问题:单选题Which Junos Pulse feature allows the user to log in once through a Junos Pulse Secure Access Service on the network and then access resources protected by a Junos Pulse Access Control Service without reauthentication?()A Roaming SessionB Session Migrat...
查看答案
问题:单选题An administrator has created three different Odyssey Access Client preconfiguration files and assigned them to three different roles in the same realm.Which action should the administrator take to ensure that users get the correct Odyssey Access Client...
问题:单选题You want to create a Host Checker policy that looks for a specific antivirus product that is running on your client machines, but the predefined antivirus options do not include the antivirus product version that you use.Which feature should you verify...
问题:多选题A customer wants to create a custom Junos Pulse configuration. Which two are required?()AConnection setBConfiguration setCCustom installerDComponent set...
问题:多选题A customer has purchased a new Junos Pulse Access Control Service and wants to install it in an existing cluster.After initial configuration, the customer finds that the firmware version running on the Junos Pulse Access Control Service is 4.1 r5, but ...
问题:多选题You administer a network containing SRX Series firewalls. New policy requires that you implement MAG Series devices to provide access control for end users. The policy requires that the SRX Series devices dynamically enforce security policy based on th...
问题:多选题Which three authentication server types are supported for retrieving user attributes used in role- mapping rules?()ALDAPBS/KeyCTACACS+DRADIUSESiteMinder...
问题:多选题Which three features are supported with the Junos Pulse client?()Athird-party RADIUS supportBHost EnforcerCHost CheckerDIPsecEsoft tokens...
问题:单选题Your IT manager has requested that you start providing weekly reports of CPU utilization on all network devices.Which monitoring function should be enabled on the MAG Series device?()A Admin loggingB SNMP loggingC Syslog server loggingD Event logging...
问题:单选题You have configured the Odyssey Access Client with a profile which has the "Disable Server Verification" setting cleared.What will be the result if the device certificate on the MAG Series device has expired and the user attempts to authenticate?()A Th...
问题:多选题You are performing the initial setup of a new MAG Series device and have installed a valid CA- signed certificate on the MAG Series device. Connectivity to an existing SRX Series firewall enforcer cannot be obtained.What are two explanations for this b...
问题:多选题You are configuring an SRX210 as a firewall enforcer that will tunnel IPsec traffic from several Junos Pulse users.Which two parameters must you configure on the SRX210?()Aaccess profileBIKE parametersCtunneled interfaceDredirect policy...
问题:多选题What are two roles of the authenticator as described in the 802.1X standard? ()AIt proxies the authentication information between the supplicant and the authentication server.BIt controls physical access to the network.CIt communicates with the authent...
问题:多选题You want to create a security policy on an SRX240 that redirects unauthenticated users back to the Junos Pulse Access Control Service.Which two steps must you take to accomplish this task?()AConfigure a captive-portal service that redirects all traffic...
问题:多选题Your manager has informed you that only specific users can have access to the Preferred Members role, and that these users are restricted to the Preferred Members role. The Preferred Members role-mapping rule is currently set as the last rule in your r...
问题:多选题A new software engineer has been hired. As part of the normal hiring process, the user was added to the Active Directory and placed into the Domain Users group and the SW_DEV group. The Domain Users group has access to the company's intranet website an...
问题:单选题A customer is trying to determine which client to deploy. The customer wants to be able to perform Layer 2 authentication as well as connect to the Junos Pulse Secure Access Service.Which client should the customer deploy?()A Windows native supplicantB...
问题:多选题What are two use cases enabled by IF-MAP Federation?()AUsers authenticated to one Junos Pulse Access Control Service can transparently access resources protected by another Junos Pulse Access Control Service.BUsers authenticated to a Junos Pulse Access...