|
Question 1. Which two statements are true about applying Host Checker at the realm level? (Choose two.) A. If Evaluate is checked then the client must pass policy to get the sign-in page. B. If Evaluate is checked then the client can fail policy and still get the sign-in page. C. If Require and Enforce is checked then the client must pass policy to get the sign-in page. D. If Require and Enforce is checked then the client can fail policy and still get the sign-in page. Answer: B, C Question 2. Which log contains information about service restarts, system errors, warnings, and requests to check server connectivity? A. Events log B. System log C. User Access log D. Admin Access log Answer: A Question 3. Which statement is correct about defining an Intranet Enforcer for use as a RADIUS Client? A. You do not need to configure a RADIUS client policy. B. You must know the exact model number of the Intranet Enforcer. C. You must specify the NACN password of the device in the RADIUS client policy. D. You do not need to designate a location group to which the Intranet Enforcer will belong. Answer: A Question 4. Which configuration option can be set either in the initial console menu or the Admin UI of the Intranet Controller? A. VLAN ID B. Hostname C. Domain name D. Administrative timeout Answer: C Question 5. What is the primary purpose of creating a Location Group Policy? A. to associate more than one realm with an authentication server B. to logically group network access devices and associate them with specific sign-in policies C. to allow or prevent users from accessing resources in specific locations on the network D. to define the URL that users of network access devices can use to access the Intranet Controller Answer: B Question 6. What is true about the operation of the Intranet Enforcer? A. It assigns users a set of roles. B. It allows access based on auth table entries. C. It verifies whether an endpoint meets security requirements. D. It configures the UAC agent to allow or deny access to resources. Answer: B Question 7. On a pre-existing OAC, which three options can the Intranet Controller overwrite when the user accesses the Intranet Controller? (Choose three.) A. SSID B. login name C. MAC address D. wired adapters E. encryption method Answer: A, D, E Question 8. What must be updated regularly to detect the newest versions of personal firewalls on endpoints? A. Intranet Enforcer firmware B. Intranet Controller rollback software C. Host Security Assessment Plug-in (HSAP) D. Endpoint Security Assessment Plug-in (ESAP) Answer: D Question 9. Which three statements about dynamic filtering are true? (Choose three.) A. Dynamic filtering creates a query statement. B. Dynamic filtering has an option to save query. C. Dynamic filtering can select any log field to filter. D. Dynamic filtering permanently removes other log entries. E. Dynamic filtering redraws the log when you select a variable link. Answer: A, B, E Question 10. A customer has installed UAC in their network. They have both Windows and Linux endpoints and must choose a deployment method that everyone can use. Which deployment method allows for multiple platforms? A. IPsec enforcement B. 802.1X enforcement C. Source IP enforcement D. Odyssey Access Client Answer: C Question 11. Which interface does the Intranet Controller use to push the configuration? A. trusted port B. internal port C. trust interface D. untrust interface Answer: B
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.