niusouti.com

单选题An administrator has created three different Odyssey Access Client preconfiguration files and assigned them to three different roles in the same realm.Which action should the administrator take to ensure that users get the correct Odyssey Access Client

题目
单选题
An administrator has created three different Odyssey Access Client preconfiguration files and assigned them to three different roles in the same realm.Which action should the administrator take to ensure that users get the correct Odyssey Access Client preconfiguration file?()
A

Configure each user account in the auth server with the appropriate Odyssey Access Client preconfiguration files.

B

Configure the role-mapping rules with the appropriate Odyssey Access Client preconfiguration files.

C

Ensure that merge roles is selected in the role-mapping rules.

D

Ensure that the first role a user is mapped to is the role with the appropriate Odyssey Access Client preconfiguration file.


相似考题
更多“单选题An administrator has created three different Odyssey Access Client preconfiguration files and assigned them to three different roles in the same realm.Which action should the administrator take to ensure that users get the correct Odyssey Access Client”相关问题
  • 第1题:

    You have configured the Odyssey Access Client with a profile which has the "Disable Server Verification" setting cleared.What will be the result if the device certificate on the MAG Series device has expired and the user attempts to authenticate?()

    A. The user will be instructed to call the network administrator.

    B. The user will fail authentication.

    C. The user will be prompted to install a new device certificate on the MAG Series device.

    D. The user will successfully authenticate and have full network access.


    参考答案:B

  • 第2题:

    What will serve as a RADIUS Client to the Infranet Controller for 802.1x authentication? ()

    A. an ACE server

    B. a wireless network

    C. an Ethernet switch

    D. Odyssey Access Client


    参考答案:C

  • 第3题:

    You must configure access to the corporate network for employees using a client access method. Users require IPsec tunneling to protected resources and an 802.1X supplicant. Users will access the network using Windows platforms.Which two client access methods would support these requirements?()

    • A、Junos Pulse
    • B、Java Agent
    • C、Odyssey Access Client
    • D、Native 802.1X supplicant

    正确答案:A,C

  • 第4题:

    An administrator is investigating an incident where an unauthorized user gained access to a servera nd modified HR files.The administrator has a tested theory as to how the user accomplished this.Which of the following actions should the administrator take NEXT?()

    • A、Perform a root cause analysis.
    • B、Implement a change to the servers.
    • C、Establish a plan of action to resolve the issue.
    • D、Question users prior to implementing the solution.

    正确答案:C

  • 第5题:

    You want to provide all users in your corporation with a single agent that provides access to multiple connection types conditionally. For example, you connect to the Junos Pulse Access Control Service if you are connected to the intranet, but you connect to the Junos Pulse Secure Access Service if you are on a remote network. Which agent should you use for this type of connection requirement?()

    • A、Junos Pulse should be configured with location awareness rules configured.
    • B、Odyssey Access Client should be installed with Host Checker configured to check the client's location.
    • C、Junos Pulse should be configured with all components installed.
    • D、Agentless access should be enabled so that clients can connect to any service without concern for installing an agent.

    正确答案:A

  • 第6题:

    What will serve as a RADIUS Client to the Infranet Controller for 802.1x authentication? ()

    • A、an ACE server
    • B、a wireless network
    • C、an Ethernet switch
    • D、Odyssey Access Client

    正确答案:C

  • 第7题:

    You need to identify potential security threats. Which of the following security breaches might occur under the current IT and security practices?(Choose all that apply)()

    • A、A virus that infects an IT administrator’s client computer could gain domain administrator privileges
    • B、Couriers could gain access to domain administrator privileges
    • C、Business office staff could discover couriers’ passwords and use them to access couriers’ information
    • D、All users could use their user accounts to gain the ability to install untested security patches on their client computers

    正确答案:A

  • 第8题:

    You are a security administrator for your company. The network consists of a single Active  Directory domain. All servers run Windows Server 2003. All client computers run Windows 2000 Professional.   You manage a Windows Server 2003 computer named Server1 that is a domain member server. You use IIS on Server1 to host an Internet Web site. Approximately 4,000 employees of your company connect over the lnternet to access company confidential data on Server1. You control access to data on Server1 by using NTFS file permissions assigned to groups. Different groups are assigned access to different files. Employees must have access only to files that they are assigned access to based on their membership in a group. You enable SSL on Server1 to protect confidential data while it is in transit. You issue each employee an Authenticated Session certificate and store a copy of that certificate with their user account in the Active Directory domain.    You need to ensure that Server1 authenticates users based on possession of their certificate.  What should you do?()

    • A、 Request a Web server certificate from a commercial certification authority (CA).
    • B、 Configure access restrictions based on employee ip address.
    • C、 Enable Digest authentication for Windows domain servers.
    • D、 Configure client certificate mapping.

