You have a firewall enforcer protecting resources in a data center. A user is experiencing difficulty connecting to a protected resource.Which two elements must exist so the user can access the resource?()
第1题:
You have configured the Odyssey Access Client with a profile which has the "Disable Server Verification" setting cleared.What will be the result if the device certificate on the MAG Series device has expired and the user attempts to authenticate?()
A. The user will be instructed to call the network administrator.
B. The user will fail authentication.
C. The user will be prompted to install a new device certificate on the MAG Series device.
D. The user will successfully authenticate and have full network access.
第2题:
A user is successfully authenticating to the network but is unable to access protected resources behind a ScreenOS enforcer. You log in to the ScreenOS enforcer and issue the command get auth table infranet and you do not see the user listed.Which two event log settings on the Junos Pulse Access Control Service must you enable to troubleshootthis issue?()
A. Connection Requests
B. System Errors
C. Enforcer Events
D. Enforcer Command Trace
第3题:
第4题:
Without calling JTAC, which two troubleshooting tools on a MAG Series device would you use to identify the cause of an authentication failure?()
第5题:
Which two statements are true regarding firewall user authentication?() (Choose two.)
第6题:
You are receiving reports of possible unauthorized access to resources protected by a firewall enforcer running the Junos OS. You want to verity which users are currently accessing resources through the enforcer.Which command should you use to verify user access on the enforcer?()
第7题:
Which two statements are true regarding firewall user authentication?()
第8题:
You administer a network containing SRX Series firewalls. New policy requires that you implement MAG Series devices to provide access control for end users. The policy requires that the SRX Series devices dynamically enforce security policy based on the source IP address of the user. The policy also requires that the users communicate with protected resources using encrypted traffic. Which two statements are true?()
第9题:
When configured for pass-through firewall user authentication, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.
When configured for Web firewall user authentication only, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.
If a JUNOS security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted to perform authentication.
If a JUNOS security device is configured for Web firewall user authentication, new sessions are automatically intercepted to perform authentication.
第10题:
You must configure a security policy on the SRX Series device to allow traffic to flow from the user devices to the MAG Series device.
No security policy is necessary on the SRX Series device to allow traffic to flow from the user devices to the MAG Series device.
You must configure host-inbound traffic on the SRX Series device to allow SSL traffic between the MAG Series device and the user devices.
You must configure host-inbound traffic on the SRX Series device to allow EAP traffic between the MAG Series device and the user devices.
第11题:
Connection Requests
System Errors
Enforcer Events
Enforcer Command Trace
第12题:
The user will be instructed to call the network administrator.
The user will fail authentication.
The user will be prompted to install a new device certificate on the MAG Series device.
The user will successfully authenticate and have full network access.
第13题:
You are receiving reports of possible unauthorized access to resources protected by a firewall enforcer running the Junos OS. You want to verity which users are currently accessing resources through the enforcer.Which command should you use to verify user access on the enforcer?()
A. show services unified-access-control authentication-table
B. show auth table
C. show services unified-access-control policies
D. show services unified-access-control captive-portal
第14题:
You have a firewall enforcer protecting resources in a data center. A user is experiencing difficulty connecting to a protected resource.Which two elements must exist so the user can access the resource?()
A. Resource access policy on the MAG Series device
B. IPsec routing policy on the MAG Series device
C. General traffic policy blocking access through the firewall enforcer
D. Auth table entry on the firewall enforcer
第15题:
Which two firewall user authentication objects can be referenced in a security policy?()
第16题:
Which two statements are true about the security-related tags in a valid Java EE deployment descriptor?()
第17题:
You are installing a MAG Series device for access control using an SRX Series device as the firewall enforcer. The MAG Series device resides in the same security zone as users. However, the users reside in different subnets and use the SRX Series device as an IP gateway.Which statement is true?()
第18题:
A user is successfully authenticating to the network but is unable to access protected resources behind a ScreenOS enforcer. You log in to the ScreenOS enforcer and issue the command get auth table infranet and you do not see the user listed.Which two event log settings on the Junos Pulse Access Control Service must you enable to troubleshootthis issue?()
第19题:
You have a firewall enforcer receiving resource access policies from a Junos Pulse Access Control Service. You are using Network and Security Manager (NSM) for configuration management on that firewall. The firewall can also be configured using its built-in command-line interface (CLI) or Web-based user interface (WebUI). To avoid conflicting configurations, which two interfaces must you use to configure the firewall enforcer?()
第20题:
You have a firewall enforcer protecting sensitive internal resources in a data center. The network traversed by endpoint traffic is semi-trusted, so you need to encrypt the traffic between the endpoints accessing the resources and the firewall enforcer.Which type of policies provide this level of protection?()
第21题:
Resource access policy on the MAG Series device
IPsec routing policy on the MAG Series device
General traffic policy blocking access through the firewall enforcer
Auth table entry on the firewall enforcer
第22题:
Enables seamless access for remote access users to firewall enforcer protected resources.
Scales a Junos Pulse Access control Service deployment beyond the capacity of a single cluster.
Enables dynamic configuration synchronization across multiple MAG Series devices.
Provides a substitute for WAN clustering among geographically separated MAG Series devices.
Shares non-localized DP integration and IPsec configuration information between multiple Junos Pulse Access Control Service instances.
第23题:
resource access policies
Host Enforcer policies
source IP enforcement policies
IPsec enforcement policies