The endpoints can use agentless access.
Encrypted traffic flows between the endpoint and the enforcer.
Encrypted traffic flows between the endpoint and the protected resource
The endpoints can use the Odyssey Access Client.
第1题:
You have an SRX Series Layer 2 enforcer providing 802.1X authentication for connected endpoints. Your security policy requires that users who fail their authentication be placed in a specific VLAN.On the Layer 2 enforcer, at the [edit protocols dot1x authenticator interface] hierarchy for each participating interface, what provides this functionality?()
A. guest-vlan
B. auth-fail-vlan
C. server-reject-vlan
D. server-fail-vlan
第2题:
A. Multiple Infranet Enforcer instances are created with a single serial number of an SRX Series device defined in each configuration.
B. A single Infranet Enforcer instance is created with both serial numbers of the clustered SRX Series devices defined in the configuration.
C. Multiple Infranet Enforcer instances are created with a single IP address of an SRX Series device defined in each configuration.
D. A single Infranet enforcer instance is created with the VIP of the clustered SRX Series device defined in the configuration.
第3题:
Which statement is true regarding NAT?()
第4题:
You are installing a MAG Series device for access control using an SRX Series device as the firewall enforcer. The MAG Series device resides in the same security zone as users. However, the users reside in different subnets and use the SRX Series device as an IP gateway.Which statement is true?()
第5题:
Your security policy requires that users authenticating to the Junos Pulse Access Control Service are connecting from a domain member endpoint on the internal corporate network.Which set of role access restrictions must you configure to enforce this security policy?()
第6题:
Which antivirus solution integrated on branch SRX Series devices do you use to ensure maximum virus coverage for network traffic?()
第7题:
You administer a network containing SRX Series firewalls. New policy requires that you implement MAG Series devices to provide access control for end users. The policy requires that the SRX Series devices dynamically enforce security policy based on the source IP address of the user. The policy also requires that the users communicate with protected resources using encrypted traffic. Which two statements are true?()
第8题:
You are performing the initial setup of a new MAG Series device and have installed a valid CA- signed certificate on the MAG Series device. Connectivity to an existing SRX Series firewall enforcer cannot be obtained.What are two explanations for this behavior?()
第9题:
guest-vlan
auth-fail-vlan
server-reject-vlan
server-fail-vlan
第10题:
Resource access policy on the MAG Series device
IPsec routing policy on the MAG Series device
General traffic policy blocking access through the firewall enforcer
Auth table entry on the firewall enforcer
第11题:
The endpoints can use agentless access.
Encrypted traffic flows between the endpoint and the enforcer.
Encrypted traffic flows between the endpoint and the protected resource
The endpoints can use the Odyssey Access Client.
第12题:
The server sending the e-mail to the SRX Series device is a known open SMTP relay.
The server sending the e-mail to the SRX Series device is running unknown SMTP server software.
The server sending the e-mail to the SRX Series device is on an IP address range that is known to be dynamically assigned.
The e-mail that the server is sending to the SRX Series device has a virus in its attachment.
The server sending the e-mail to the SRX Series device is a known spammer IP address.
第13题:
You have a firewall enforcer protecting resources in a data center. A user is experiencing difficulty connecting to a protected resource.Which two elements must exist so the user can access the resource?()
A. Resource access policy on the MAG Series device
B. IPsec routing policy on the MAG Series device
C. General traffic policy blocking access through the firewall enforcer
D. Auth table entry on the firewall enforcer
第14题:
What would you use to enforce security-policy compliance on all devices that seek to access the network?()
第15题:
You have created a security policy on an SRX240 that permits traffic from any source-address, any destination-address, and any application. The policy will be a source IP policy for use with the Junos Pulse Access Control Service. What must you add to complete the security policy configuration?()
第16题:
How do you apply UTM enforcement to security policies on the branch SRX series?()
第17题:
You have a firewall enforcer protecting resources in a data center. A user is experiencing difficulty connecting to a protected resource.Which two elements must exist so the user can access the resource?()
第18题:
Which three situations will trigger an e-mail to be flagged as spam if a branch SRX Series device has been properly configured with antispam inspection enabled for the appropriate security policy? ()(Choose three.)
第19题:
Which statement is true regarding the Junos OS for security platforms?()
第20题:
You deploy mobile devices that run Microsoft Windows Mobile 5.0. Company security policy requires an authentication process that is stronger than a user name and password combination. You need to ensure that Microsoft ActiveSync sessions use an authentication process that meets the company security policy. What should you do?()
第21题:
The MAG Series device has multiple ports associated with the certificate.
The MAG Series device's serial number needs to be configured on the SRX Series device.
The SRX Series device must have a certificate signed by the same authority as the MAG Series device.
The MAG Series device and SRX Series device are not synchronized to an NTP server.
第22题:
You must configure a security policy on the SRX Series device to allow traffic to flow from the user devices to the MAG Series device.
No security policy is necessary on the SRX Series device to allow traffic to flow from the user devices to the MAG Series device.
You must configure host-inbound traffic on the SRX Series device to allow SSL traffic between the MAG Series device and the user devices.
You must configure host-inbound traffic on the SRX Series device to allow EAP traffic between the MAG Series device and the user devices.
第23题:
VLAN
NAC
EAP
WLAN
第24题:
Multiple Infranet Enforcer instances are created with a single serial number of an SRX Series device defined in each configuration.
A single Infranet Enforcer instance is created with both serial numbers of the clustered SRX Series devices defined in the configuration.
Multiple Infranet Enforcer instances are created with a single IP address of an SRX Series device defined in each configuration.
A single Infranet enforcer instance is created with the VIP of the clustered SRX Series device defined in the configuration.