In the admin GUI, you navigate to "System" "Status" "Active Users". You see several buttons, including "Delete Session", "Delete All Sessions". "Refresh Roles", and "Disable All Users".Which two statements are true?()A、To forcibly sign out a single user, you should select the check box next to that user's login name, then select "Delete Session".B、If you select "Delete All Sessions", all users are forcibly signed out and are unable to sign in again until "Enable All Users" is selected.C、Selecting "Disable All Users" prevents users from signing in and starting a new session, but does not forcibly sign out any users that already have an existing session.D、Selecting "Refresh Roles" re-evaluates authentication policies, role-mapping rules, and resource policies for all existing user sessions.

In the admin GUI, you navigate to "System" > "Status" > "Active Users". You see several buttons, including "Delete Session", "Delete All Sessions". "Refresh Roles", and "Disable All Users".Which two statements are true?()

  • A、To forcibly sign out a single user, you should select the check box next to that user's login name, then select "Delete Session".
  • B、If you select "Delete All Sessions", all users are forcibly signed out and are unable to sign in again until "Enable All Users" is selected.
  • C、Selecting "Disable All Users" prevents users from signing in and starting a new session, but does not forcibly sign out any users that already have an existing session.
  • D、Selecting "Refresh Roles" re-evaluates authentication policies, role-mapping rules, and resource policies for all existing user sessions.

相关考题:

You have created a Host Checker policy that contains multiple rules. You want to inform end users which rule specifically has failed.In the admin GUI, which configuration setting would you enable?() A. Enable Custom InstructionsB. Pre-auth notificationC. Remediation messageD. Send reason strings

On the Junos Pulse Access Control Service, you have created a role called Secret that you only want to provide to users who present a certificate.Using the admin GUI, which two features would you configure to satisfy this requirement?()A. Sign-in PolicyB. Role Mapping RuleC. Role RestrictionsD. Trusted Server CA

Your corporate security policy requires that a user performing attacks must have limited network access and activities until an administrator can investigate.In the admin GUI, which sensor event policy action must you configure in "Configuration" >"Sensors" >"Sensor Event Policies" >[rule name] to accomplish this?()A. IgnoreB. Replace users roleC. Terminate user sessionD. Disable user account

Before replacing a MAG Series device, using the admin GUI, you export two backup files, system.cfg from Maintenance ImportfExport Configuration and user.cfg from Maintenance Import/Export Users. When you receive the new hardware, you import all of the settings stored in the system.cfg file (including the IP address, network configuration, and device certificates), but you fail to import the user.cfg file.Which three configuration areas were updated by system.cfg?()A. Cluster configuration settingsB. Static routesC. SNMP settingsD. Sign-in policiesE. MAC authentication realms

You are configuring an LDAP authentication server, and you want to configure role-mapping rules based on group membership. When you attempt to search for groups in the server catalog, no groups appear.Assuming the LDAP server is reachable and functioning properly, in the admin GUI. Which two parts of the configuration should you verify are correct?()A. Finding user entriesB. Authentication requiredC. LDAP Server TypeD. Determining group membership

A customer is deploying a new Junos Pulse Access Control Service and has completed the initial boot configuration as prompted using a serial connection. The customer now wants to complete the rest of the configuration using the admin GUI.Into which port on the Junos Pulse Access Control Service should the customer plug the network cable to enable access to the admin GUI?()A. the internal interfaceB. the external interfaceC. the management interfaceD. the console interface

You have a server that runs Windows Server 2003 Service Pack 2 (SP2).An administrator named Admin1 reports that when he tries to manage your server remotely by using theComputer Management console he receives the following error message.You verify that Admin1 is a member of the Domain Admins group.You need to ensure that Admin1 can manage your server remotely.What should you do on your server? ()A. Add Admin1 to the local Administrators group.B. Add Admin1 to the local Server Operators group.C. Start the Remote Registry service.D. Start the Remote Procedure Call (RPC) Locator service.

