单选题How are the commands a user is allowed to enter defined in JUNOS?()A Permissions are configured individually for each user.B Users are associated with user classes, and each class defines the permissions for entering commands.C There are four default c

题目
单选题
How are the commands a user is allowed to enter defined in JUNOS?()
A

Permissions are configured individually for each user.

B

Users are associated with user classes, and each class defines the permissions for entering commands.

C

There are four default classes with different permissions and you can only use these four.

D

Permissions are associated with each user ID

参考答案和解析
正确答案: B
解析: 暂无解析
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which two statements are true of login classes?()

A. Users can be members of multiple login classes.

B. Login classes define authorization parameters for a user.

C. There are five system-defined login classes.

D. Login class permission flags can be overridden for certain commands.


参考答案:B, D

第2题:

How are the commands a user is allowed to enter defined in JUNOS?()

A.Permissions are configured individually for each user.

B.Users are associated with user classes, and each class defines the permissions for entering commands.

C.There are four default classes with different permissions and you can only use these four.

D.Permissions are associated with each user ID


参考答案:B

第3题:

You are the administrator of a Windows 2000 Professional computer that is shared by several users in the Sales department. User accounts have been created for current users. Current users can log on to the computers. To accommodate new users, you add two new user accounts named User7 and User8 to computer5. When User7 attempts to log on o the computer, she receives the following error message: "Windows cannot copy file C:\Documents and Settings\Default User\ to location C:\Documents and Settings\User7. Contact your network administrator. Detail - Access is denied." When User8 attempts to log on to the computer, he receives the same type of error message.

You want to allow the two new users, as well as other users in the Sales department, to be able to log on to the computer.

Which two methods can you use to accomplish your goal? (Choose two.)

A.Add the User7 and User8 user accounts to the DACL for the Profiles shared folder on the network server.

B.Add the User7 and User8 user accounts to the DACL for the C:\Documents and Settings\Default User folder.

C.Add the Everyone group to the DACL for the C:\Documents and Settings\Default User folder.

D.Add a Group Policy object (GPO) for the Sales OU that redirects user profiles to a shared folder.

E.Log on by using the local Administrator account and create new folders for User7 and User8 in the C:\Documents and Settings folder.

F.Select the allow inheritable permissions from parent to propagate to this object option on the C:\Documents and Settings\Default User folder, and reset the permissions on all child objects.

G.Move and retain permissions and compressions.


正确答案:CF
C,F 解析:Explanation: The problem in this scenario is related to permissions to the C:\Documents and Settings\Default User folder. To solve this problem you should grant the Everyone group permission on the C:\Documents and Settings\Default User folder by adding the group to the DACL (Discretionary Access Control List) of this folder. You should also specify that the permissions to the C:\Documents and Settings\Default User folder must

Incorrect answers:
A: The error message indicates that there is a permission problem on the C:\Documents and Settings\Default User folder, not with permission on Profiles shared folder.

B: Granting the Everyone group permission to the C:\Documents and Settings\Default User folder rather than just User7 and User8 will reduce administrative effort and would not have to be repeated for each new user that is added to the domain.

D: The error message indicates that there is a permission problem on the C:\Documents and Settings\Default User folder. It does not indicate a Group Policy object problem.

E: Granting the Everyone group permission to the C:\Documents and Settings\Default User folder rather than just User7 and User8 will reduce administrative effort and would not have to be repeated for each new user that is added to the domain.

G: This is a very vague suggestion, as it does not indicate what permissions should be moved and what permissions must be retained. Furthermore, file compression is an invisible process in Windows 2000. The operating system takes care of uncompressing the compressed files when they need to be read. Therefore file compression is not the cause of the problem in this scenario.

第4题:

You need to configure port security on switch R1.  Which two statements are true about this  technology? ()

  • A、 Port security can be configured for ports supporting VoIP.
  • B、 With port security configured, four MAC addresses are allowed by default.
  • C、 The network administrator must manually enter the MAC address for each device in order for  the switch to allow connectivity.
  • D、  Withsecurity configured, only one MAC addresses is allowed by default.  
  • E、 Port security cannot be configured for ports supporting VoIP.

正确答案:A,D

第5题:

How are the commands a user is allowed to enter defined in JUNOS?()

  • A、Permissions are configured individually for each user.
  • B、Users are associated with user classes, and each class defines the permissions for entering commands.
  • C、There are four default classes with different permissions and you can only use these four.
  • D、Permissions are associated with each user ID

正确答案:B

第6题:

Which two statements about login classes correctly define their usage within the JUNOS software?()

A.A different login class must be configured for each user.

B.Individual commands can be explicitly allowed or denied.

C.A user must be assigned to one of the default login classes.

D.Each login class is associated with one or more permissions flags.


参考答案:B, D

第7题:

When a new trunk link is configured on an IOS based switch, which VLANs are allowed over the link?()

A. All defined VLANs are allowed on the trunk by default.

B. Each VLAN, or VLAN range, that is specified with the switchport mode command.

C. Each VLAN, or VLAN range, that is specified with the vtp domain command.

D. Each VLAN, or VLAN range, that is specified with the vlan database command.


参考答案:A

第8题:

A company has completed two acquisitions over the previous year. Each of the acquired companies was allowed to keep its own independent authentication server. The network administrator has been asked to roll out the Junos Pulse Access Control Service to users within the original company along with each of the two acquired organizations.The administrator configures three authentication realms, one for each independent authentication server, and associates them all with a single sign-in policy. All of the client endpoints are running Junos Pulse on their Windows XP desktops.When a user signs in to the Junos Pulse Access Control Service, which statement is correct?()

A. The first authentication realm that was added to the sign-in policy is used by default.

B. The user is allowed to choose the correct authentication realm from a list presented by Junos Pulse.

C. When Junos Pulse is initially installed on the desktop, it must be configured with the correct realm.

D. This is not an allowed configuration; the administrator should configure separate sign-in policies for each realm.


参考答案:B

第9题:

Which two statements are true of login classes?()

  • A、Users can be members of multiple login classes.
  • B、Login classes define authorization parameters for a user.
  • C、There are five system-defined login classes.
  • D、Login class permission flags can be overridden for certain commands.

正确答案:B,D

第10题:

Which two statements about login classes correctly define their usage within the JUNOS software?()

  • A、A different login class must be configured for each user.
  • B、Individual commands can be explicitly allowed or denied.
  • C、A user must be assigned to one of the default login classes.
  • D、Each login class is associated with one or more permissions flags.

正确答案:B,D

更多相关问题