单项选择题When using RADIUS as an external authentication method for 802.1X authentication for the Junos Pulse Access Control Service, what must you do to ensure that the RADIUS authentication works properly?()

A. Configure IP helper to forward the authentication requests from the clients to the external RADIUS server
B. Configure the supplicant as anexternal authentication server
C. Configure RADIUS proxy on the realm
D. Specify the correct RADIUS port 389 on the Junos Pulse Access Control Service


您可能感兴趣的试卷

你可能感兴趣的试题

1.多项选择题

You are the network administrator for your company. A user is complaining that they are not able to access the network with the Junos Pulse client. You run a packet capture on the network interface to monitor the 802.1X authentication process. You notice that after the EAP- request/identity packet is received, and the supplicant responds with an EAP-response/identity packet, no further communication occurs for several seconds.
What are three causes for this behavior?()

A. The authenticator is not licensed to support Junos Pulse.
B. The authenticator did not receive the EAP-response/identity packet.
C. The authentication server is not receiving the RADIUS packet containing the EAP-response/identity data.
D. The authenticator is sending the request over its loopback interface.
E. The authentication server is sending back a RADIUS response packet, but the authenticator is not forwarding the response back to the supplicant.

5.多项选择题What are two benefits of integrating Junos Pulse Access Control Service with Security Threat Response Manager (STRM)?()

A. The ability to detect and prevent malicious traffic.
B. The ability to associate security breaches with a specific user.
C. Converged management of network and security events, network flow data, and identity information.
D. Consistent device management across administrative realms.

8.单项选择题Which Junos Pulse Access Control Service client provides a built-in viewer to access local logs?()

A. Odyssey Access Client
B. Junos Pulse
C. Java agent
D. Agent less access

9.单项选择题You are installing a MAG Series device for access control using an SRX Series device as the firewall enforcer. The MAG Series device resides in the same security zone as users. However, the users reside in different subnets and use the SRX Series device as an IP gateway.Which statement is true?()

A. You must configure a security policy on the SRX Series device to allow traffic to flow from the user devices to the MAG Series device.
B. No security policy is necessary on the SRX Series device to allow traffic to flow from the user devices to the MAG Series device.
C. You must configure host-inbound traffic on the SRX Series device to allow SSL traffic between the MAG Series device and the user devices.
D. You must configure host-inbound traffic on the SRX Series device to allow EAP traffic between the MAG Series device and the user devices.

10.单项选择题What is a function of a user role?()

A. It defines the IPsec parameters for the role.
B. It assigns access to resources.
C. It associates the user with a RADIUS server.
D. It defines the types of authentication methods available to the user

最新试题

You are configuring an SRX210 as a firewall enforcer that will tunnel IPsec traffic from several Junos Pulse users.Which two parameters must you configure on the SRX210?()

题型:多项选择题

Using an LDAP authentication server, what do you configure to validate certificate attributes?()

题型:单项选择题

You are deploying a Junos Pulse Access Control Service cluster in active/passive mode. How do you configure the IP address on the SRX Series devices?()

题型:单项选择题

What are two steps to configure user authentication for a Junos Pulse Access Control Service?()

题型:多项选择题

What are three necessary steps for enabling 802.1X access when configuring Layer 2 enforcement?()

题型:多项选择题

Your IT director has decided to allow employees to use their laptops at home as well as in the office. You have deployed the Junos Pulse client to allow access to the offices 802.1X-enabled wired network. Your company also has the Junos Pulse Secure Access Service deployed. You want the Junos Pulse client to automatically launch the appropriate access method depending on each users location.Which three are supported to determine the users location?()

题型:多项选择题

In the Junos Pulse Access Control Service, which three actions are only available in the admin GUI? ()

题型:多项选择题

What are two roles of the authenticator as described in the 802.1X standard? ()

题型:多项选择题

What are three elements the Junos Pulse Access Control Service uses to establish endpoint access to protected resources?()

题型:多项选择题

You are configuring captive portal on your SRX Series device for guest user access.When would you use the redirect-traffic all command?()

题型:单项选择题