You have a stand-alone file server that runs Windows Server 2003 Service Pack 2 (SP2).You create an account named Admin1 and add it to the Power Users group.You attempt to log on to the server by using the Admin1 account and receive the following message: The local policy of this system does not permit you to log on interactively.”You review the security settings as shown in the exhibit. (Click the Exhibit button.)You need to ensure that the Admin1 account can log on to the console of the server.What should you do? ()A. Add the Admin1 account to the Administrators group.B. Add the Admin1 account to the Allow log on locally policy.C. Remove the Admin1 account from the Users group.D. Remove the Users group from the Deny log on locally policy.

In the Junos Pulse Access Control Service, which three actions are only available in the admin GUI? ()A、Take a "System Snapshot"B、Configure "Licensing"C、Review the "Events"D、Set the date and timeE、Upgrade or downgrade the firmware

A customer is deploying a new Junos Pulse Access Control Service and has completed the initial boot configuration as prompted using a serial connection. The customer now wants to complete the rest of the configuration using the admin GUI.Into which port on the Junos Pulse Access Control Service should the customer plug the network cable to enable access to the admin GUI?()A、the internal interfaceB、the external interfaceC、the management interfaceD、the console interface

T2000网管中,能成功登录的用户名和密码是()。A、admin和T2000B、Admin和T2000C、admin和t2000D、Admin和t2000

You navigate to "UAC" "Infranet Enforcer" "Auth Table Mapping" in the admin GUI. You see one policy, which is the unmodified, original default policy.Which statement is true?()A、Dynamic auth table mapping is not enabled.B、A successful authentication attempt will result in a new authentication table entry, which will be delivered only to the Junos enforcer protecting the network from which the user has authenticated.C、To create a static auth table mapping, you must delete the default policy.D、The default policy applies only to the factory-default role User.

Your network consists of a single Active Directory domain. An organizational unit (OU) named Servers contains all member servers in the domain. The domain contains a Group Policy object (GPO) named Policy1.  A user account named Admin1 is used to administer the member servers. You need to allow Admin1 to apply Policy1 to the member servers. You must prevent Admin1 from modifying Policy1. What should you do?()A、Add Admin1 to the Server Operators group.B、Add Admin1 to the Group Policy Creator Owners group.C、On the Servers OU, assign Admin1 the permission to link GPOs.D、On Policy1, assign Admin1 the permission to apply group policy.

Your network contains a server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2).  You create a domain account named Admin1. You need to configure the security for Admin1 to meet the following requirements: Allow Admin1 to monitor events in the system event log and the application event logAllow Admin1 to create and view counter logs in Performance MonitorMinimize the user rights assigned to Admin1 To .which group should you add Admin1?()A、Power Users.B、Administrators.C、Performance Log Users.D、Performance Monitor Users.

You have a server that runs Windows Server 2003 Service Pack 2 (SP2). You create a user account named Admin1. You need to allow Admin1 to restart the server and to manage shared folders. You must minimize the rights assigned to Admin1.Which group should you add Admin1 to? ()A、Power UsersB、AdministratorsC、HelpServicesGroupD、Remote Desktop Users

You have an Exchange 2010 organization.You have an administrative user named Admin1.You need to ensure that Admin1 can move mailboxes in the organization.The solution must assign the minimum amount of permissions to Admin1. What should you do?()A、Create a local move request.B、Create a custom Management role.Assign the role to Admin1.C、Add Admin1 to the Organization Management role group.D、Add Admin1 to the Recipient Management security group.

多选题In the Junos Pulse Access Control Service, which three actions are only available in the admin GUI? ()ATake a System SnapshotBConfigure LicensingCReview the EventsDSet the date and timeEUpgrade or downgrade the firmware

单选题You have created a Host Checker policy that contains multiple rules. You want to inform end users which rule specifically has failed.In the admin GUI, which configuration setting would you enable?()AEnable Custom InstructionsBPre-auth notificationCRemediation messageDSend reason strings

单选题You need to ensure that Admin2 can administer Active Directory to meet the company’s technical requirements.   What should you do?()AAdd Admin2 to the Domain Admins global group.BAdd Admin2 to the Backup Operators domain local group.CDelegate full control ofall objects in graphicdesigninstitute.com to Admin2.DDelegate full control of all objects in the Domain Controllers organizational unit(OU)to Admin2.

