to the SRX Series device is a known spammer IP address.

    正确答案:A,C,E

  • 第18题:

    You are performing the initial setup of a new MAG Series device and have installed a valid CA- signed certificate on the MAG Series device. Connectivity to an existing SRX Series firewall enforcer cannot be obtained.What are two explanations for this behavior?()

    • A、The MAG Series device has multiple ports associated with the certificate.
    • B、The MAG Series device's serial number needs to be configured on the SRX Series device.
    • C、The SRX Series device must have a certificate signed by the same authority as the MAG Series device.
    • D、The MAG Series device and SRX Series device are not synchronized to an NTP server.

    正确答案:C,D

  • 第19题:

    单选题
    You are validating the configuration of your SRX Series device and see the output shown below. What does this indicate?()
    A

    The SRX Series device has been configured correctly, the Junos Pulse Access Control Service is reachable on the network, and the SRX Series device is waiting to receive the initial connection from the Junos Pulse Access Control Service.

    B

    The SRX Series device has confirmed that the Junos Pulse Access Control Service is configured and is reachable on the network, the SRX Series device is waiting to receive the connection from the Junos Pulse Access Control Service, and all that remains to be accomplished is to configure the SRX Series device.

    C

    The SRX Series device is configured correctly and connected to the Junos Pulse Access Control Service. All that remains to be done to complete the configuration is to configure the SRX Series device on the Junos Pulse Access Control Service.

    D

    Both the Junos Pulse Access Control Service and the SRX Series device are configured correctly and communicating with each other.


    正确答案: The SRX Series device has been configured correctly, the Junos Pulse Access Control Service is reachable on the network, and the SRX Series device is waiting to receive the initial connection from the Junos Pulse Access Control Service., The SRX Series device has confirmed that the Junos Pulse Access Control Service is configured and is reachable on the network, the SRX Series device is waiting to receive the connection from the Junos Pulse Access Control Service, and all that remains to be accomplished is to configure the SRX Series device., The SRX Series device is configured correctly and connected to the Junos Pulse Access Control Service. All that remains to be done to complete the configuration is to configure the SRX Series device on the Junos Pulse Access Control Service., Both the Junos Pulse Access Control Service and the SRX Series device are configured correctly and communicating with each other.
    解析: 暂无解析

  • 第20题:

    单选题
    Your IT manager has requested that you start providing weekly reports of CPU utilization on all network devices.Which monitoring function should be enabled on the MAG Series device?()
    A

    Admin logging

    B

    SNMP logging

    C

    Syslog server logging

    D

    Event logging


    正确答案: C
    解析: 暂无解析

  • 第21题:

    单选题
    An administrator has created three different Odyssey Access Client preconfiguration files and assigned them to three different roles in the same realm.Which action should the administrator take to ensure that users get the correct Odyssey Access Client preconfiguration file?()
    A

    Configure each user account in the auth server with the appropriate Odyssey Access Client preconfiguration files.

    B

    Configure the role-mapping rules with the appropriate Odyssey Access Client preconfiguration files.

    C

    Ensure that merge roles is selected in the role-mapping rules.

    D

    Ensure that the first role a user is mapped to is the role with the appropriate Odyssey Access Client preconfiguration file.


    正确答案: C
    解析: 暂无解析

  • 第22题:

    单选题
    A users Junos Pulse client uses 802.1X to access a wired network and is failing to authenticate. You run a packet capture from the users PC and notice that immediately after the client machine sends an EAPoL-start packet, an EAP-failure packet is returned. You review the RADIUS troubleshooting logs on the MAG Series device and do not see any authentication attempts from the user. Other users on the same Ethernet switch are successfully authenticating. Which device is sending the EAP-failure packet to the workstation?()
    A

    The RADIUS server

    B

    The EAPoL server

    C

    The workstation's network adapter

    D

    The Ethernet switch


    正确答案: D
    解析: 暂无解析

  • 第23题:

    单选题
    You are setting up a Junos Pulse Access Control Service. You cannot obtain a device certificate from an external certificate authority.Which tool should you use to generate a device certificate?()
    A

    OpenSSL

    B

    OpenSSH

    C

    OpenLDAP

    D

    OpenRADIUS


    正确答案: A
    解析: 暂无解析