Your IT director has decided to allow employees to use their laptops at home as well as in the office. You have deployed the Junos Pulse client to allow access to the offices 802.1X-enabled wired network. Your company also has the Junos Pulse Secure Access Service deployed. You want the Junos Pulse client to automatically launch the appropriate access method depending on each users location.
Which three are supported to determine the users location?()
A. MAC address
B. DNS server
C. DHCP server
D. resolve address
E. endpoint address
您可能感兴趣的试卷
你可能感兴趣的试题
A. Enable Custom Instructions
B. Pre-auth notification
C. Remediation message
D. Send reason strings
You want to provide all users in your corporation with a single agent that provides access to multiple connection types conditionally. For example, you connect to the Junos Pulse Access Control Service if you are connected to the intranet, but you connect to the Junos Pulse Secure Access Service if you are on a remote network.
Which agent should you use for this type of connection requirement?()
A. Junos Pulse should be configured with location awareness rules configured.
B. Odyssey Access Client should be installed with Host Checker configured to check the client's location.
C. Junos Pulse should be configured with all components installed.
D. Agentless access should be enabled so that clients can connect to any service without concern for installing an agent.
A. A policy that is defined on the endpoint that permits or denies inbound or outbound traffic.
B. A policy that is sent to the endpoint that permits or denies inbound or outbound traffic.
C. A policy that is sent to the protected resource that permits or denies inbound or outbound traffic.
D. A policy that is defined on the protected resource that permits or denies inbound or outbound traffic.
A. EAP-MD5 is not supported by the Junos Pulse Access Control Service
B. EAP-MD5 requires passwords to be stored in an encrypted format.
C. EAP-MD5 requires passwords to be stored in a clear text format.
D. EAP-MD5 performs a real time hash of the handset's MAC address.
A. to specify the destination addresses to which access is permitted
B. to specify the source address permitted to access the resource
C. to specify the services to which access is permitted
D. to inform the enforcer to expect policy information from the Junos Pulse Access Control Service
A. The MAG Series device has multiple ports associated with the certificate.
B. The MAG Series device's serial number needs to be configured on the SRX Series device.
C. The SRX Series device must have a certificate signed by the same authority as the MAG Series device.
D. The MAG Series device and SRX Series device are not synchronized to an NTP server.
A. Junos Pulse
B. Java Agent
C. Odyssey Access Client
D. Native 802.1X supplicant
A. Username
B. LDAP user
C. Certificate
D. Custom expressions
E. Source y IP
A. Admin logging
B. SNMP logging
C. Syslog server logging
D. Event logging
A. Sign-in Policy
B. Role Mapping Rule
C. Role Restrictions
D. Trusted Server CA
最新试题
You are configuring an SRX210 as a firewall enforcer that will tunnel IPsec traffic from several Junos Pulse users.Which two parameters must you configure on the SRX210?()
You are installing a new deployment of the Junos Pulse Access Control Service. In your environment, you have VoIP handsets that support 802.1X authentication with EAP-MD5.Which deployment constraint must you consider?()
In the Junos Pulse Access Control Service, which three actions are only available in the admin GUI? ()
What are three default role-mapping rule values that are available for all realms?()
What are three necessary steps for enabling 802.1X access when configuring Layer 2 enforcement?()
What is a Host Enforcer policy?()
You are deploying a Junos Pulse Access Control Service cluster in active/passive mode. How do you configure the IP address on the SRX Series devices?()
You want to enforce a Host Checker policy so that only users who pass the policy receive the Employee role. In the admin GUI, which two parameters must you configure?()
A system administrator wants to configure 802.1X on an Ethernet switch to enable access to specific parts of the network based on group memberships.How can the administrator accomplish this goal?()
What are three elements the Junos Pulse Access Control Service uses to establish endpoint access to protected resources?()