Using an LDAP authentication server, what do you configure t

题目
单选题
Using an LDAP authentication server, what do you configure to validate certificate attributes?()
A

Use the is exactly or contains operators.

B

Create a user filter matching the dn of the certificate.

C

Verify that the certificate is issued by a publicly trusted cs.

D

Match the certificate type and value with an attribute from the ldap server.

参考答案和解析
正确答案: B
解析: 暂无解析
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

You are configuring an LDAP authentication server, and you want to configure role-mapping rules based on group membership. When you attempt to search for groups in the server catalog, no groups appear.Assuming the LDAP server is reachable and functioning properly, in the admin GUI. Which two parts of the configuration should you verify are correct?()

A. Finding user entries

B. Authentication required

C. LDAP Server Type

D. Determining group membership


参考答案:B, D

第2题:

You install WSUS on a server that runs Windows Server 2008. You need to ensure that the traffic between the WSUS administrative web site and the server administrators computer is encrypted  What should you do()? 

  • A、Configure SSL encryption on the WSUS server website
  • B、Run the netdom trust /SecurePasswordPrompt command on the WSUS server
  • C、Configure the NTFS permissions on the content directory to Deny Full control permission to the Everyone group
  • D、Configure the WSUS server to require integrated Windows authentication (IWA) hen users connect to the WSUS server.

正确答案:A

第3题:

you have 10 standalone servers that run windows server 2008. You install WSUS on a server named server1. You need to configure all of the servers to receive updates from server1. What should you do?()

A.Configure the windows update settings on each server by using control panel.

B.Run the wuauclt.exe /detectnow command on each server.

C.Run the wuauclt.exe /reauthorization command on each server.

D.Configure the windows update settings on each server by using local group policy.


参考答案:D

第4题:

When using RADIUS as an external authentication method for 802.1X authentication for the Junos Pulse Access Control Service, what must you do to ensure that the RADIUS authentication works properly?()

  • A、Configure IP helper to forward the authentication requests from the clients to the external RADIUS server
  • B、Configure the supplicant as anexternal authentication server
  • C、Configure RADIUS proxy on the realm
  • D、Specify the correct RADIUS port 389 on the Junos Pulse Access Control Service

正确答案:C

第5题:

You have 10 standalone servers that run Windows Server 2008 R2.You install the Windows Server Update Services (WSUS) server role on a server named Server1.You need to configure all of the servers to receive updates from Server1.What should you do?()

  • A、Configure the Windows Update settings on each server by using the Control Panel.
  • B、Run the wuauclt.exe /detectnow command on each server.
  • C、Run the wuauclt.exe /reauthorization command on each server.
  • D、Configure the Windows Update settings on each server by using a local group policy.

正确答案:D

第6题:

you have 10 standalone servers that run windows server 2008. You install WSUS on a server named server1. You need to configure all of the servers to receive updates from server1. What should you do?()

  • A、Configure the windows update settings on each server by using control panel.
  • B、Run the wuauclt.exe /detectnow command on each server.
  • C、Run the wuauclt.exe /reauthorization command on each server.
  • D、Configure the windows update settings on each server by using local group policy.

正确答案:D

第7题:

You design a Business Intelligence (BI) solution by using SQL Server 2008.  The solution includes a SQL Server 2008 Reporting Services (SSRS) infrastructure in a scale-out deployment. All reports use a SQL Server 2008 relational database as the data source. You implement row-level security. You need to ensure that all reports display only the expected data based on the user who is viewing the report. What should you do?()

  • A、 Store the credential of a user in the data source.
  • B、 Configure the infrastructure to support Kerberos authentication.
  • C、 Configure the infrastructure to support anonymous authentication by using a custom authentication extension.
  • D、 Ensure that all report queries add a filter that uses the User.UserID value as a hidden parameter.

正确答案:B

第8题:

When using RADIUS as an external authentication method for 802.1X authentication for the Junos Pulse Access Control Service, what must you do to ensure that the RADIUS authentication works properly?()

A. Configure IP helper to forward the authentication requests from the clients to the external RADIUS server

B. Configure the supplicant as anexternal authentication server

C. Configure RADIUS proxy on the realm

D. Specify the correct RADIUS port 389 on the Junos Pulse Access Control Service


参考答案:C

第9题:

You work as a network administrator at, You have been asked to configure 802.1x port-based authentication. You notice that the client workstation is not compatible with 802.1x port-based authentication.  What supported authentication server should be chosen?()

  • A、TACACS with LEAP extensions
  • B、RADIUS with EAP extensions
  • C、TACACS+
  • D、LDAP

正确答案:B

第10题:

You are configuring an LDAP authentication server, and you want to configure role-mapping rules based on group membership. When you attempt to search for groups in the server catalog, no groups appear.Assuming the LDAP server is reachable and functioning properly, in the admin GUI. Which two parts of the configuration should you verify are correct?()

  • A、Finding user entries
  • B、Authentication required
  • C、LDAP Server Type
  • D、Determining group membership

正确答案:B,D

更多相关问题