A user calls the help desk and explains that they just purchased a Macintosh computer. When they log into the network, the Odyssey Access Client is not automatically downloaded as it was when the user used their Windows PC.How do you resolve this issue?()A、Download the Macintosh installer from the Junos Pulse Access Control Service and manually install the Odyssey Access Client.B、Provide the user with the sign-in URL you set up for Macintosh users; this will push the Odyssey Access Client to the user's machine.C、Assist the user to configure the Macintosh native supplicant and provide the AppleScnptto expose the EAP-JUAC inner authentication protocol.D、Configure the user's role to install the Java agent, which is a requirement to allow the Junos Pulse Access Control Service to deploy the Odyssey Access Client.

A user calls the help desk and explains that they just purchased a Macintosh computer. When they log into the network, the Odyssey Access Client is not automatically downloaded as it was when the user used their Windows PC.How do you resolve this issue?()

  • A、Download the Macintosh installer from the Junos Pulse Access Control Service and manually install the Odyssey Access Client.
  • B、Provide the user with the sign-in URL you set up for Macintosh users; this will push the Odyssey Access Client to the user's machine.
  • C、Assist the user to configure the Macintosh native supplicant and provide the AppleScnptto expose the EAP-JUAC inner authentication protocol.
  • D、Configure the user's role to install the Java agent, which is a requirement to allow the Junos Pulse Access Control Service to deploy the Odyssey Access Client.

相关考题:

You are the administrator of a Windows 2000 Active Directory network. The network consists of a single domain. The domain includes 20 Windows NT Workstation 4.0 client computers. All other client computers are Windows 2000 Professional computers.You create a Windows NT 4.0 default user policy on the Windows 2000 Server computer that is configured as the PDC emulator. This default user policy denies access to Network Neighborhood. You then install Terminal Services on one of the servers and Terminal Services Client on the 20 Windows NT Workstation client computers.You find that the users of the Terminal Server can still browse the network when they open My Network Places. You want to prevent all users from browsing the network.What should you do?A.Modify the Windows NT policy template file so that you can restrict access to both My Network Places and Network Neighborhood. Save the policy file on the Terminal Server.B.Copy the Windows NT policy file to the 20 Windows NT Workstation computers.C.Create a Windows 2000 Group Policy that denies user access to My Network Places.D.Edit the local registry on the Windows NT Workstation computers to deny access to Entire Network in Network Neighborhood.

A user is successfully authenticating to the network but is unable to access protected resources behind a ScreenOS enforcer. You log in to the ScreenOS enforcer and issue the command get auth table infranet and you do not see the user listed.Which two event log settings on the Junos Pulse Access Control Service must you enable to troubleshootthis issue?()A. Connection RequestsB. System ErrorsC. Enforcer EventsD. Enforcer Command Trace

You are a network administrator for Your network consists of a single Active Directory domain named All servers run Windows Server 2003.A help desk user reports that a user object was accidentally deleted and the user can no longer log on to the domain and access resources. You confirm that the user object was included in the most recent backup.You need to enable the user to log on to the domain. You must ensure that the user retains access to resources.What should you do?()A. Install a new domain controller. Install Active Directory from media by using the most recent backup. Manually initiate replication.B. Decrease the garbage collection interval. Perform a nonauthorative restoration of Active Directory by using the most recent backup.C. Perform a nonauthorative restoration of Active Directory by using the most recent backup. Authoritatively restore the user object that was deleted.D. Re-create a user object that has the same user principal name (UPN) as the user object that was deleted. Authoritatively restore this user object.

You are using windows installer to deploy an application to 750 Windows 2000 Professional computers on your network. The network includes organizational unit (OU) named sales. A Group Policy object (GPO) is created for the Sales OU. You want to deploy that application in such a way that the shortcuts of that application should be created on the used desktop as well as in start-menu. When a user first click on the shortcut or try to open any file whose extension is associated with that application, then that application should automatically install on the computer. What should you do to accomplish this task?()A、Using GPO, publish that application at user levelB、Using GPO, assign that application at the user levelC、Using GPO, publish that application at computer levelD、Using GPO, assign that application at the computer level.

