多项选择题

Your IT director has decided to allow employees to use their laptops at home as well as in the office. You have deployed the Junos Pulse client to allow access to the offices 802.1X-enabled wired network. Your company also has the Junos Pulse Secure Access Service deployed. You want the Junos Pulse client to automatically launch the appropriate access method depending on each users location.
Which three are supported to determine the users location?()

A. MAC address
B. DNS server
C. DHCP server
D. resolve address
E. endpoint address


您可能感兴趣的试卷

你可能感兴趣的试题

2.单项选择题

You want to provide all users in your corporation with a single agent that provides access to multiple connection types conditionally. For example, you connect to the Junos Pulse Access Control Service if you are connected to the intranet, but you connect to the Junos Pulse Secure Access Service if you are on a remote network.
Which agent should you use for this type of connection requirement?()

A. Junos Pulse should be configured with location awareness rules configured.
B. Odyssey Access Client should be installed with Host Checker configured to check the client's location.
C. Junos Pulse should be configured with all components installed.
D. Agentless access should be enabled so that clients can connect to any service without concern for installing an agent.

3.单项选择题What is a Host Enforcer policy?()

A. A policy that is defined on the endpoint that permits or denies inbound or outbound traffic.
B. A policy that is sent to the endpoint that permits or denies inbound or outbound traffic.
C. A policy that is sent to the protected resource that permits or denies inbound or outbound traffic.
D. A policy that is defined on the protected resource that permits or denies inbound or outbound traffic.

4.单项选择题You are installing a new deployment of the Junos Pulse Access Control Service. In your environment, you have VoIP handsets that support 802.1X authentication with EAP-MD5.Which deployment constraint must you consider?()

A. EAP-MD5 is not supported by the Junos Pulse Access Control Service
B. EAP-MD5 requires passwords to be stored in an encrypted format.
C. EAP-MD5 requires passwords to be stored in a clear text format.
D. EAP-MD5 performs a real time hash of the handset's MAC address.

5.单项选择题In a Junos Pulse Access Control Service firewall enforcement configuration, what is the purpose of the source IP policy?()

A. to specify the destination addresses to which access is permitted
B. to specify the source address permitted to access the resource
C. to specify the services to which access is permitted
D. to inform the enforcer to expect policy information from the Junos Pulse Access Control Service

6.多项选择题You are performing the initial setup of a new MAG Series device and have installed a valid CA- signed certificate on the MAG Series device. Connectivity to an existing SRX Series firewall enforcer cannot be obtained.What are two explanations for this behavior?()

A. The MAG Series device has multiple ports associated with the certificate.
B. The MAG Series device's serial number needs to be configured on the SRX Series device.
C. The SRX Series device must have a certificate signed by the same authority as the MAG Series device.
D. The MAG Series device and SRX Series device are not synchronized to an NTP server.

8.多项选择题What are three default role-mapping rule values that are available for all realms?()

A. Username
B. LDAP user
C. Certificate
D. Custom expressions
E. Source y IP

最新试题

You are configuring an SRX210 as a firewall enforcer that will tunnel IPsec traffic from several Junos Pulse users.Which two parameters must you configure on the SRX210?()

题型:多项选择题

You are installing a new deployment of the Junos Pulse Access Control Service. In your environment, you have VoIP handsets that support 802.1X authentication with EAP-MD5.Which deployment constraint must you consider?()

题型:单项选择题

In the Junos Pulse Access Control Service, which three actions are only available in the admin GUI? ()

题型:多项选择题

What are three default role-mapping rule values that are available for all realms?()

题型:多项选择题

What are three necessary steps for enabling 802.1X access when configuring Layer 2 enforcement?()

题型:多项选择题

What is a Host Enforcer policy?()

题型:单项选择题

You are deploying a Junos Pulse Access Control Service cluster in active/passive mode. How do you configure the IP address on the SRX Series devices?()

题型:单项选择题

You want to enforce a Host Checker policy so that only users who pass the policy receive the Employee role. In the admin GUI, which two parameters must you configure?()

题型:多项选择题

A system administrator wants to configure 802.1X on an Ethernet switch to enable access to specific parts of the network based on group memberships.How can the administrator accomplish this goal?()

题型:单项选择题

What are three elements the Junos Pulse Access Control Service uses to establish endpoint access to protected resources?()

题型:多项选择题