题目详情
当前位置:首页 > 职业培训考试
题目详情:
发布时间:2023-10-09 17:18:17

[多项选择]On the Junos Pulse Access Control Service, you have created a role called Secret that you only want to provide to users who present a certificate.Using the admin GUI, which two features would you configure to satisfy this requirement?()
A. Sign-in Policy
B. Role Mapping Rule
C. Role Restrictions
D. Trusted Server CA

更多"On the Junos Pulse Access Control S"的相关试题:

[单项选择]Which Junos Pulse Access Control Service client provides a built-in viewer to access local logs?()
A. Odyssey Access Client
B. Junos Pulse
C. Java agent
D. Agent less access
[单项选择]In a Junos Pulse Access Control Service firewall enforcement configuration, what is the purpose of the source IP policy?()
A. to specify the destination addresses to which access is permitted
B. to specify the source address permitted to access the resource
C. to specify the services to which access is permitted
D. to inform the enforcer to expect policy information from the Junos Pulse Access Control Service
[多项选择]In the Junos Pulse Access Control Service, which three actions are only available in the admin GUI? ()
A. Take a "System Snapshot"
B. Configure "Licensing"
C. Review the "Events"
D. Set the date and time
E. Upgrade or downgrade the firmware
[单项选择]In a Junos Pulse Access Control Service active/active clustered environment, which statement is true about VIPs?()
A. VIP is not required when using only agentless access for all endpoint platforms.
B. VIP is not required when using Junos Pulse or Odyssey Access Client for all endpoint platforms.
C. VIP is not required when using Junos Pulse and agentless access for all endpoint platforms.
D. VIP is not required when using Odyssey Access Client and agentless access for all endpoint platforms.
[单项选择]You are deploying a Junos Pulse Access Control Service cluster in active/passive mode. How do you configure the IP address on the SRX Series devices?()
A. Configure a single Junos Pulse Access Control Service instance on the enforcer, specifying the VIP as the IP address the instance.
B. Configure multiple Junos Pulse Access Control Service instances on the enforcer, specifying the specific IP address each device in a separate instance.
C. Configure a single Junos Pulse Access Control Service instance on the enforcer, specifying the VIP and active node address in the instance.
D. Configure a single Junos Pulse Access Control Service instance on the enforcer, specifying the VIP and passive node address in the instance.
[单项选择] You are the administrator of a Junos Pulse Access Control Service implementation. You must restrict authenticated users connected from the branch offices to a few specific resources within the data center. However, when the authenticated users are connected at the corporate office, they are allowed more access to the data center resources. You have created two roles with different levels of access and are trying to determine the best way of controlling when a user is mapped to a specific role. Having the user prompted to manually select their role is possible, but you want to automate the process. Which configuration solves this problem?()
A. Implement a RADIUS request attribute policy to assist with realm selection and create different role-mapping rules for the user in each realm.
B. Implement a directory/attribute server on the realm and set up this server to determine by group membership the proper role to which a user should be mapped.
C. Reorder the role-mapping rules to allow for the more open role to be mapped first and then enable the "stop processing rules when this rule matches" function on this role.
D. Implement a Host Checker policy on the realm that determines the geographic location of the device and restricts the user based on the results of the policy.
[单项选择]You have a Junos Pulse Secure Access Service acting as an IF-MAP client, configured to federate all user roles to a Junos Pulse Access Control Service acting as an IF-MAP Federation server. A remote user using Junos Pulse logs in to the Junos Pulse Secure Access Service; the Junos Pulse Secure Access Service provisions a remote access session for that user.What happens next?()
A. The Junos Pulse Secure Access Service redirects the user to the Junos Pulse Secure Access Service for authentication
B. The Junos Pulse Access Control Service provisions enforcement points to enable resource access for that user.
C. The Junos Pulse Secure Access Service publishes user session and role information to the IF- MAP Federation server,
D. The Junos Pulse Secure Access Service provisions enforcement points to enable resource access for that user.
[单项选择]You are setting up a Junos Pulse Access Control Service. You cannot obtain a device certificate from an external certificate authority.Which tool should you use to generate a device certificate?()
A. OpenSSL
B. OpenSSH
C. OpenLDAP
D. OpenRADIUS