多选题You want to enforce a Host Checker policy so that only users who pass the policy receive the Employee role. In the admin GUI, which two parameters must you configure?()ASelect Require and Enforce for the Host Checker Policy in the realm authentication policy.BSelect Evaluate Policies for the Host Checker policy in the realm authentication policy.CConfigure the Host Checker policy as a role restriction for the Employee role.DConfigure the Host Checker policy as a resource access policy for the Employee role.

多选题In the admin GUI, you navigate to "System" "Status" "Active Users". You see several buttons, including "Delete Session", "Delete All Sessions". "Refresh Roles", and "Disable All Users".Which two statements are true?()ATo forcibly sign out a single user, you should select the check box next to that user's login name, then select Delete Session.BIf you select Delete All Sessions, all users are forcibly signed out and are unable to sign in again until Enable All Users is selected.CSelecting Disable All Users prevents users from signing in and starting a new session, but does not forcibly sign out any users that already have an existing session.DSelecting Refresh Roles re-evaluates authentication policies, role-mapping rules, and resource policies for all existing user sessions.

多选题On the Junos Pulse Access Control Service, you have created a role called Secret that you only want to provide to users who present a certificate.Using the admin GUI, which two features would you configure to satisfy this requirement?()ASign-in PolicyBRole Mapping RuleCRole RestrictionsDTrusted Server CA

多选题You are configuring an LDAP authentication server, and you want to configure role-mapping rules based on group membership. When you attempt to search for groups in the server catalog, no groups appear.Assuming the LDAP server is reachable and functioning properly, in the admin GUI. Which two parts of the configuration should you verify are correct?()AFinding user entriesBAuthentication requiredCLDAP Server TypeDDetermining group membership

单选题You navigate to "UAC" "Infranet Enforcer" "Auth Table Mapping" in the admin GUI. You see one policy, which is the unmodified, original default policy.Which statement is true?()ADynamic auth table mapping is not enabled.BA successful authentication attempt will result in a new authentication table entry, which will be delivered only to the Junos enforcer protecting the network from which the user has authenticated.CTo create a static auth table mapping, you must delete the default policy.DThe default policy applies only to the factory-default role User.

单选题Your corporate security policy requires that a user performing attacks must have limited network access and activities until an administrator can investigate.In the admin GUI, which sensor event policy action must you configure in "Configuration" "Sensors" "Sensor Event Policies" [rule name] to accomplish this?()AIgnoreBReplace users roleCTerminate user sessionDDisable user account

单选题Which command do you use to navigate to [edit interfaces]?()Acd interfacesBdir edit interfacesCedit interfacesDinterfaces

多选题Before replacing a MAG Series device, using the admin GUI, you export two backup files, system.cfg from "Maintenance" "ImportfExport Configuration" and user.cfg from "Maintenance" "Import/Export Users". When you receive the new hardware, you import all of the settings stored in the system.cfg file (including the IP address, network configuration, and device certificates), but you fail to import the user.cfg file. Which three configuration areas were updated by system.cfg?()ACluster configuration settingsBStatic routesCSNMP settingsDSign-in policiesEMAC authentication realms

单选题You are an administrator of a large campus network. Every switch on a floor within each building of your campus has been configured for a different VLAN. During implementation of the Junos Pulse Access Control Service, you must configure a RADIUS return attribute policy to apply a role representing a group of authenticated users that frequently transport their laptops from building to building and floor to floor. In the admin GUI, which policy element would you enable to accommodate these users?()AAdd Session-Timeout attribute with value equal to the session lifetimeBAdd Termination-Action attribute with value equal 1CVLANDOpen port