You want to create a Host Checker policy that looks for a specific antivirus product that is running on your client machines, but the predefined antivirus options do not include the antivirus product version that you use.Which feature should you verify the antivirus product is up to date?()A、Enhanced Endpoint SecurityB、DP signaturesC、Antivirus licensingD、Endpoint Security Assessment Plug-in

You want to create a Host Checker policy that looks for a specific antivirus product that is running on your client machines, but the predefined antivirus options do not include the antivirus product version that you use.Which feature should you verify the antivirus product is up to date?()

  • A、Enhanced Endpoint Security
  • B、DP signatures
  • C、Antivirus licensing
  • D、Endpoint Security Assessment Plug-in

相关考题:

If the policies shown below evaluate as described, which action will occur for the listed policy expression?() Policy A=True Policy B=True Policy C=True Policy D=False Policy Expression: !(AB)||CA、The policy evaluates to True (an).B、The policy evaluates to True because of c.C、The policy evaluates to False because of c.D、The policy evaluates to False because of !(ab).

What is one configuration method for loading a factory default configuration onto a J-series router?()A、load override resetB、load factory-defaultC、rollback factory-defaultD、request system factory-default

Which configuration shows the correct application of a security policy scheduler?()A、[edit security policies from-zone Private to-zone External] user@host# show policy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn myTunnel; } scheduler-name now; } } }B、[edit security policies from-zone Private to-zone External] user@host# show policy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn myTunnel; } } } scheduler-name now; }C、[edit security policies from-zone Private to-zone External] user@host# show policy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn scheduler-name now; } } } }D、[edit security policies from-zone Private to-zone External] user@host# show policy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; scheduler-name now; } then { permit { tunnel { ipsec-vpn myTunnel; } } } scheduler-name now; }myTunnel;

You have a firewall enforcer protecting resources in a data center. A user is experiencing difficulty connecting to a protected resource.Which two elements must exist so the user can access the resource?()A、Resource access policy on the MAG Series deviceB、IPsec routing policy on the MAG Series deviceC、General traffic policy blocking access through the firewall enforcerD、Auth table entry on the firewall enforcer

Which two statements are correct regarding units in JUNOS?()A、Units in JUNOS are always required for any interface configured with logical addresses such as IP and IPv6.B、Units in JUNOS are only required when you are configuring sub-interfaces for inter-VLAN routing.C、Unit numbers must match the DLCI or VCI numbers configured on the interface.D、Unit 0 is the only value allowed on interfaces running HDLC, PPP, or for Ethernet interfaces not doing VLAN-tagging.

Which two metrics does the Executive report summarize? ()(Choose two.)A、QoS statisticsB、WAN performanceC、acceleration statisticsD、compression statistics

Your manager has informed you that only specific users can have access to the Preferred Members role, and that these users are restricted to the Preferred Members role. The Preferred Members role-mapping rule is currently set as the last rule in your role-mapping rules and is based on username. Currently all users are assigned to the Preferred Members role-mapping rule. Which three changes in the admin GUI will enforce your managers change request?()A、Move the Preferred Members role-mapping rule to the top of the list.B、Remove the Preferred Members role from the role-mapping rule.C、Edit the Preferred Members role-mapping rule so that the username is equal to *.D、Edit the Preferred Members role-mapping rule so that only the select users are assigned to the role-mapping rule.E、Edit the Preferred Members role-mapping rule and select "Stop processing rules when this rule matches".

When using keyboard shortcuts, which single keystroke combination allows users to erase the entire current command?()A、Ctrl + aB、Ctrl + eC、Ctrl + uD、Ctrl + w