A network technician is troubleshooting a network issue that has just been reported. Which of thefollowing troubleshooting steps should the technician take FIRST to help resolve this issue?()A、Record the solution in the appropriate logs for future use.B、Ask the user who reported the issue what past documentation they have.C、Ask the user who reported the issue to explain the symptoms in detail.D、Record what steps should be taken to resolve the issue.

A user is successfully authenticating to the network but is unable to access protected resources behind a ScreenOS enforcer. You log in to the ScreenOS enforcer and issue the command get auth table infranet and you do not see the user listed.Which two event log settings on the Junos Pulse Access Control Service must you enable to troubleshootthis issue?()A、Connection RequestsB、System ErrorsC、Enforcer EventsD、Enforcer Command Trace

You have three classes of users on your network: employee, contractor, and IT administrator. You configure the Junos Pulse Access Control Service to assign roles to each user class and require that a specific wireless SSID be preconfigured for the Odyssey Access Client based on the role. Which configuration method should you use to satisfy this scenario?()A、Create a "Settings Update file" in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under "User Roles" "Agent" "Odyssey Settings" "Preconfigured Installer".B、Configure a wired adapter and assign the required SSID under "User Roles" "Agent" "Odyssey Settings".C、Create a script in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under "User Roles" "Agent" "Odyssey Settings" "Preconfigured Installer".D、Create a "Preconfiguration file" in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under "User Roles" "Agent" "Odyssey Settings" "Preconfigured Installer".

A new software engineer has been hired. As part of the normal hiring process, the user was added to the Active Directory and placed into the Domain Users group and the SW_DEV group. The Domain Users group has access to the company's intranet website and time card system. The SW_DEV group has access to the source code library server. You have created roles that correspond to each Active Directory group. The user calls the help desk stating that they cannot access the source code library server. Which two troubleshooting tools would you use on the Junos Pulse Access Control Service to resolve the issue?()A、Perform a policy trace for the specific user and review the output to isolate the problem.B、Review the Events log.C、Review the Admin Access log to verify that the user has the correct permissions to access the SVVJDEV resource.D、Review the User Access log to verify that the user is getting mapped to both the Domain User role and the SW_DEV role.

You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains Windows Server 2003 file servers. The network also contains a Windows Server 2003 computer named Server1 that runs Routing and Remote Access and Internet Authentication Service (IAS). Server1 provides VPN access to the network for users’ home computers.   You suspect that an external unauthorized user is attempting to access the network through Server1. You want to log the details of access attempts by VPN users when they attempt to access the network. You want to compare the IP addresses of users’ home computers with the IP addresses used in the access attempts to verify that the users are authorized.  You need to configure Server1 to log the details of access attempts by VPN users.   What should you do?  ()A、 Configure the system event log to Do not overwrite.B、 In IAS, in Remote Access Logging, enable the Authentication requests setting.C、 Configure the Remote Access server to Log all events.D、 Create a custom remote access policy and configure it for Authentication-Type.

You are a help desk technician for your company. Your company’s network includes an Active Directory domain and Windows XP Professional computers that are configured as members of the domain. Company policy prohibits users from accessing their computers unless they are authenticated by a domain controller. However, users report that they can log on to their computers, even though a network administrator has told them that a domain controller is not available. As a test, you log off of your computer and disconnect it from the network. You discover that you can log on by using your domain user account. You need to ensure that users cannot access their computers unless they are authenticated by a domain controller. How should you configure the local computer policy on these computers? () A、Enable the Require domain controller to unlock policy.B、Set the Number of previous logons to cache policy to 0.  C、Remove all user and group accounts from the Log on locally user right. D、Remove all user and group accounts from the Access this computer from the network user right.

You are the administrator of a Windows 2000 network. You use a user account named User1 to log on to a Windows 2000 Professional computer. Different students in a classroom use this Computer. User does not have administrative rights. However, you prefer to use this account for most of your daily activities, because it is not a security breach if you fail to log off. You want to schedule a task to run a command file named AddUsers.cmd that automatically adds six more student user accounts. What should you do?()A、Schedule the task to run under an Administrative accountB、Log on by using the local Administrator account. Then schedule the task to run under User1C、Take the ownership of Addusers.cmd file. Then schedule the task to run under User1D、Grant User1 Read  Execute permission for AddUsers.cmd. Then schedule the task to run  under User1.

