A. To allow clientless access to the network
B. To restrict access to protected resources on the network
C. To scan an endpointfor compliance with security policies
D. To push a firewall policy to the endpoint‘s local firewall application
第1题
A. Host Checker is disabled.
B. Host Checker will perform continous checks.
C. Host Checker will perform checks when user logs out.
D. Host Checker will perform checks when user first logs in.
第3题
A.to put not
B.not to put
C.of putting
D.of not putting
第4题
A.document
B.equipment
C.program
D.statement
第5题
(1)( ) The box marked "for carrier use only".
(2)( ) The "date of issuance" of the AWB.
(3)( ) A specific notation of an actual date of despatch.
第6题
(1)( ) True
(2)( ) False
第7题
A.How to send an E-mail.
B.How to operate a computer.
C.How to run the spell checker.
D.How to copy sentences and paste them in other places.
第8题
A. Isolate a file name unique to the custom image and create a custom rule-type of "File" which matches on the file. Select the "Required" option under the custom rule.
B. Identify the MAC address unique to network cards installed in PCs with the custom image and create a custom rule-type of "MAC Address" which matches on the appropriate MAC address.
Select the "Required" option under the custom rule C. Identify the IP address unique to the network cards installed in PCs with the custom image and create a custom rule-type of "IP Address" which matches on the appropriate IP address. Select the "Required" option under the custom rule.
D. Isolate or create a unique Windows registry key for the custom image and create a custom rule- type of "Registry Setting" which matches on the name of the registry key.
第9题
A. All roles are evaluated together.
B. Each role is evaluated separately.
C. Clients must pass all policies to access the role.
D. Clients will pass as long as one policy is accepted.
第10题
A. Select "Require and Enforce" for the Host Checker Policy in the realm authentication policy.
B. Select "Evaluate Policies" for the Host Checker policy in the realm authentication policy.
C. Configure the Host Checker policy as a role restriction for the Employee role.
D. Configure the Host Checker policy as a resource access policy for the Employee role.
为了保护您的账号安全,请在“上学吧”公众号进行验证,点击“官网服务”-“账号验证”后输入验证码“”完成验证,验证成功后方可继续查看答案!