当前分类: JN0-314
问题:单选题You are receiving reports of possible unauthorized access to resources protected by a firewall enforcer running the Junos OS. You want to verity which users are currently accessing resources through the enforcer.Which command should you use to verify u...
查看答案
问题:多选题What are two benefits of integrating Junos Pulse Access Control Service with Security Threat Response Manager (STRM)?()AThe ability to detect and prevent malicious traffic.BThe ability to associate security breaches with a specific user.CConverged mana...
问题:单选题You want to provide all users in your corporation with a single agent that provides access to multiple connection types conditionally. For example, you connect to the Junos Pulse Access Control Service if you are connected to the intranet, but you conn...
问题:单选题Two MAG4610s are running in an active/passive cluster configuration. The system administrator is planning to apply a service package to the cluster.Which process should the administrator follow?()A Perform the upgrade on the active node of the cluster....
问题:单选题Which service is provided by a MAG Series device?()A RoutingB MPLS VPNsC Access controlD Intrusion detection...
问题:单选题End users want to map a network drive on their PCs when they are connected to the Junos Pulse Access Control Service. The mapped drive must be removed when users disconnect their session.Which feature addresses this requirement?()A agent session script...
问题:多选题You administer a network with Windows-based endpoints that have custom software images. You want to use Host Checker to require that endpoints are running the custom software image.Which two Host Checker policy rules would be used to enforce this requi...
问题:多选题A user logs in and is mapped to two roles. The first role has a maximum timeout value of 600 minutes and the default Juniper Networks logo on the user interface page. The second role has a maximum timeout value of 1200 minutes and a custom logo on the ...
问题:多选题What are two valid configurations for user-driven remediation when a Windows-based endpoint fails a Host Checker policy?()AKill a running process on the endpoint, based on executable name and MD5 checksum.BDelete a file on the endpoint's file system.CD...
问题:多选题Before replacing a MAG Series device, using the admin GUI, you export two backup files, system.cfg from "Maintenance" "ImportfExport Configuration" and user.cfg from "Maintenance" "Import/Export Users". When you receive the new hardware, you import a...
问题:多选题In the admin GUI, you navigate to "System" "Status" "Active Users". You see several buttons, including "Delete Session", "Delete All Sessions". "Refresh Roles", and "Disable All Users".Which two statements are true?()ATo forcibly sign out a single us...
问题:多选题Which three features are supported with the Junos Pulse client?()Athird-party RADIUS supportBHost EnforcerCHost CheckerDIPsecEsoft tokens...
问题:单选题Which parameter do you use to enable Junos Pulse Access Control Service enforcement on a policy on a ScreenOS platform?()A uac-policyB ic-policyC inyranet-authD uac-auth...
问题:单选题In a Junos Pulse Access Control Service active/active clustered environment, which statement is true about VIPs?()A VIP is not required when using only agentless access for all endpoint platforms.B VIP is not required when using Junos Pulse or Odyssey ...
问题:多选题Your company has deployed the Junos Pulse Access Control Service. The system administrator notices that the Host Checker policies are not being applied and enforced. You have verified that the controllers configuration is correct.Which two conditions a...
问题:单选题Which Junos Pulse Access Control Service client provides a built-in viewer to access local logs?()A Odyssey Access ClientB Junos PulseC Java agentD Agent less access...
问题:单选题What is the function of Host Checker?()A To allow clientless access to the networkB To restrict access to protected resources on the networkC To scan an endpointfor compliance with security policiesD To push a firewall policy to the endpoint's local fi...
问题:多选题You want to restrict access to a role based on the client machine from which the user is accessing the network.Which two role restrictions accomplish this goal? ()Auser nameBpassword lengthCcertificateDHost Checker...