多项选择题

You have a firewall enforcer receiving resource access policies from a Junos Pulse Access Control Service. You are using Network and Security Manager (NSM) for configuration management on that firewall. The firewall can also be configured using its built-in command-line interface (CLI) or Web-based user interface (WebUI).
To avoid conflicting configurations, which two interfaces must you use to configure the firewall enforcer?()

A. CLI
B. WebUI
C. NSM
D. Junos Pulse Access Control Service


您可能感兴趣的试卷

你可能感兴趣的试题

1.多项选择题What are two benefits of integrating Junos Pulse Access Control Service with Security Threat Response Manager (STRM)?()

A. The ability to detect and prevent malicious traffic.
B. The ability to associate security breaches with a specific user.
C. Converged management of network and security events, network flow data, and identity information.
D. Consistent device management across administrative realms.

4.单项选择题Which Junos Pulse Access Control Service client provides a built-in viewer to access local logs?()

A. Odyssey Access Client
B. Junos Pulse
C. Java agent
D. Agent less access

5.单项选择题You are installing a MAG Series device for access control using an SRX Series device as the firewall enforcer. The MAG Series device resides in the same security zone as users. However, the users reside in different subnets and use the SRX Series device as an IP gateway.Which statement is true?()

A. You must configure a security policy on the SRX Series device to allow traffic to flow from the user devices to the MAG Series device.
B. No security policy is necessary on the SRX Series device to allow traffic to flow from the user devices to the MAG Series device.
C. You must configure host-inbound traffic on the SRX Series device to allow SSL traffic between the MAG Series device and the user devices.
D. You must configure host-inbound traffic on the SRX Series device to allow EAP traffic between the MAG Series device and the user devices.

6.单项选择题What is a function of a user role?()

A. It defines the IPsec parameters for the role.
B. It assigns access to resources.
C. It associates the user with a RADIUS server.
D. It defines the types of authentication methods available to the user

7.多项选择题You want to provide 802.1X access for Windows clients using Junos Pulse as the agent. Which two considerations must you take into account()

A.Junos Pulse out erauth entication uses EAP-PEAP.
B.Junos Pulse ou terauth entication uses EAP-TTLS.
C.Junos Pulse innerauth entication uses EAP-MSCHAP-V2.
D.Theend point must use thenative Microsoft 802.1X supplicant.

8.多项选择题Your company has deployed the Junos Pulse Access Control Service. The system administrator notices that the Host Checker policies are not being applied and enforced. You have verified that the controllers configuration is correct.Which two conditions are causing this issue?()

A. The endpoint is using EAP-PEAP with EAP-GTC as the inner protocol,
B. The endpoint is using EAP-TTLS with EAP-JUAC as the inner protocol.
C. The endpoint is using EAP-FAST with EAP-GTC as the inner protocol,
D. The endpoint is using EAP-PEAP with EAP-JUAC as the inner protocol.

9.单项选择题A user calls the help desk and explains that they just purchased a Macintosh computer. When they log into the network, the Odyssey Access Client is not automatically downloaded as it was when the user used their Windows PC.How do you resolve this issue?()

A. Download the Macintosh installer from the Junos Pulse Access Control Service and manually install the Odyssey Access Client.
B. Provide the user with the sign-in URL you set up for Macintosh users; this will push the Odyssey Access Client to the user's machine.
C.Assist the user to configure the Macintosh native supplicant and provide the AppleScnptto expose the EAP-JUAC inner authentication protocol.
D.Configure the user's role to install the Java agent, which is a requirement to allow the Junos Pulse Access Control Service to deploy the Odyssey Access Client.

10.单项选择题Which service is provided by a MAG Series device?()

A. Routing
B. MPLS VPNs
C. Access control
D. Intrusion detection

最新试题

You notice that during peak hours, some firewall enforcers contain a high number of auth table entries. As you investigate the issue, you discover that all users are getting auth table mappings to all firewalls, which is not acceptable.What should you do on the Junos Pulse Access Control Service to resolve this problem?()

题型:单项选择题

What are three elements the Junos Pulse Access Control Service uses to establish endpoint access to protected resources?()

题型:多项选择题

You have three classes of users on your network: employee, contractor, and IT administrator. You configure the Junos Pulse Access Control Service to assign roles to each user class and require that a specific wireless SSID be preconfigured for the Odyssey Access Client based on the role.Which configuration method should you use to satisfy this scenario?()

题型:多项选择题

Your manager has informed you that only specific users can have access to the Preferred Members role, and that these users are restricted to the Preferred Members role. The Preferred Members role-mapping rule is currently set as the last rule in your role-mapping rules and is based on username. Currently all users are assigned to the Preferred Members role-mapping rule.Which three changes in the admin GUI will enforce your managers change request?()

题型:多项选择题

You administer a network with Windows-based endpoints that have custom software images. You want to use Host Checker to require that endpoints are running the custom software image.Which two Host Checker policy rules would be used to enforce this requirement?()

题型:多项选择题

You have created a Host Checker policy that contains multiple rules. You want to inform end users which rule specifically has failed.In the admin GUI, which configuration setting would you enable?()

题型:单项选择题

When configuring a single SRX210 as a firewall enforcer to a MAG4610 active/passive cluster, which statement supports a fault-tolerant configuration?()

题型:单项选择题

What are three necessary steps for enabling 802.1X access when configuring Layer 2 enforcement?()

题型:多项选择题

Which parameter do you use to enable Junos Pulse Access Control Service enforcement on a policy on a ScreenOS platform?()

题型:单项选择题

What is a Host Enforcer policy?()

题型:单项选择题