单选题 What is the primary purpose of creating a Location Group Policy? ()
to associate more than one realm with an authentication server
to logically group network access devices and associate them with specific sign-in policies
to allow or prevent users from accessing resources in specific locations on the network
to define the URL that users of network access devices can use to access the Infranet Controller
单选题 What must be updated regularly to detect the newest versions of personal firewalls on endpoints? ()
Infranet Enforcer firmware
Infranet Controller rollback software
Host Security Assessment Plug-in (HSAP)
Endpoint Security Assessment Plug-in (ESAP)
单选题 Your company has a mix of employees and contractors. Contractor usernames always begin with"con-"; employee usernames never begin with "con-". You need to give employees access to allresources and give contractors access to a limited set of resources. Employee and contractor roles have been created with the appropriate access privileges, and the realm is set to merge settings for all assigned roles. Which role mapping ruleset would result in the correct access privileges being assigned?()
username=* -> Employee-role Stop username=con-* -> Contractor-role
username=* -> Employee-role username=con-* -> Contractor-role Stop
username=con-* -> Contractor-role Stop username=* -> Employee-role
username=con-* -> Contractor-role username=* -> Employee-role Stop
单选题 Which log contains information about service restarts, system errors, warnings, and requests to check server connectivity? ()
Events log
System log
User Access log
Admin Access log
单选题 What is true about the operation of the Infranet Enforcer? ()
It assigns users a set of roles.
It allows access based on auth table entries.
It verifies whether an endpoint meets security requirements.
It configures the UAC agent to allow or deny access to resources.
单选题 Which interface does the Infranet Controller use to push the configuration? ()
trusted port
internal port
trust interface
untrust interface
多选题 Which two methods of authentication are used by the Infranet Controller for IPSec enforcement?()
dial-up VPN
IKE authentication
XAuth authentication
shared IKE authentication
多选题 If Host Checker restrictions are applied at the role level and the "Allow access to the role if any ONE of the select policies is passed" option is unchecked, which two statements are true?()
All roles are evaluated together.
Each role is evaluated separately.
Clients must pass all policies to access the role.
Clients will pass as long as one policy is accepted.
多选题 Which three statements about dynamic filtering are true? ()
Dynamic filtering creates a query statement.
Dynamic filtering has an option to save query.
Dynamic filtering can select any log field to filter.
Dynamic filtering permanently removes other log entries.
Dynamic filtering redraws the log when you select a variable link.
单选题 What happens when Host Checker is configured to perform checks every "0" minutes? ()
Host Checker is disabled.
Host Checker will perform continous checks.
Host Checker will perform checks when user logs out.
Host Checker will perform checks when user first logs in.