You are a security administrator for your company. The network consists of a single Active Directory domain. Servers run either Windows Server 2003 or Windows 2000 Server. All client computers run Windows XP Professional.    The company’s written security policy states that user accounts must be locked if an unauthorized user attempts to guess the users, passwords. The current account policy locks out a user after two invalid password attempts in five minutes. The user remains locked out until the account is reset by an administrator. Users frequently call the help desk to have their account unlocked. Calls related to account lockout constitute 25 percent of help desk calls.    You need to reduce the number of help desk calls related to account lockout.  What should you do?()A、 Modify the Default Domain Controllers Policy Group Policy object(GPO). Increase the maximum lifetime for serviceB、 Modify the Default Domain Policy Group Policy object(GPO). Configure an account lockout threshold of 10.C、 Modify the Default Domain Controllers Policy Group Policy object(GPO). Disable the enforcement of user logon resD、 Modify the Default Domain Policy Group Policy object(GPO). Increase the minimum password age.

You are the network administrator for . The network consists of a single Active Directory domain named All network servers run Windows Server 2003. All client computers run Windows XP Professional. Multiple users share the same client computer. A server named TestKing2 functions as a file and print server. You set the profile path for all user accounts to //TestKing2/Profiles/username. Some domain users were added to the local Administrators group on the Windows XP Professional computers. A user reports that other users can log on to client computers that he has previously used and gain access to files stored in his My Documents folder on the local hard disk. You need to permanently prevent users from being able to access the My Documents folder of other domain users on the client computers. What should you do?()A、In Active Directory, modify the Default Domain Policy. Disable the Do not check for user ownership of Roaming Profile Folders setting.B、In Active Directory, modify the Default Domain Policy. Enable the Delete cached copies of roaming profiles setting.C、Log on to all client computers and delete all user profiles from the local hard disks.D、Log on to all client computers and configure the Number of previous logons to cache setting to 0.

You are the help desk manager for your company. The company network consists of a single Active Directory domain. All client computers run Windows XP Professional. All help desk technicians are members of the Help Desk Technicians group. They use Remote Assistance to remotely control user sessions to provide online support and training to users. The users currently use Windows Messenger to submit Remote Assistance invitations to the help desk technicians. You want to reduce the time required for help desk technicians to respond to Remote Assistance requests. To accomplish this goal, you want to configure the client computers to allow help desk technicians to establish a Remote Assistance session with a client computer without requiring an invitation from a user. What should you do?() A、In the Default Domain Policy, set the Remote Assistance - Solicited Remote Assistance policy setting to Disabled. B、In the Default Domain Policy, set the Remote Assistance - Offer Remote Assistance policy setting to Enabled and add the Help Desk Technicians group to the Helpers list. C、In each computer's Local Security Policy, grant the Help Desk Technicians group the Allow logon through Terminal Services user right. D、In the System properties for each computer, select the Allow users to connect remotely to this computer option, and add the Help Desk Technicians group to the list of allowed users.

You are a network administrator for your company. The network consists of a single Active Directory domain. The domain contains three Windows Server 2003 domain controllers, 20 Windows Server 2003 member servers, and 750 Windows XP Professional computers. The domain is configured to use only Kerberos authentication for all server connections.A user reports that she receives an "Access denied" error message when she attempts to connect to one of the member servers. You want to test the functionality of Kerberos authentication on the user’s client computer.  Which command should you run from the command prompt on the user’s computer?()A、netshB、netdiagC、ktpassD、ksetup

Your company’s network has client computers that run Windows 7.    When a user attempts to log on to the domain from a computer named Client1,she receives the following message:   The system cannot log you on to this domain because the system’s computer account in its primary domain is missing or the password on that account is incorrect.  You need to ensure that the user can log on to the domain from Client1.   What should you do?()A、Disjoin and rejoin Client1 to the domain.B、Add the computer account for Client1 to the Domain Computers Active Directory group.C、Reset the account password for Client1 through Active Directory Users and Computers.D、Reset the account password for the user through Active Directory Users and Computers.