    正确答案:D

  • 第9题:

    单选题
    A company has completed two acquisitions over the previous year. Each of the acquired companies was allowed to keep its own independent authentication server. The network administrator has been asked to roll out the Junos Pulse Access Control Service to users within the original company along with each of the two acquired organizations.The administrator configures three authentication realms, one for each independent authentication server, and associates them all with a single sign-in policy. All of the client endpoints are running Junos Pulse on their Windows XP desktops. When a user signs in to the Junos Pulse Access Control Service, which statement is correct?()
    A

    The first authentication realm that was added to the sign-in policy is used by default.

    B

    The user is allowed to choose the correct authentication realm from a list presented by Junos Pulse.

    C

    When Junos Pulse is initially installed on the desktop, it must be configured with the correct realm.

    D

    This is not an allowed configuration; the administrator should configure separate sign-in policies for each realm.


    正确答案: C
    解析: 暂无解析

  • 第10题:

    单选题
    A user calls the help desk and explains that they just purchased a Macintosh computer. When they log into the network, the Odyssey Access Client is not automatically downloaded as it was when the user used their Windows PC.How do you resolve this issue?()
    A

    Download the Macintosh installer from the Junos Pulse Access Control Service and manually install the Odyssey Access Client.

    B

    Provide the user with the sign-in URL you set up for Macintosh users; this will push the Odyssey Access Client to the user's machine.

    C

    Assist the user to configure the Macintosh native supplicant and provide the AppleScnptto expose the EAP-JUAC inner authentication protocol.

    D

    Configure the user's role to install the Java agent, which is a requirement to allow the Junos Pulse Access Control Service to deploy the Odyssey Access Client.


    正确答案: B
    解析: 暂无解析

  • 第11题:

    单选题
    You need to identify potential security threats. Which of the following security breaches might occur under the current IT and security practices?(Choose all that apply)()
    A

    A virus that infects an IT administrator’s client computer could gain domain administrator privileges

    B

    Couriers could gain access to domain administrator privileges

    C

    Business office staff could discover couriers’ passwords and use them to access couriers’ information

    D

    All users could use their user accounts to gain the ability to install untested security patches on their client computers


    正确答案: D
    解析: 暂无解析

  • 第12题:

    单选题
    You are a security administrator for your company. The network consists of a single Active  Directory domain. All servers run Windows Server 2003. All client computers run Windows 2000 Professional.   You manage a Windows Server 2003 computer named Server1 that is a domain member server. You use IIS on Server1 to host an Internet Web site. Approximately 4,000 employees of your company connect over the lnternet to access company confidential data on Server1. You control access to data on Server1 by using NTFS file permissions assigned to groups. Different groups are assigned access to different files. Employees must have access only to files that they are assigned access to based on their membership in a group. You enable SSL on Server1 to protect confidential data while it is in transit. You issue each employee an Authenticated Session certificate and store a copy of that certificate with their user account in the Active Directory domain.    You need to ensure that Server1 authenticates users based on possession of their certificate.  What should you do?()
    A

     Request a Web server certificate from a commercial certification authority (CA).

    B

     Configure access restrictions based on employee ip address.

    C

     Enable Digest authentication for Windows domain servers.

    D

     Configure client certificate mapping.


    正确答案: D
    解析: 暂无解析

  • 第13题:

    A company has completed two acquisitions over the previous year. Each of the acquired companies was allowed to keep its own independent authentication server. The network administrator has been asked to roll out the Junos Pulse Access Control Service to users within the original company along with each of the two acquired organizations.The administrator configures three authentication realms, one for each independent authentication server, and associates them all with a single sign-in policy. All of the client endpoints are running Junos Pulse on their Windows XP desktops.When a user signs in to the Junos Pulse Access Control Service, which statement is correct?()

    A. The first authentication realm that was added to the sign-in policy is used by default.

    B. The user is allowed to choose the correct authentication realm from a list presented by Junos Pulse.

    C. When Junos Pulse is initially installed on the desktop, it must be configured with the correct realm.

    D. This is not an allowed configuration; the administrator should configure separate sign-in policies for each realm.


    参考答案:B

  • 第14题:

    A user calls the help desk and explains that they just purchased a Macintosh computer. When they log into the network, the Odyssey Access Client is not automatically downloaded as it was when the user used their Windows PC.How do you resolve this issue?()

    • A、Download the Macintosh installer from the Junos Pulse Access Control Service and manually install the Odyssey Access Client.
    • B、Provide the user with the sign-in URL you set up for Macintosh users; this will push the Odyssey Access Client to the user's machine.
    • C、Assist the user to configure the Macintosh native supplicant and provide the AppleScnptto expose the EAP-JUAC inner authentication protocol.
    • D、Configure the user's role to install the Java agent, which is a requirement to allow the Junos Pulse Access Control Service to deploy the Odyssey Access Client.

    正确答案:A

  • 第15题:

    Which Junos Pulse Access Control Service client provides a built-in viewer to access local logs?()

    • A、Odyssey Access Client
    • B、Junos Pulse
    • C、Java agent
    • D、Agent less access

    正确答案:A

  • 第16题:

    An administrator has created three different Odyssey Access Client preconfiguration files and assigned them to three different roles in the same realm.Which action should the administrator take to ensure that users get the correct Odyssey Access Client preconfiguration file?()

    • A、Configure each user account in the auth server with the appropriate Odyssey Access Client preconfiguration files.
    • B、Configure the role-mapping rules with the appropriate Odyssey Access Client preconfiguration files.
    • C、Ensure that merge roles is selected in the role-mapping rules.
    • D、Ensure that the first role a user is mapped to is the role with the appropriate Odyssey Access Client preconfiguration file.

