多选题You are implementing an IDP policy template from Juniper Networks. Which three steps are included in thisprocess?()Aactivating a JUNOS Software commit scriptBconfiguring an IDP groups statementCsetting up a chassis clusterDdownloading the IDP policy templatesEinstalling the policy templates

多选题
You are implementing an IDP policy template from Juniper Networks. Which three steps are included in thisprocess?()
A

activating a JUNOS Software commit script

B

configuring an IDP groups statement

C

setting up a chassis cluster

D

downloading the IDP policy templates

E

installing the policy templates


参考解析

解析: 暂无解析

相关考题:

You are the administrator responsible for security and user desktop settings on your network. You need to configure a custom registry entry for all users. You want to add the custom registry entry into a Group Policy object (GPO) with the least amount of administrative effort.What should you do?A.Configure an ADM template and add the template to the GPO.B.Configure an INF policy and add the policy to the GPO.C.Configure a Microsoft Windows installer package and add the package to the GPO.D.Configure RIS to include the registry entry.

Which statement regarding the implementation of an IDP policy template is true?()A、IDP policy templates are automatically installed as the active IDP policy.B、IDP policy templates are enabled using a commit script.C、IDP policy templates can be downloaded without an IDP license.D、IDP policy templates are included in the factory-default configuration.

You are implementing an IDP policy template from Juniper Networks. Which three steps are included in thisprocess?()A、activating a JUNOS Software commit scriptB、configuring an IDP groups statementC、setting up a chassis clusterD、downloading the IDP policy templatesE、installing the policy templates

You need to design a security strategy for VPN2. Your solution must meet business requirements. What should you do?()A、Create and configure a new security template. Import the template into the Default Domain Policy Group Policy object (GPO)B、Install Internet Authentication Service (IAS) on RAS1. Configure VPN2 to be the RADIUS client of RAS1. Configure the remote access policy on VPN2C、Create and configure a new security template. Import the template into the local policy on VPN2D、Move VPN2 into the VPN Servers OU. Configure the remote access policy on VPN2

You are the administrator of a SQL Server 2005 computer named SQL1. You create a security template that disables unnecessary services. The template is appropriate only for SQL1. You need to ensure that the security template is applied to SQL1. Your solution must ensure that the template automatically overrides any manual configuration changes made by other administrators within an hour. What should you do?()A、Use the SQL Server Surface Area Configuration tool to import the security template.B、Use the Local Security Policy editor to import the security template into the Local Security Policy object.C、Configure Task Scheduler to import the security template by using Secedit.exe. Configure the task to run every half hour.D、Configure Task Scheduler to run the Microsoft Baseline Security Analyzer tool every half hour.

You need to design an audit strategy for Southbridge Video. Your solution must meet business requirements.What should you do?()A、Create a new security template that enables the Audit account logon events policy for successful and failed attempts. Create a new GPO, and link it to the domain. Import the new security template into the new GPOB、Create a new security template that enables the Audit account logon events policy for successful and failed attempts. Create a new GPO, and link it to the Domain Controllers OU. Import the new security template into the new GPOC、Create a new security template that enables the Audit logon events policy for successful and failed attempts. Create a new GPO, and link it to the Domain Controllers OU. Import the new security template into the new GPOD、Create a new security template that enables the Audit logon events policy for successful and failed attempts. Create a new GPO, and link it to the domain. Import the new security template into the new GPO

