单项选择题

You are an administrator of a large campus network. Every switch on a floor within each building of your campus has been configured for a different VLAN. During implementation of the Junos Pulse Access Control Service, you must configure a RADIUS return attribute policy to apply a role representing a group of authenticated users that frequently transport their laptops from building to building and floor to floor.
In the admin GUI, which policy element would you enable to accommodate these users?()

A. Add Session-Timeout attribute with value equal to the session lifetime
B. Add Termination-Action attribute with value equal 1
C. VLAN
D. Open port


您可能感兴趣的试卷

你可能感兴趣的试题

2.多项选择题You administer a network with Windows-based endpoints that have custom software images. You want to use Host Checker to require that endpoints are running the custom software image.Which two Host Checker policy rules would be used to enforce this requirement?()

A. Isolate a file name unique to the custom image and create a custom rule-type of "File" which matches on the file. Select the "Required" option under the custom rule.
B. Identify the MAC address unique to network cards installed in PCs with the custom image and create a custom rule-type of "MAC Address" which matches on the appropriate MAC address.
Select the "Required" option under the custom rule C. Identify the IP address unique to the network cards installed in PCs with the custom image and create a custom rule-type of "IP Address" which matches on the appropriate IP address. Select the "Required" option under the custom rule.
D. Isolate or create a unique Windows registry key for the custom image and create a custom rule- type of "Registry Setting" which matches on the name of the registry key.

3.单项选择题You are configuring captive portal on your SRX Series device for guest user access.When would you use the redirect-traffic all command?()

A. When you want all unauthenticated traffic to be redirected
B. When you want all clear text traffic to be redirected.
C. When you want all authenticated traffic to be redirected.
D. When you want all encrypted traffic to be redirected.

4.单项选择题You are deploying a Junos Pulse Access Control Service cluster in active/passive mode. How do you configure the IP address on the SRX Series devices?()

A. Configure a single Junos Pulse Access Control Service instance on the enforcer, specifying the VIP as the IP address the instance.
B. Configure multiple Junos Pulse Access Control Service instances on the enforcer, specifying the specific IP address each device in a separate instance.
C. Configure a single Junos Pulse Access Control Service instance on the enforcer, specifying the VIP and active node address in the instance.
D. Configure a single Junos Pulse Access Control Service instance on the enforcer, specifying the VIP and passive node address in the instance.

5.多项选择题Which three features are supported with the Junos Pulse client?()

A. third-party RADIUS support
B. Host Enforcer
C. Host Checker
D. IPsec
E. soft tokens

6.多项选择题In the admin GUI, you navigate to "System" > "Status" > "Active Users". You see several buttons, including "Delete Session", "Delete All Sessions". "Refresh Roles", and "Disable All Users".Which two statements are true?()

A. To forcibly sign out a single user, you should select the check box next to that user's login name, then select "Delete Session".
B. If you select "Delete All Sessions", all users are forcibly signed out and are unable to sign in again until "Enable All Users" is selected.
C. Selecting "Disable All Users" prevents users from signing in and starting a new session, but does not forcibly sign out any users that already have an existing session.
D. Selecting "Refresh Roles" re-evaluates authentication policies, role-mapping rules, and resource policies for all existing user sessions.

7.单项选择题

You are validating the configuration of your SRX Series device and see the output shown below.What does this indicate?()

A.The SRX Series device has been configured correctly, the Junos Pulse Access Control Service is reachable on the network, and the SRX Series device is waiting to receive the initial connection from the Junos Pulse Access Control Service.
B.The SRX Series device has confirmed that the Junos Pulse Access Control Service is configured and is reachable on the network, the SRX Series device is waiting to receive the connection from the Junos Pulse Access Control Service, and all that remains to be accomplished is to configure the SRX Series device.
C.The SRX Series device is configured correctly and connected to the Junos Pulse Access Control Service. All that remains to be done to complete the configuration is to configure the SRX Series device on the Junos Pulse Access Control Service.
D.Both the Junos Pulse Access Control Service and the SRX Series device are configured correctly and communicating with each other.


8.单项选择题When using RADIUS as an external authentication method for 802.1X authentication for the Junos Pulse Access Control Service, what must you do to ensure that the RADIUS authentication works properly?()

A. Configure IP helper to forward the authentication requests from the clients to the external RADIUS server
B. Configure the supplicant as anexternal authentication server
C. Configure RADIUS proxy on the realm
D. Specify the correct RADIUS port 389 on the Junos Pulse Access Control Service

9.多项选择题

You are the network administrator for your company. A user is complaining that they are not able to access the network with the Junos Pulse client. You run a packet capture on the network interface to monitor the 802.1X authentication process. You notice that after the EAP- request/identity packet is received, and the supplicant responds with an EAP-response/identity packet, no further communication occurs for several seconds.
What are three causes for this behavior?()

A. The authenticator is not licensed to support Junos Pulse.
B. The authenticator did not receive the EAP-response/identity packet.
C. The authentication server is not receiving the RADIUS packet containing the EAP-response/identity data.
D. The authenticator is sending the request over its loopback interface.
E. The authentication server is sending back a RADIUS response packet, but the authenticator is not forwarding the response back to the supplicant.

最新试题

What are three necessary steps for enabling 802.1X access when configuring Layer 2 enforcement?()

题型:多项选择题

Your IT manager has requested that you start providing weekly reports of CPU utilization on all network devices.Which monitoring function should be enabled on the MAG Series device?()

题型:单项选择题

Using an LDAP authentication server, what do you configure to validate certificate attributes?()

题型:单项选择题

Your security policy requires that users authenticating to the Junos Pulse Access Control Service are connecting from a domain member endpoint on the internal corporate network.Which set of role access restrictions must you configure to enforce this security policy?()

题型:单项选择题

Which parameter do you use to enable Junos Pulse Access Control Service enforcement on a policy on a ScreenOS platform?()

题型:单项选择题

A new software engineer has been hired. As part of the normal hiring process, the user was added to the Active Directory and placed into the Domain Users group and the SW_DEV group. The Domain Users group has access to the company's intranet website and time card system. The SW_DEV group has access to the source code library server. You have created roles that correspond to each Active Directory group. The user calls the help desk stating that they cannot access the source code library server.Which two troubleshooting tools would you use on the Junos Pulse Access Control Service to resolve the issue?()

题型:多项选择题

You are configuring captive portal on your SRX Series device for guest user access.When would you use the redirect-traffic all command?()

题型:单项选择题

What are two use cases enabled by IF-MAP Federation?()

题型:多项选择题

You are an administrator of a large campus network. Every switch on a floor within each building of your campus has been configured for a different VLAN. During implementation of the Junos Pulse Access Control Service, you must configure a RADIUS return attribute policy to apply a role representing a group of authenticated users that frequently transport their laptops from building to building and floor to floor.In the admin GUI, which policy element would you enable to accommodate these users?()

题型:单项选择题

What is a Host Enforcer policy?()

题型:单项选择题