多项选择题On the Junos Pulse Access Control Service, you have created a role called Secret that you only want to provide to users who present a certificate.Using the admin GUI, which two features would you configure to satisfy this requirement?()

A. Sign-in Policy
B. Role Mapping Rule
C. Role Restrictions
D. Trusted Server CA


您可能感兴趣的试卷

你可能感兴趣的试题

1.多项选择题What are three necessary steps for enabling 802.1X access when configuring Layer 2 enforcement?()

A. Configure a location group
B. Createan authentication protocol set
C. Configure the RADIUS AV pair list
D. Configure RADIUS clients
E. Configure role and role-mapping rules

2.多项选择题

You have three classes of users on your network: employee, contractor, and IT administrator. You configure the Junos Pulse Access Control Service to assign roles to each user class and require that a specific wireless SSID be preconfigured for the Odyssey Access Client based on the role.
Which configuration method should you use to satisfy this scenario?()

A. Create a "Settings Update file" in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under "User Roles" > "Agent" > "Odyssey Settings" > "Preconfigured Installer".
B. Configure a wired adapter and assign the required SSID under "User Roles" > "Agent" > "Odyssey Settings".
C. Create a script in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under "User Roles" > "Agent" > "Odyssey Settings" > "Preconfigured Installer".
D. Create a "Preconfiguration file" in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under "User Roles" > "Agent" > "Odyssey Settings" > "Preconfigured Installer".

3.多项选择题You want to enforce a Host Checker policy so that only users who pass the policy receive the Employee role. In the admin GUI, which two parameters must you configure?()

A. Select "Require and Enforce" for the Host Checker Policy in the realm authentication policy.
B. Select "Evaluate Policies" for the Host Checker policy in the realm authentication policy.
C. Configure the Host Checker policy as a role restriction for the Employee role.
D. Configure the Host Checker policy as a resource access policy for the Employee role.

4.多项选择题What are two roles of the authenticator as described in the 802.1X standard? ()

A. It proxies the authentication information between the supplicant and the authentication server.
B. It controls physical access to the network.
C. It communicates with the authentication server only.
D. It is responsible for verifying the identity of the supplicant through the use of an internal database.

5.多项选择题What are three elements the Junos Pulse Access Control Service uses to establish endpoint access to protected resources?()

A. sign-in policy
B. authentication realms
C. role restrictions
D. policy realms
E. routing policy

8.多项选择题You administer a network with Windows-based endpoints that have custom software images. You want to use Host Checker to require that endpoints are running the custom software image.Which two Host Checker policy rules would be used to enforce this requirement?()

A. Isolate a file name unique to the custom image and create a custom rule-type of "File" which matches on the file. Select the "Required" option under the custom rule.
B. Identify the MAC address unique to network cards installed in PCs with the custom image and create a custom rule-type of "MAC Address" which matches on the appropriate MAC address.
Select the "Required" option under the custom rule C. Identify the IP address unique to the network cards installed in PCs with the custom image and create a custom rule-type of "IP Address" which matches on the appropriate IP address. Select the "Required" option under the custom rule.
D. Isolate or create a unique Windows registry key for the custom image and create a custom rule- type of "Registry Setting" which matches on the name of the registry key.

9.单项选择题You are configuring captive portal on your SRX Series device for guest user access.When would you use the redirect-traffic all command?()

A. When you want all unauthenticated traffic to be redirected
B. When you want all clear text traffic to be redirected.
C. When you want all authenticated traffic to be redirected.
D. When you want all encrypted traffic to be redirected.

10.单项选择题You are deploying a Junos Pulse Access Control Service cluster in active/passive mode. How do you configure the IP address on the SRX Series devices?()

A. Configure a single Junos Pulse Access Control Service instance on the enforcer, specifying the VIP as the IP address the instance.
B. Configure multiple Junos Pulse Access Control Service instances on the enforcer, specifying the specific IP address each device in a separate instance.
C. Configure a single Junos Pulse Access Control Service instance on the enforcer, specifying the VIP and active node address in the instance.
D. Configure a single Junos Pulse Access Control Service instance on the enforcer, specifying the VIP and passive node address in the instance.

最新试题

What are two roles of the authenticator as described in the 802.1X standard? ()

题型:多项选择题

In a Junos Pulse Access Control Service firewall enforcement configuration, what is the purpose of the source IP policy?()

题型:单项选择题

Your security policy requires that users authenticating to the Junos Pulse Access Control Service are connecting from a domain member endpoint on the internal corporate network.Which set of role access restrictions must you configure to enforce this security policy?()

题型:单项选择题

When configuring a single SRX210 as a firewall enforcer to a MAG4610 active/passive cluster, which statement supports a fault-tolerant configuration?()

题型:单项选择题

You are configuring an SRX210 as a firewall enforcer that will tunnel IPsec traffic from several Junos Pulse users.Which two parameters must you configure on the SRX210?()

题型:多项选择题

Which parameter do you use to enable Junos Pulse Access Control Service enforcement on a policy on a ScreenOS platform?()

题型:单项选择题

You have three classes of users on your network: employee, contractor, and IT administrator. You configure the Junos Pulse Access Control Service to assign roles to each user class and require that a specific wireless SSID be preconfigured for the Odyssey Access Client based on the role.Which configuration method should you use to satisfy this scenario?()

题型:多项选择题

On the Junos Pulse Access Control Service, you have created a role called Secret that you only want to provide to users who present a certificate.Using the admin GUI, which two features would you configure to satisfy this requirement?()

题型:多项选择题

A system administrator wants to configure 802.1X on an Ethernet switch to enable access to specific parts of the network based on group memberships.How can the administrator accomplish this goal?()

题型:单项选择题

You are configuring captive portal on your SRX Series device for guest user access.When would you use the redirect-traffic all command?()

题型:单项选择题