You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. There is an Active Directory domain in your company. The company runsTerminal Services. Standard users who connect to the Terminal Server are in the TSUsers organizationalunit (OU). Administrative users are in the TSAdmins OU. No other users connect to the Terminal Server.Now receive an order from the company management. According to the company requirement, you have tomake sure that only members of the TSAdmins OU can run the Remote Desktop Protocol files. In order tomake surte of this,what action should you perform?()A、A Group Policy object (GPO) should be created. This GPO configures the Specify SHA1 thumbprints ofcertificates representing trusted .rdp publishers policy setting in the Remote Desktop Client Connection template to Enabled. The GPO should be applied to the TSAdmins OU.B、A Group Policy object (GPO) should be created. This GPO configures the Allow .rdp files from unknown publishers policy setting in the Remote Desktop Client Connection template to Disabled. The GPO should be applied to the TSUsers OU.C、A Group Policy object (GPO) should be created. This GPO configures the Allow .rdp files from valid publishers and users default .rdp settings policy setting in the Remote Desktop Client Connection template to Disabled. The GPO should be applied to the TSUsers OU.D、A Group Policy object (GPO) should be created. This GPO configures the Allow .rdp files from valid publishers and users default .rdp settings policy setting in the Remote Desktop Client Connection template to Enabled. The GPO should be applied to the TSAdmins OU.

You upgrade all client computers in your network to Windows 2000 Professional. Then you apply the basicwk.inf security template to the computers. Now, none of the users can run the company’s database application. What should you do?()A、Apply the compactws.inf security template to the computers.B、Delete the basicwk.inf security template file from the computers.C、Use the system policy editor to configure a new security policy for the database application.D、For each user account, allow read permission to the database application and in associated files.

You have a portable computer that runs Windows 7. The computer is joined to a domain. Multiple users logon to the computer. You need to prevent the computer from displaying the username of the last user whologged on. What should you do?()A、From Control Panel, modify the User Profiles settings.B、From Control Panel, modify the Personalization settings.C、From the local computer policy, add a policy template.D、From the local computer policy, modify the local security policy.

Your network contains an Active Directory Rights Management Services (AD RMS) cluster.   You have several custom policy templates. The custom policy templates are updated frequently.   Some users report that it takes as many as 30 days to receive the updated policy templates.   You need to ensure that users receive the updated custom policy templates within seven days.   What should you do()A、Modify the registry on the AD RMS servers.B、Modify the registry on the users   computers.C、Change the schedule of the AD RMS Rights Policy Template Management (Manual) scheduled task.D、Change the schedule of the AD RMS Rights Policy Template Management (Automated) scheduled  task.

You have Active Directory Certificate Services (AD CS) deployed.  You create a custom certificate template.   You need to ensure that all of the users in the domain automatically enroll for a certificate based on the  custom certificate template.   Which two actions should you perform()A、In a Group Policy object (GPO), configure the autoenrollment settingsB、In a Group Policy object (GPO), configure the Automatic Certificate Request Settings.C、On the certificate template, assign the Read and Autoenroll permission to the Authenticated Users  group.D、On the certificate template, assign the Read, Enroll, and Autoenroll permission to the Domain Users  group.

You need to ensure that Web1, Web2, and Web3 download updates from WSUS1. What should you do?()A、Modify the Default Domain Policy Group Policy object (GPO).B、Modify the local computer policy on Web1, Web2, and Web3.C、Import a security policy template toWeb1, Web2, and Web3.D、Create a service location (SRV) record in the _msdcs.graphicsdesigninstitute.com DNS zone.

You have a combined Windows 2000 and Windows 98 network that contain sensitive data. You want to utilize as many new Windows 2000 security features as possible. You want to customize a security policy on each computer to ensure that data is kept confidential and secured. Allcomputers must still be able to communicate with each other over the network. What should you do?()A、Use the security configuration and analysis console to improve the HISECWS security  template file.B、Use the local computer policy to disable the access this computer from the network option.C、Use SECEDIT to reconfigure the computer default security settings to not allow anonymous  access to the computer.D、Create a policy that excludes write access to the windows 2000 computers then apply the  policy to all non-windows 2000 computers.E、None of the above, Windows 9X systems cannot be secured using security template files.