    正确答案:D

  • 第17题:

    You have three classes of users on your network: employee, contractor, and IT administrator. You configure the Junos Pulse Access Control Service to assign roles to each user class and require that a specific wireless SSID be preconfigured for the Odyssey Access Client based on the role. Which configuration method should you use to satisfy this scenario?()

    • A、Create a "Settings Update file" in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under "User Roles" > "Agent" > "Odyssey Settings" > "Preconfigured Installer".
    • B、Configure a wired adapter and assign the required SSID under "User Roles" > "Agent" > "Odyssey Settings".
    • C、Create a script in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under "User Roles" > "Agent" > "Odyssey Settings" > "Preconfigured Installer".
    • D、Create a "Preconfiguration file" in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under "User Roles" > "Agent" > "Odyssey Settings" > "Preconfigured Installer".

    正确答案:A,B,D

  • 第18题:

    A customer is trying to determine which client to deploy. The customer wants to be able to perform Layer 2 authentication as well as connect to the Junos Pulse Secure Access Service.Which client should the customer deploy?()

    • A、Windows native supplicant
    • B、Odyssey Access Client
    • C、Junos Pulse
    • D、Network Connect

    正确答案:C

  • 第19题:

    You work as the Exchange administrator at Company.com.The Company.com network contains an Exchange Server 2010 Organization.Company.com has its headquarters in Paris where you are located.you are responsible for managing two exchange servers named -ex01 and -ex02.both exchange servers are configured to host the client access server role, the hub transport server role as well as the mailbox server role.terstkingex01 and -ex02 are members of a database availability group.during the course of the week you receive an instruction from management to ensure that users are able to make a connection to the client access server in the event of a single server failure. What should you do?()

    • A、Your best option would be to have the Network Load Balancing feature installed on every server.Thereafter a second IP address should be assigned to every network adapter.
    • B、Your best option would be to have two new records created for the Client Access server from the DNS manager.
    • C、Your best option would be to have a hardware load balancer deployed. Then a DNS record should be created for the virtual IP address. Thereafter a Client Access server array should be configured.
    • D、Your best option would e to have a new service named Client Access Server created and a new IP address allocated from the Failover Cluster Manager.

    正确答案:C

  • 第20题:

    单选题
    An administrator is investigating an incident where an unauthorized user gained access to a servera nd modified HR files.The administrator has a tested theory as to how the user accomplished this.Which of the following actions should the administrator take NEXT?()
    A

    Perform a root cause analysis.

    B

    Implement a change to the servers.

    C

    Establish a plan of action to resolve the issue.

    D

    Question users prior to implementing the solution.


    正确答案: A
    解析: 暂无解析

  • 第21题:

    单选题
    You work as the Exchange administrator at Company.com.The Company.com network contains an Exchange Server 2010 Organization.Company.com has its headquarters in Paris where you are located.you are responsible for managing two exchange servers named -ex01 and -ex02.both exchange servers are configured to host the client access server role, the hub transport server role as well as the mailbox server role.terstkingex01 and -ex02 are members of a database availability group.during the course of the week you receive an instruction from management to ensure that users are able to make a connection to the client access server in the event of a single server failure. What should you do?()
    A

    Your best option would be to have the Network Load Balancing feature installed on every server.Thereafter a second IP address should be assigned to every network adapter.

    B

    Your best option would be to have two new records created for the Client Access server from the DNS manager.

    C

    Your best option would be to have a hardware load balancer deployed. Then a DNS record should be created for the virtual IP address. Thereafter a Client Access server array should be configured.

    D

    Your best option would e to have a new service named Client Access Server created and a new IP address allocated from the Failover Cluster Manager.


    正确答案: A
    解析: 暂无解析

  • 第22题:

    单选题
    You have configured the Odyssey Access Client with a profile which has the "Disable Server Verification" setting cleared.What will be the result if the device certificate on the MAG Series device has expired and the user attempts to authenticate?()
    A

    The user will be instructed to call the network administrator.

    B

    The user will fail authentication.

    C

    The user will be prompted to install a new device certificate on the MAG Series device.

    D

    The user will successfully authenticate and have full network access.


    正确答案: A
    解析: 暂无解析

  • 第23题:

    单选题
    In a Junos Pulse Access Control Service active/active clustered environment, which statement is true about VIPs?()
    A

    VIP is not required when using only agentless access for all endpoint platforms.

    B

    VIP is not required when using Junos Pulse or Odyssey Access Client for all endpoint platforms.

    C

    VIP is not required when using Junos Pulse and agentless access for all endpoint platforms.

    D

    VIP is not required when using Odyssey Access Client and agentless access for all endpoint platforms.


    正确答案: B
    解析: 暂无解析