当前分类: JN0-314
问题:单选题A customer is trying to decide which 802.1X inner protocol to use on their network. The customer requires that nopasswords be sent across the network in plain text, that the protocol be supported by the Windows native supplicant,and that the protocol s...
查看答案
问题:单选题Which Junos Pulse Access Control Service client provides a built-in viewer to access local logs?()A Odyssey Access ClientB Junos PulseC Java agentD Agent less access...
问题:单选题A user calls the help desk and explains that they just purchased a Macintosh computer. When they log into the network, the Odyssey Access Client is not automatically downloaded as it was when the user used their Windows PC.How do you resolve this issue...
问题:单选题What is a type of firewall enforcer supported by the Junos Pulse Access Control Service?()A Checkpoint firewallB SRX Series deviceC DP sensorD MX Series device...
问题:单选题You have an SRX Series Layer 2 enforcer providing 802.1X authentication for connected endpoints. Your security policy requires that users who fail their authentication be placed in a specific VLAN.On the Layer 2 enforcer, at the [edit protocols dot1x a...
问题:多选题You administer a network with Windows-based endpoints that have custom software images. You want to use Host Checker to require that endpoints are running the custom software image.Which two Host Checker policy rules would be used to enforce this requi...
问题:单选题Two MAG4610s are running in an active/passive cluster configuration. The system administrator is planning to apply a service package to the cluster.Which process should the administrator follow?()A Perform the upgrade on the active node of the cluster....
问题:单选题An outside vendor is eligible for the guest role and the contractor role when accessing your network, that is secured with the Junos Pulse Access Control Service.What is the default role-mapping behavior?()A The vendor must select a role from a list of...
问题:多选题You want to provide 802.1X access for Windows clients using Junos Pulse as the agent. Which two considerations must you take into account()AJunos Pulse out erauth entication uses EAP-PEAP.BJunos Pulse ou terauth entication uses EAP-TTLS.CJunos Pulse in...
问题:单选题A company has completed two acquisitions over the previous year. Each of the acquired companies was allowed to keep its own independent authentication server. The network administrator has been asked to roll out the Junos Pulse Access Control Service t...
问题:单选题In a Junos Pulse Access Control Service active/active clustered environment, which statement is true about VIPs?()A VIP is not required when using only agentless access for all endpoint platforms.B VIP is not required when using Junos Pulse or Odyssey ...
问题:单选题What is a function of a user role?()A It defines the IPsec parameters for the role.B It assigns access to resources.C It associates the user with a RADIUS server.D It defines the types of authentication methods available to the user...
问题:单选题You have configured the Odyssey Access Client with a profile which has the "Disable Server Verification" setting cleared.What will be the result if the device certificate on the MAG Series device has expired and the user attempts to authenticate?()A Th...
问题:多选题An authentication realm consists of which three authentication resources?()AAuthentication serverBSession optionsCAuthentication policyDEnd-point security policyERole-mapping rules...
问题:单选题You have configured Junos Pulse on your Windows desktop and want to verify that the IPsec configuration policy is being pushed down to your workstation upon network authentication and login.Which utility program do you use to see this configuration and...
问题:单选题Your corporate security policy requires that a user performing attacks must have limited network access and activities until an administrator can investigate.In the admin GUI, which sensor event policy action must you configure in "Configuration" "Sen...
问题:多选题Before replacing a MAG Series device, using the admin GUI, you export two backup files, system.cfg from "Maintenance" "ImportfExport Configuration" and user.cfg from "Maintenance" "Import/Export Users". When you receive the new hardware, you import a...
问题:多选题What are three default role-mapping rule values that are available for all realms?()AUsernameBLDAP userCCertificateDCustom expressionsESource y IP...
问题:多选题You have a firewall enforcer receiving resource access policies from a Junos Pulse Access Control Service. You are using Network and Security Manager (NSM) for configuration management on that firewall. The firewall can also be configured using its bui...
问题:单选题You have created a Host Checker policy that contains multiple rules. You want to inform end users which rule specifically has failed.In the admin GUI, which configuration setting would you enable?()A Enable Custom InstructionsB Pre-auth notificationC R...