A. Modify sign-in policy. B. Configure role mapping. C. Assign authentication server. D. Configure authentication policy.
单项选择题Your company has a mix of employees and contractors. Contractor usernames always begin with con- ; employee usernames never begin with con- . You need to give employees access to allresources and give contractors access to a limited set of resources. Employee and contractor roles have been created with the appropriate access privileges, and the realm is set to merge settings for all assigned roles. Which role mapping ruleset would result in the correct access privileges being assigned?()
A. username="*" -> Employee-role Stop username="con-*" -> Contractor-role B. username="*" -> Employee-role username="con-*" -> Contractor-role Stop C. username="con-*" -> Contractor-role Stop username="*" -> Employee-role D. username="con-*" -> Contractor-role username="*" -> Employee-role Stop
单项选择题What happens when Host Checker is configured to perform checks every 0 minutes? ()
A. Host Checker is disabled. B. Host Checker will perform continous checks. C. Host Checker will perform checks when user logs out. D. Host Checker will perform checks when user first logs in.
单项选择题Which additional configuration must be completed when setting up role restrictions using certificates? ()
A. Set up a certificate authentication server. B. Configure the authentication realm to remember certificate information. C. Configure the authentication realm to use a certificate server for authentication. D. Configure a role mapping rule requiring certification information to map user to role.
多项选择题If Host Checker restrictions are applied at the role level and the Allow access to the role if any ONE of the select policies is passed option is unchecked, which two statements are true?()
A. All roles are evaluated together. B. Each role is evaluated separately. C. Clients must pass all policies to access the role. D. Clients will pass as long as one policy is accepted.
单项选择题What will serve as a RADIUS Client to the Infranet Controller for 802.1x authentication? ()
A. an ACE server B. a wireless network C. an Ethernet switch D. Odyssey Access Client