You have an enterprise subordinate certification authority (CA). You have a custom certificate  template that has a key length of 1,024 bits. The template is enabled for autoenrollment.     You increase the template key length to 2,048 bits.   You need to ensure that all current certificate holders automatically enroll for a certificate that  uses the new template.     Which console should you use()A、Active Directory Administrative CenterB、Certification AuthorityC、Certificate TemplatesD、Group Policy Management

You work as a system administrator at Certkiller.com. You are in the process of creating anASP.NET application using Microsoft .NET Framework v3.5.  You receive an instruction from management to create a custom-templated server control. Toensure productivity you need to make sure that the child controls of the newly created servercontrol are identified within the hierarchy of the page. You thus need to identify the interface thatwill accomplish this.  What should you do?()A、You should consider implementing the IRequiresSessionState interface.B、You should consider implementing the ITemplatable interface.C、You should consider implementing the IPostBackDataHandler interface.D、You should consider implementing the INamingContainer interface

单选题You work as a system administrator at Certkiller.com. You are in the process of creating anASP.NET application using Microsoft .NET Framework v3.5.  You receive an instruction from management to create a custom-templated server control. Toensure productivity you need to make sure that the child controls of the newly created servercontrol are identified within the hierarchy of the page. You thus need to identify the interface thatwill accomplish this.  What should you do?()AYou should consider implementing the IRequiresSessionState interface.BYou should consider implementing the ITemplatable interface.CYou should consider implementing the IPostBackDataHandler interface.DYou should consider implementing the INamingContainer interface

单选题You have a Windows 7 computer that is a member of a workgroup. You need to prevent members of a localgroup from starting a specific application. You must achieve this goal by using the minimum amount ofadministrative effort.  What should you create?()Aadministrative template.Bapplication control policy.CIPSec policy.Dsoftware restriction policy.

单选题You are the administrator of a Windows 2000 network.  You upgrade five computers in the sales department to Windows 2000 Professional. You then apply the Basicwk.inf security template to the upgraded computers. The remaining computers in the sales department are using Windows NT Workstation 4.0. When users log on to the Windows 2000 Professional computers they report that they are unable to run the company’s database application.  When the users log on to Windows NT Workstation 4.0 computers they are able to run the database application.  You want the users of Windows 2000 Professional computers to be able to run the database application.  What should you do? ()AApply the Securews.inf security template to the computers.BApply the Compatsws.inf security template to the computers.CDelete the Basicwk.inf security template file from the computers.DFor each user account, grant Read permission to the database application and its associated files.EUse the System Policy Editor to configure a new security policy for the database application.

单选题You have a standalone computer that runs Windows 7. Multiple users share the computer. You need toensure that you can read the content of all encrypted files on the computer.  What should you do?()ARun the Certificates Enrollment wizard and then run Certutil.exe importpfx.BRun the Certificates Enrollment wizard and then run Certutil.exe installcert.CRun Cipher.exe /r and then add a data recovery agent from the local security policy.DRun Cipher.exe /rekey and then import a security template from the local security policy.

单选题You need to design a strategy to meet the company’s requirements for e-mail. What should you do?()AConfigure and publish a certificate template that is suitable for S/MIME, Deploy a Group Policy object (GPO) so that a certificate that is based on this template is automatically issued to all domain usersBSpecify Group Policy objects (GPOs) and IPSec policies that require all client computers to use Kerberos authentication to connect to mail serversCFor each mail server, acquire an SSL server certificate from a commercial CA whose root certificate is already trustedDRequire IPSec encryption on all TCP connections that are used to send or receive e-mail messages