[多项选择]What information does the Junos Pulse Access Control Service provide to Security Threat Response Manager (STRM)?()
A. Session length
B. User browser information
C. Session IP address
D. User identity information
[多项选择]What are three elements the Junos Pulse Access Control Service uses to establish endpoint access to protected resources?()
A. sign-in policy
B. authentication realms
C. role restrictions
D. policy realms
E. routing policy
[多项选择]Your company has deployed the Junos Pulse Access Control Service. The system administrator notices that the Host Checker policies are not being applied and enforced. You have verified that the controllers configuration is correct.Which two conditions are causing this issue?()
A. The endpoint is using EAP-PEAP with EAP-GTC as the inner protocol,
B. The endpoint is using EAP-TTLS with EAP-JUAC as the inner protocol.
C. The endpoint is using EAP-FAST with EAP-GTC as the inner protocol,
D. The endpoint is using EAP-PEAP with EAP-JUAC as the inner protocol.
[多项选择] A customer has purchased a new Junos Pulse Access Control Service and wants to install it in an existing cluster.After initial configuration, the customer finds that the firmware version running on the Junos Pulse Access Control Service is 4.1 r5, but the existing cluster is running firmware version 4.1 r3. Which two actions must be performed to allow the new Junos Pulse Access Control Service to load the older version of firmware?()
A. Install a valid license on the new Junos Pulse Access Control Service.
B. When loading the older firmware, delete all the existing data on the Junos Pulse Access Control Service.
C. Add the new Junos Pulse Access Control Service to the existing cluster.
D. Download the 4.1 r3 version firmware from the Juniper support website.
[单项选择]A user signs into the Junos Pulse Access Control Service on a wired network. The user then migrates to a wireless network, receives a new IP address, and notices that the session is disconnected.In the admin GUI, what must be configured for the user to stay connected when migrating from a wired to a wireless network?()
A. Persistent session
B. Dynamic evaluation
C. Roaming session
D. Browser request follow-through
[单项选择]A customer is deploying a new Junos Pulse Access Control Service and has completed the initial boot configuration as prompted using a serial connection. The customer now wants to complete the rest of the configuration using the admin GUI.Into which port on the Junos Pulse Access Control Service should the customer plug the network cable to enable access to the admin GUI?()
A. the internal interface
B. the external interface
C. the management interface
D. the console interface
[单项选择]You have configured Junos Pulse on your Windows desktop and want to verify that the IPsec configuration policy is being pushed down to your workstation upon network authentication and login.Which utility program do you use to see this configuration and where do you find it?()
A. the Pulse Diagnostics Tool in the "File" > "Tools" menu option in the Pulse GUI
B. the Pulse Diagnostics Tool in the "Start" > "All Programs" > "Juniper Networks" > "Junos Pulse" menu folder next to the Junos Pulse application
C. the Pulse Diagnostics Viewer, which you access by simultaneously pressing "Ctrl" and "F2"
D. the Pulse Diagnostics Viewer in the "File" > "Tools" menu option in the Pulse GUI
[单项选择]Which parameter do you use to enable Junos Pulse Access Control Service enforcement on a policy on a ScreenOS platform?()
A. uac-policy
B. ic-policy
C. inyranet-auth
D. uac-auth
[单项选择] A users Junos Pulse client uses 802.1X to access a wired network and is failing to authenticate. You run a packet capture from the users PC and notice that immediately after the client machine sends an EAPoL-start packet, an EAP-failure packet is returned. You review the RADIUS troubleshooting logs on the MAG Series device and do not see any authentication attempts from the user. Other users on the same Ethernet switch are successfully authenticating. Which device is sending the EAP-failure packet to the workstation?()
A. The RADIUS server
B. The EAPoL server
C. The workstation's network adapter
D. The Ethernet switch
[多项选择]What are two benefits of integrating Junos Pulse Access Control Service with Security Threat Response Manager (STRM)?()
A. The ability to detect and prevent malicious traffic.
B. The ability to associate security breaches with a specific user.
C. Converged management of network and security events, network flow data, and identity information.
D. Consistent device management across administrative realms.
[多项选择]What are two features provided by the Junos Pulse client?()
A. 802.1X
B. video messaging
C. IPsec
D. VoIP

我来回答:

购买搜题卡查看答案
[会员特权] 开通VIP, 查看 全部题目答案
[会员特权] 享免全部广告特权
推荐91天
¥36.8
¥80元
31天
¥20.8
¥40元
365天
¥88.8
¥188元
请选择支付方式
  • 微信支付
  • 支付宝支付
点击支付即表示同意并接受了《购买须知》
立即支付 系统将自动为您注册账号
请使用微信扫码支付

订单号:

请不要关闭本页面,支付完成后请点击【支付完成】按钮
恭喜您,购买搜题卡成功
重要提示:请拍照或截图保存账号密码!
我要搜题网官网:https://www.woyaosouti.com
我已记住账号密码