单项选择题X 纠错
A. Source IP and browser
B. Source IP and certificate
C. Certificate and Host Checker
D. Host Checker and source IP
你可能喜欢
多项选择题
A. Authentication server
B. Session options
C. Authentication policy
D. End-point security policy
E. Role-mapping rules
单项选择题
A. Implement a RADIUS request attribute policy to assist with realm selection and create different role-mapping rules for the user in each realm.
B. Implement a directory/attribute server on the realm and set up this server to determine by group membership the proper role to which a user should be mapped.
C. Reorder the role-mapping rules to allow for the more open role to be mapped first and then enable the "stop processing rules when this rule matches" function on this role.
D. Implement a Host Checker policy on the realm that determines the geographic location of the device and restricts the user based on the results of the policy.
多项选择题
A. Move the Preferred Members role-mapping rule to the top of the list.
B. Remove the Preferred Members role from the role-mapping rule.
C. Edit the Preferred Members role-mapping rule so that the username is equal to *.
D. Edit the Preferred Members role-mapping rule so that only the select users are assigned to the role-mapping rule.
E. Edit the Preferred Members role-mapping rule and select "Stop processing rules when this rule matches".
单项选择题
A. Roaming Session
B. Session Migration
C. Location Awareness
D. Persistent Session
多项选择题
A. access profile
B. IKE parameters
C. tunneled interface
D. redirect policy
单项选择题
A. Delete the default auth table mapping policy
B. Create auth table mapping policies that route users to specific resources
C. Create Resource Access policies that permit access to specific resources
D. Create Source Interface policies that route users to specific resources
单项选择题
A. uac-policy
B. ic-policy
C. inyranet-auth
D. uac-auth
多项选择题
A. Configure an authentication policy as part of the user role definitions.
B. Configure a Sign-in Policy.
C. Configure authentication agents as part of the user role definitions
D. Configure an authentication policy as part of the authentication realm definition.
多项选择题
A. Take a "System Snapshot"
B. Configure "Licensing"
C. Review the "Events"
D. Set the date and time
E. Upgrade or downgrade the firmware
单项选择题
A. Use the "is exactly" or "contains" operators.
B. Create a user filter matching the dn of the certificate.
C. Verify that the certificate is issued by a publicly trusted cs.
D. Match the certificate type and value with an attribute from the ldap server.