多项选择题You want to enforce a Host Checker policy so that only users who pass the policy receive the Employee role. In the admin GUI, which two parameters must you configure?()

A. Select "Require and Enforce" for the Host Checker Policy in the realm authentication policy.
B. Select "Evaluate Policies" for the Host Checker policy in the realm authentication policy.
C. Configure the Host Checker policy as a role restriction for the Employee role.
D. Configure the Host Checker policy as a resource access policy for the Employee role.


您可能感兴趣的试卷

你可能感兴趣的试题

1.多项选择题What are two roles of the authenticator as described in the 802.1X standard? ()

A. It proxies the authentication information between the supplicant and the authentication server.
B. It controls physical access to the network.
C. It communicates with the authentication server only.
D. It is responsible for verifying the identity of the supplicant through the use of an internal database.

2.多项选择题What are three elements the Junos Pulse Access Control Service uses to establish endpoint access to protected resources?()

A. sign-in policy
B. authentication realms
C. role restrictions
D. policy realms
E. routing policy

5.多项选择题You administer a network with Windows-based endpoints that have custom software images. You want to use Host Checker to require that endpoints are running the custom software image.Which two Host Checker policy rules would be used to enforce this requirement?()

A. Isolate a file name unique to the custom image and create a custom rule-type of "File" which matches on the file. Select the "Required" option under the custom rule.
B. Identify the MAC address unique to network cards installed in PCs with the custom image and create a custom rule-type of "MAC Address" which matches on the appropriate MAC address.
Select the "Required" option under the custom rule C. Identify the IP address unique to the network cards installed in PCs with the custom image and create a custom rule-type of "IP Address" which matches on the appropriate IP address. Select the "Required" option under the custom rule.
D. Isolate or create a unique Windows registry key for the custom image and create a custom rule- type of "Registry Setting" which matches on the name of the registry key.

6.单项选择题You are configuring captive portal on your SRX Series device for guest user access.When would you use the redirect-traffic all command?()

A. When you want all unauthenticated traffic to be redirected
B. When you want all clear text traffic to be redirected.
C. When you want all authenticated traffic to be redirected.
D. When you want all encrypted traffic to be redirected.

7.单项选择题You are deploying a Junos Pulse Access Control Service cluster in active/passive mode. How do you configure the IP address on the SRX Series devices?()

A. Configure a single Junos Pulse Access Control Service instance on the enforcer, specifying the VIP as the IP address the instance.
B. Configure multiple Junos Pulse Access Control Service instances on the enforcer, specifying the specific IP address each device in a separate instance.
C. Configure a single Junos Pulse Access Control Service instance on the enforcer, specifying the VIP and active node address in the instance.
D. Configure a single Junos Pulse Access Control Service instance on the enforcer, specifying the VIP and passive node address in the instance.

8.多项选择题Which three features are supported with the Junos Pulse client?()

A. third-party RADIUS support
B. Host Enforcer
C. Host Checker
D. IPsec
E. soft tokens

9.多项选择题In the admin GUI, you navigate to "System" > "Status" > "Active Users". You see several buttons, including "Delete Session", "Delete All Sessions". "Refresh Roles", and "Disable All Users".Which two statements are true?()

A. To forcibly sign out a single user, you should select the check box next to that user's login name, then select "Delete Session".
B. If you select "Delete All Sessions", all users are forcibly signed out and are unable to sign in again until "Enable All Users" is selected.
C. Selecting "Disable All Users" prevents users from signing in and starting a new session, but does not forcibly sign out any users that already have an existing session.
D. Selecting "Refresh Roles" re-evaluates authentication policies, role-mapping rules, and resource policies for all existing user sessions.

10.单项选择题

You are validating the configuration of your SRX Series device and see the output shown below.What does this indicate?()

A.The SRX Series device has been configured correctly, the Junos Pulse Access Control Service is reachable on the network, and the SRX Series device is waiting to receive the initial connection from the Junos Pulse Access Control Service.
B.The SRX Series device has confirmed that the Junos Pulse Access Control Service is configured and is reachable on the network, the SRX Series device is waiting to receive the connection from the Junos Pulse Access Control Service, and all that remains to be accomplished is to configure the SRX Series device.
C.The SRX Series device is configured correctly and connected to the Junos Pulse Access Control Service. All that remains to be done to complete the configuration is to configure the SRX Series device on the Junos Pulse Access Control Service.
D.Both the Junos Pulse Access Control Service and the SRX Series device are configured correctly and communicating with each other.


最新试题

In the Junos Pulse Access Control Service, which three actions are only available in the admin GUI? ()

题型:多项选择题

In a Junos Pulse Access Control Service firewall enforcement configuration, what is the purpose of the source IP policy?()

题型:单项选择题

On the Junos Pulse Access Control Service, you have created a role called Secret that you only want to provide to users who present a certificate.Using the admin GUI, which two features would you configure to satisfy this requirement?()

题型:多项选择题

Which two considerations must you take into account when deploying a Junos Pulse Access Control Service cluster?()

题型:多项选择题

What are two steps to configure user authentication for a Junos Pulse Access Control Service?()

题型:多项选择题

You want to enforce a Host Checker policy so that only users who pass the policy receive the Employee role. In the admin GUI, which two parameters must you configure?()

题型:多项选择题

Your IT director has decided to allow employees to use their laptops at home as well as in the office. You have deployed the Junos Pulse client to allow access to the offices 802.1X-enabled wired network. Your company also has the Junos Pulse Secure Access Service deployed. You want the Junos Pulse client to automatically launch the appropriate access method depending on each users location.Which three are supported to determine the users location?()

题型:多项选择题

What is a Host Enforcer policy?()

题型:单项选择题

Which Junos Pulse feature allows the user to log in once through a Junos Pulse Secure Access Service on the network and then access resources protected by a Junos Pulse Access Control Service without reauthentication?()

题型:单项选择题

You must configure access to the corporate network for employees using a client access method. Users require IPsec tunneling to protected resources and an 802.1X supplicant. Users will access the network using Windows platforms.Which two client access methods would support these requirements?()

题型:多项选择题