Your network consists of an Active Directory domain. The domain controllers run Windows Server 2008 R2. Client computers run Windows 7.   You need to implement Encrypting File System (EFS) for all client computers. You want to achieve this goal while meeting the following requirements:   èYou must minimize the amount of data that is transferred across the network when a user logs on to or off from a client computer.   èUsers must be able to access their EFS certificates on any client computers. èIf a client computer s disk fails, EFS certificates must be accessible    What should you do?()A、Enable credential roaming.B、Enable roaming user profiles.C、Enable a Data Recovery Agent.D、Issue smart cards to all users.

You are the network administrator for your company. The network consists of a single Active Directory domain named . All domain controllers run Windows Server 2003, and all client computers run Windows XP Professional. All client computer accounts are stored in the Computer container. A user named Peter reports that he cannot log on to the domain from his computer. Peter receives the logon message shown in the exhibit. Exhibit: Logon Message Your account is configured to prevent you from using this computer. Please try another computer. You need to enable Peter to log on. What should you do?()A、Create an account for Peter's computer in the Computers container.B、Grant the Log on locally user right to Peter's user account.C、Enable Peter's user account.D、Change the properties of Peter's user account so he can log on to any computer.

You are the administrator of the desktop.com domain. You are configuring a roaming user profile for a user named Paul West. You create a user account named Paul West on the Windows 2000 server computer named server 1. You define a network profile by entering the path //server1/profile/%username% in Paul’s user account setting. When Paul logs on to a Windows 2000 Professional computer he sees the following message- “Windows can not locate your roaming profile and is attempting to log you on with your local profile which will not be propagated to the server.” The details of network cannot be found. You want to configure the roaming user profile for Paul. What should you do?()A、Create a home folder for Paul.B、Share the network profile directory.C、Map a device to network profile directory.D、Use the %username% variable to allow access.

You are a network administrator for Your network consists of a single Active Directory domain named All servers run Windows Server 2003. A help desk user reports that a user object was accidentally deleted and the user can no longer log on to the domain and access resources. You confirm that the user object was included in the most recent backup. You need to enable the user to log on to the domain. You must ensure that the user retains access to resources. What should you do?()A、Install a new domain controller. Install Active Directory from media by using the most recent backup. Manually initiate replication.B、Decrease the garbage collection interval. Perform a nonauthorative restoration of Active Directory by using the most recent backup.C、Perform a nonauthorative restoration of Active Directory by using the most recent backup. Authoritatively restore the user object that was deleted.D、Re-create a user object that has the same user principal name (UPN) as the user object that was deleted. Authoritatively restore this user object.

You have a computer that runs Windows 7. The computer contains a folder named C:/data. You use Advanced Sharing to share C:/data by using the default share permissions. When a user tries to access theshare over the network, he gets an Access is Denied error message. You need to ensure that the user canaccess the share.  What should you do?()A、Allow file and printer sharing through Windows Firewall.B、Change the network location from a Public network to a Home or Work network.C、From the Security settings of the folder, assign the user the Read NTFS permission.D、From the Advanced Sharing settings of the folder, assign the user the Read share permission.

You are the network administrator for TestKing.com. The network consists of a single Active Directory domain named testking.com. The domain contains Windows Server 2003 computers and Windows XP Professional computers. You use a non-administrative user account named Joseph to log on to a client computer. You need to change the password for a domain user account named Sophia. You open the Active Directory Users and Computers console. When you attempt to change Sophia's password, you receive the following error message: "Access is denied". You need to remain logged on to the client computer as Joseph, and you need to be able to change Sophia's password. What should you do?()A、Add the non-administrative domain user account to the local Administrators group.B、Use the runas command to run Active Directory Users and Computers with domain administrative credentials.C、From a command prompt, run the net user Sophia /add /passwordreq:yes command.D、From a command prompt, run the net accounts /uniquepw: /domain command.

