问题:单选题You are validating the configuration of your SRX Series device and see the output shown below. What does this indicate?()A The SRX Series device has been configured correctly, the Junos Pulse Access Control Service is reachable on the network, and the...
查看答案
问题:单选题You have configured Junos Pulse on your Windows desktop and want to verify that the IPsec configuration policy is being pushed down to your workstation upon network authentication and login.Which utility program do you use to see this configuration and...
问题:单选题Two MAG4610s are running in an active/passive cluster configuration. The system administrator is planning to apply a service package to the cluster.Which process should the administrator follow?()A Perform the upgrade on the active node of the cluster....
问题:单选题Which Junos Pulse Access Control Service client provides a built-in viewer to access local logs?()A Odyssey Access ClientB Junos PulseC Java agentD Agent less access...
问题:单选题A customer is trying to decide which 802.1X inner protocol to use on their network. The customer requires that nopasswords be sent across the network in plain text, that the protocol be supported by the Windows native supplicant,and that the protocol s...
问题:单选题A user calls the help desk and explains that they just purchased a Macintosh computer. When they log into the network, the Odyssey Access Client is not automatically downloaded as it was when the user used their Windows PC.How do you resolve this issue...
问题:You want to provide 802.1X access for Windows clients using...
问题:单选题A company has completed two acquisitions over the previous year. Each of the acquired companies was allowed to keep its own independent authentication server. The network administrator has been asked to roll out the Junos Pulse Access Control Service t...
问题:单选题You are receiving reports of possible unauthorized access to resources protected by a firewall enforcer running the Junos OS. You want to verity which users are currently accessing resources through the enforcer.Which command should you use to verify u...
问题:多选题A customer has purchased a new Junos Pulse Access Control Service and wants to install it in an existing cluster.After initial configuration, the customer finds that the firmware version running on the Junos Pulse Access Control Service is 4.1 r5, but ...
问题:单选题A users Junos Pulse client uses 802.1X to access a wired network and is failing to authenticate. You run a packet capture from the users PC and notice that immediately after the client machine sends an EAPoL-start packet, an EAP-failure packet is retur...
问题:多选题You have a firewall enforcer receiving resource access policies from a Junos Pulse Access Control Service. You are using Network and Security Manager (NSM) for configuration management on that firewall. The firewall can also be configured using its bui...
问题:多选题You are the network administrator for your company. A user is complaining that they are not able to access the network with the Junos Pulse client. You run a packet capture on the network interface to monitor the 802.1X authentication process. You noti...
问题:单选题You have created a Host Checker policy that contains multiple rules. You want to inform end users which rule specifically has failed.In the admin GUI, which configuration setting would you enable?()A Enable Custom InstructionsB Pre-auth notificationC R...
问题:多选题What are three necessary steps for enabling 802.1X access when configuring Layer 2 enforcement?()AConfigure a location groupBCreatean authentication protocol setCConfigure the RADIUS AV pair listDConfigure RADIUS clientsEConfigure role and role-mapping...
问题:多选题An authentication realm consists of which three authentication resources?()AAuthentication serverBSession optionsCAuthentication policyDEnd-point security policyERole-mapping rules...
问题:多选题In the admin GUI, you navigate to "System" "Status" "Active Users". You see several buttons, including "Delete Session", "Delete All Sessions". "Refresh Roles", and "Disable All Users".Which two statements are true?()ATo forcibly sign out a single us...
问题:多选题What are three default role-mapping rule values that are available for all realms?()AUsernameBLDAP userCCertificateDCustom expressionsESource y IP...
问题:单选题What is a type of firewall enforcer supported by the Junos Pulse Access Control Service?()A Checkpoint firewallB SRX Series deviceC DP sensorD MX Series device...
问题:单选题A system administrator wants to configure 802.1X on an Ethernet switch to enable access to specific parts of the network based on group memberships.How can the administrator accomplish this goal?()A Configure roles based on departments and assign acces...