单选题Your company has an Active Directory domain. The company runs Terminal Services.  Standard users who connect to the Terminal Server are in the TSUsers organizational unit (OU). Administrative users are in the TSAdmins OU. No other users connect to the Terminal Server.  You need to ensure that only members of the TSAdmins OU can run the Remote Desktop Protocol files. What should you do?()ACreate a Group Policy object (GPO) that configures the Allow .rdp files from unknown publishers policy setting in the Remote Desktop Client Connection template to Disabled. Apply the GPO to the TSUsers OU.BCreate a Group Policy object (GPO) that configures the Allow .rdp files from valid publishers and users default .rdp settings policy setting in the Remote Desktop Client Connection template to Disabled. Apply the GPO to the TSUsers OU.CCreate a Group Policy object (GPO) that configures the Allow .rdp files from valid publishers and users default .rdp settings policy setting in the Remote Desktop Client Connection template to Enabled. Apply the GPO to the TSAdmins OU.DCreate a Group Policy object (GPO) that configures the Specify SHA1 thumbprints of certificates representing trusted .rdp publishers policy setting in the Remote Desktop Client Connection template to Enabled. Apply the GPO to the TSAdmins OU.

多选题You have Active Directory Certificate Services (AD CS) deployed.  You create a custom certificate template.   You need to ensure that all of the users in the domain automatically enroll for a certificate based on the  custom certificate template.   Which two actions should you perform()AIn a Group Policy object (GPO), configure the autoenrollment settingsBIn a Group Policy object (GPO), configure the Automatic Certificate Request Settings.COn the certificate template, assign the Read and Autoenroll permission to the Authenticated Users  group.DOn the certificate template, assign the Read, Enroll, and Autoenroll permission to the Domain Users  group.

单选题You are the network administrator for ExamSheet.net. You administer ExamSheet’s Windows 2000 network. You upgrade 10 computers in the Accounting department from Windows NT Workstation 4.0 to Windows 2000 Professional. All of the upgraded computers are configured to have the default security settings. For security purposes you want to ensure that these computers can only communicate with other Windows 2000 computers.  What should you do?()AOn each computer configure separate memory spaces for each financial and credit applications.BApply Highly Secure security template to the local security policy of the computers in the Accounting department.CApply Compatible security template to the local security policy of the computers in the Accounting department.DAdd each user account to the Power Users group on that user’s computer.

多选题You are implementing an IDP policy template from Juniper Networks. Which three steps are included in thisprocess?()Aactivating a JUNOS Software commit scriptBconfiguring an IDP groups statementCsetting up a chassis clusterDdownloading the IDP policy templatesEinstalling the policy templates

单选题You are the network administrator for The network consists of a single Active Directory domain named All servers run Windows Server 2003 You install a new server named TestKing6. You install an application on TestKing6. The application fails to start because of the NTFS permission on TestKing6 are too restrictive. You use a security template from the manufacturer of the application to modify the NTFS permissions on TestKing6 to allow the application work. A new update to the application is released. The application no longer requires the modified NTFS permissions. You need to restore the default permissions on TestKing6 to restore the original level of system security. Which security template should you import into the local security policy of TestKing6?()AThe Syssetup.inf template.BThe Profsec.inf template.CThe Defltsv.inf template.DThe Netserv.inf template.

单选题Which statement regarding the implementation of an IDP policy template is true?()AIDP policy templates are automatically installed as the active IDP policy.BIDP policy templates are enabled using a commit script.CIDP policy templates can be downloaded without an IDP license.DIDP policy templates are included in the factory-default configuration.

单选题You completed the development of a new application and want to create a new domain in a new environment for functional testing. You want to have the same settings for your new domain as your old domain, with the option of changing the configuration in the new target environment. Which two actions should you execute?()AUse the introspect () command in WLST to gather the configuration information from the  original domain.BUse pack/unpack to transfer the domain from one machine to another.CCreate a domain template from the original domain using the Domain Template Builder and use  the Configuration Wizard to create a new domain from the template.DUse the Admin Console of the original domain to create a domain template from the original  domain and use the Configuration Wizard to create a new domain from the template.

单选题You have a portable computer that runs Windows 7. The computer is joined to a domain. Multiple users logon to the computer. You need to prevent the computer from displaying the username of the last user whologged on. What should you do?()AFrom Control Panel, modify the User Profiles settings.BFrom Control Panel, modify the Personalization settings.CFrom the local computer policy, add a policy template.DFrom the local computer policy, modify the local security policy.