close

Eset Endpoint Security Activation Key

QUESTION 91  (Topic 1)

Which three configured options are validated when the Test Configuration button is clicked during the configuration of AD/NT Authentication Server? (Choose three.)

A. whether the computer name is valid B. whether the authentication protocol works C. whether the admin name and password are valid D. whether the configured domain exists on the server E. whether the domain controller is a valid AD controller

lass="MsoNormal" style="cursor: auto; margin: 0cm 0cm 0pt; line-height: normal; text-autospace: ; mso-layout-grid-align: none" align="left"> Answer: BDE

QUESTION 92  (Topic 1)

Which three policies are required on the Infranet Controller when configuring IPsec in route mode with NAT? (Choose three.)

A. IP pools B. IPsec routing C. source interface D. resource access E. auth table mapping

Answer: ABD

QUESTION 93  (Topic 1)

What are three settings you can configure in a realm? (Choose three.)

A. IPsec routing policy B. authentication policy C. RADIUS attribute policy D. dynamic policy evaluation E. Host Checker access restriction

Answer: BDE

QUESTION 94  (Topic 1)

Which two deployment options are used to check a user’s compliance before allowing access to the local LAN? (Choose two.)

A. Campus Wired B. Server Front End C. Campus Wireless D. Distributed Enterprise

Answer: AC

QUESTION 95  (Topic 1)

What information is required to generate an Infranet Controller license? (Choose two.)

A. hostname B. IP address C. hardware ID D. authorization code

Answer: CD

QUESTION 96  (Topic 1)

Which three elements are configured as part of an authentication realm? (Choose three.)

A. directory server B. role restrictions C. role mapping rules D. authentication server         E. authentication protocol set

Answer: ABD

QUESTION 97  (Topic 1)

What are three steps in the initial console configuration of the Infranet Controller? (Choose three.)

A. Install license. B. Configure interface. C. Complete initial boot. D. Create user accounts. E. Create self-signed certificate.

Answer: ECB

QUESTION 98  (Topic 1)

In addition to an IPsec routing policy, which resource policy must be configured in order to support NAT devices between the endpoint and enforcer?

A. Host Enforcer B. access control C. IP address pool D. auth table mapping

Answer: C

QUESTION 99  (Topic 1)

Your company has a mix of employees and contractors. You need to give employees access to all resources and give contractors access to a limited set of resources. Employee and contractor roles have been created with the appropriate access privileges, and the realm is set to merge settings for all assigned roles. Which role mapping rule set would result in the correct access privileges being assigned?

yle="cursor: auto; margin: 0cm 0cm 0pt; line-height: normal; text-autospace: ; mso-layout-grid-align: none" align="left"> A. group=employee -> Employee-role group=* -> Contractor-role Stop         B. group=* -> Contractor-role group=employee -> Employee-role Stop C. group=* -> Employee-role Stop group=contractor -> Contractor-role D. group=contractor -> Contractor-role group=employee -> Employee-role

&nbs p;

Answer: D

QUESTION 100  (Topic 1)

What is the function of the Host Checker?

A. Runs on the Infranet Controller and ensures reachability to agents. B. Communicates with the overlay enforcer and restricts access to resources. C. Communicates with the Infranet Controller and checks endpoint security compliance. D. Runs on the endpoint and checks for healthy communication with the overlay enforcer and the Infranet Controller.

Answer: C

FreeInstant Access to Instant Access to


endpoint security comparison chart     endpoint security benefits

TAGS

CATEGORIES