单项选择题Your security policy requires that users authenticating to the Junos Pulse Access Control Service are connecting from a domain member endpoint on the internal corporate network.Which set of role access restrictions must you configure to enforce this security policy?()

A. Source IP and browser
B. Source IP and certificate
C. Certificate and Host Checker
D. Host Checker and source IP


您可能感兴趣的试卷

你可能感兴趣的试题

1.多项选择题An authentication realm consists of which three authentication resources?()

A. Authentication server
B. Session options
C. Authentication policy
D. End-point security policy
E. Role-mapping rules

2.单项选择题

You are the administrator of a Junos Pulse Access Control Service implementation. You must restrict authenticated users connected from the branch offices to a few specific resources within the data center. However, when the authenticated users are connected at the corporate office, they are allowed more access to the data center resources.
You have created two roles with different levels of access and are trying to determine the best way of controlling when a user is mapped to a specific role. Having the user prompted to manually select their role is possible, but you want to automate the process.
Which configuration solves this problem?()

A. Implement a RADIUS request attribute policy to assist with realm selection and create different role-mapping rules for the user in each realm.
B. Implement a directory/attribute server on the realm and set up this server to determine by group membership the proper role to which a user should be mapped.
C. Reorder the role-mapping rules to allow for the more open role to be mapped first and then enable the "stop processing rules when this rule matches" function on this role.
D. Implement a Host Checker policy on the realm that determines the geographic location of the device and restricts the user based on the results of the policy.

3.多项选择题

Your manager has informed you that only specific users can have access to the Preferred Members role, and that these users are restricted to the Preferred Members role. The Preferred Members role-mapping rule is currently set as the last rule in your role-mapping rules and is based on username. Currently all users are assigned to the Preferred Members role-mapping rule.
Which three changes in the admin GUI will enforce your managers change request?()

A. Move the Preferred Members role-mapping rule to the top of the list.
B. Remove the Preferred Members role from the role-mapping rule.
C. Edit the Preferred Members role-mapping rule so that the username is equal to *.
D. Edit the Preferred Members role-mapping rule so that only the select users are assigned to the role-mapping rule.
E. Edit the Preferred Members role-mapping rule and select "Stop processing rules when this rule matches".

6.单项选择题

You notice that during peak hours, some firewall enforcers contain a high number of auth table entries. As you investigate the issue, you discover that all users are getting auth table mappings to all firewalls, which is not acceptable.
What should you do on the Junos Pulse Access Control Service to resolve this problem?()

A. Delete the default auth table mapping policy
B. Create auth table mapping policies that route users to specific resources
C. Create Resource Access policies that permit access to specific resources
D. Create Source Interface policies that route users to specific resources

8.多项选择题What are two steps to configure user authentication for a Junos Pulse Access Control Service?()

A. Configure an authentication policy as part of the user role definitions.
B. Configure a Sign-in Policy.
C. Configure authentication agents as part of the user role definitions
D. Configure an authentication policy as part of the authentication realm definition.

9.多项选择题In the Junos Pulse Access Control Service, which three actions are only available in the admin GUI? ()

A. Take a "System Snapshot"
B. Configure "Licensing"
C. Review the "Events"
D. Set the date and time
E. Upgrade or downgrade the firmware

10.单项选择题Using an LDAP authentication server, what do you configure to validate certificate attributes?()

A. Use the "is exactly" or "contains" operators.
B. Create a user filter matching the dn of the certificate.
C. Verify that the certificate is issued by a publicly trusted cs.
D. Match the certificate type and value with an attribute from the ldap server.


最新试题

What are two use cases enabled by IF-MAP Federation?()

题型:多项选择题

Your IT director has decided to allow employees to use their laptops at home as well as in the office. You have deployed the Junos Pulse client to allow access to the offices 802.1X-enabled wired network. Your company also has the Junos Pulse Secure Access Service deployed. You want the Junos Pulse client to automatically launch the appropriate access method depending on each users location.Which three are supported to determine the users location?()

题型:多项选择题

Using an LDAP authentication server, what do you configure to validate certificate attributes?()

题型:单项选择题

You notice that during peak hours, some firewall enforcers contain a high number of auth table entries. As you investigate the issue, you discover that all users are getting auth table mappings to all firewalls, which is not acceptable.What should you do on the Junos Pulse Access Control Service to resolve this problem?()

题型:单项选择题

You are the administrator of a Junos Pulse Access Control Service implementation. You must restrict authenticated users connected from the branch offices to a few specific resources within the data center. However, when the authenticated users are connected at the corporate office, they are allowed more access to the data center resources.You have created two roles with different levels of access and are trying to determine the best way of controlling when a user is mapped to a specific role. Having the user prompted to manually select their role is possible, but you want to automate the process.Which configuration solves this problem?()

题型:单项选择题

Your IT manager has requested that you start providing weekly reports of CPU utilization on all network devices.Which monitoring function should be enabled on the MAG Series device?()

题型:单项选择题

You administer a network with Windows-based endpoints that have custom software images. You want to use Host Checker to require that endpoints are running the custom software image.Which two Host Checker policy rules would be used to enforce this requirement?()

题型:多项选择题

In a Junos Pulse Access Control Service firewall enforcement configuration, what is the purpose of the source IP policy?()

题型:单项选择题

What are two roles of the authenticator as described in the 802.1X standard? ()

题型:多项选择题

Your manager has informed you that only specific users can have access to the Preferred Members role, and that these users are restricted to the Preferred Members role. The Preferred Members role-mapping rule is currently set as the last rule in your role-mapping rules and is based on username. Currently all users are assigned to the Preferred Members role-mapping rule.Which three changes in the admin GUI will enforce your managers change request?()

题型:多项选择题