You are a network administrator for TestKing. The network consists of a single Active Directory domain named testking.com. All servers run Windows Server 2003. All client computers run Windows XP Professional. A server named Testking32 contains a folder that is shared as ManagerData$. A global group named AllManagers has permission to access the shared folder. A user reports that he needs access to the ManagerData$ shared folder. You add his user account to the All Managers global group. When the user attempts to connect to the shared folder by typing //Testking32/ManagerData$/ , he receives the following error message: "//Testking32/ManagerData$/ is not accessible. You might not have permissions to use the network resource. Contact the administrator of this server to find out if you have access permissions. Access is denied. You need to ensure that the user can access the ManagerData$ shared folder on Testking32. What should you do?()A、Instruct the user to type //Testking32/ManagerData/ when he attempts to access the folder.B、Add the Anonymous Logon group to the ACL for the ManagerData$ shared folder.C、Select the Replace permission entries on all child object with entries shown here that apply to child objects check box.D、Instruct the user to log off and log on again before he accesses the folder.

You are the administrator of your company’s network. A user name Andrew has limited dexterity, which prevents him from using standard keyboard when completing his daily tasks. You configure Windows 2000 Professional to use sticky keys and screen keyboard options. You save the accessibility options to a shared folder on the local hard disk of Andrews’s computer. You want to configure the same options for another user Peter. You log on to Peter’s computer using his local user account and you access the folder over the network from Peter’s computer. You select the .acw file from the shared folder to set up Peter’s computer to use the accessibility option. You receive an error message as follows: " There was a problem running the file when running the accessibility wizard". What should you do to install the accessibility features on Peter’s computer?()A、Copy the .acw file to the c;/documents/setting/default user folderB、Save the accessibility option to the floppy disk and change the permission to allow full control  of the fileC、Resume the setting for the option by using utility manager, then copy the file to Peter’s local  profile folderD、Change the permission of the .acw file in the folder to allow access for Peter’s user account.

You are the network administrator for The network consists of a single Active Directory domain named . For security reasons,management decides that a particular user must not be able to log on to the domain after 5:00 P.M. If the user is logged on to the domain at 5:00 P.M., he must be logged off automatically. You configure the Logon Hours setting for the appropriate user account. Thatnight, you verify that the user cannot log on to the domain after 5:00 P.M. The nextday, you notice that the user is still accessing domain resources at 6:00 P.M. Youverify that the time on the user's computer and on the domain controller arecorrect. You need to ensure that the user is logged off automatically if he is still working onthe domain after 5:00 P.M. What should you do?()A、In Active Directory Users and Computers, on the Sessions tab, configure the End Session setting for the user account. Instruct the user to log off from the domain and log on again.B、Modify the Default Domain Policy GPO to enforce logoff when logon hours expire. Ensure that the user's computer has the latest Group Policy settings applied.C、Remove the user's domain account from the local Administrators group on the user's client computer. Instruct the user to log off from the domain and log on again.D、Use Computer Management on the domain controller. Restart the Net Logon service.

单选题You are the administrator of a Windows 2000 network. You use a user account named User1 to log on to a Windows 2000 Professional computer. Different students in a classroom use this Computer. User does not have administrative rights. However, you prefer to use this account for most of your daily activities, because it is not a security breach if you fail to log off. You want to schedule a task to run a command file named AddUsers.cmd that automatically adds six more student user accounts. What should you do?()ASchedule the task to run under an Administrative accountBLog on by using the local Administrator account. Then schedule the task to run under User1CTake the ownership of Addusers.cmd file. Then schedule the task to run under User1DGrant User1 Read  Execute permission for AddUsers.cmd. Then schedule the task to run  under User1.

单选题Your network consists of an Active Directory domain. The domain controllers run Windows Server 2008 R2. Client computers run Windows 7.   You need to implement Encrypting File System (EFS) for all client computers. You want to achieve this goal while meeting the following requirements:   èYou must minimize the amount of data that is transferred across the network when a user logs on to or off from a client computer.   èUsers must be able to access their EFS certificates on any client computers. èIf a client computer s disk fails, EFS certificates must be accessible    What should you do?()AEnable credential roaming.BEnable roaming user profiles.CEnable a Data Recovery Agent.DIssue smart cards to all users.