当前分类: JN0-314
问题:多选题A customer has purchased a new Junos Pulse Access Control Service and wants to install it in an existing cluster.After initial configuration, the customer finds that the firmware version running on the Junos Pulse Access Control Service is 4.1 r5, but ...
查看答案
问题:多选题What are two benefits of integrating Junos Pulse Access Control Service with Security Threat Response Manager (STRM)?()AThe ability to detect and prevent malicious traffic.BThe ability to associate security breaches with a specific user.CConverged mana...
问题:单选题End users want to map a network drive on their PCs when they are connected to the Junos Pulse Access Control Service. The mapped drive must be removed when users disconnect their session.Which feature addresses this requirement?()A agent session script...
问题:单选题You have created a security policy on an SRX240 that permits traffic from any source-address, any destination-address, and any application. The policy will be a source IP policy for use with the Junos Pulse Access Control Service. What must you add to ...
问题:多选题You have a firewall enforcer protecting resources in a data center. A user is experiencing difficulty connecting to a protected resource.Which two elements must exist so the user can access the resource?()AResource access policy on the MAG Series devic...
问题:单选题What is a Host Enforcer policy?()A A policy that is defined on the endpoint that permits or denies inbound or outbound traffic.B A policy that is sent to the endpoint that permits or denies inbound or outbound traffic.C A policy that is sent to the pro...
问题:单选题Which parameter do you use to enable Junos Pulse Access Control Service enforcement on a policy on a ScreenOS platform?()A uac-policyB ic-policyC inyranet-authD uac-auth...
问题:单选题A customer is trying to determine which client to deploy. The customer wants to be able to perform Layer 2 authentication as well as connect to the Junos Pulse Secure Access Service.Which client should the customer deploy?()A Windows native supplicantB...
问题:单选题A users Junos Pulse client uses 802.1X to access a wired network and is failing to authenticate. You run a packet capture from the users PC and notice that immediately after the client machine sends an EAPoL-start packet, an EAP-failure packet is retur...
问题:多选题A user logs in and is mapped to two roles. The first role has a maximum timeout value of 600 minutes and the default Juniper Networks logo on the user interface page. The second role has a maximum timeout value of 1200 minutes and a custom logo on the ...
问题:单选题You want to provide all users in your corporation with a single agent that provides access to multiple connection types conditionally. For example, you connect to the Junos Pulse Access Control Service if you are connected to the intranet, but you conn...
问题:多选题You administer a network with Windows-based endpoints that have custom software images. You want to use Host Checker to require that endpoints are running the custom software image.Which two Host Checker policy rules would be used to enforce this requi...
问题:单选题What is the function of Host Checker?()A To allow clientless access to the networkB To restrict access to protected resources on the networkC To scan an endpointfor compliance with security policiesD To push a firewall policy to the endpoint's local fi...
问题:单选题You are an administrator of a large campus network. Every switch on a floor within each building of your campus has been configured for a different VLAN. During implementation of the Junos Pulse Access Control Service, you must configure a RADIUS retur...
问题:多选题You want to restrict access to a role based on the client machine from which the user is accessing the network.Which two role restrictions accomplish this goal? ()Auser nameBpassword lengthCcertificateDHost Checker...
问题:多选题A customer wants to create a custom Junos Pulse configuration. Which two are required?()AConnection setBConfiguration setCCustom installerDComponent set...
问题:多选题Which three features are supported with the Junos Pulse client?()Athird-party RADIUS supportBHost EnforcerCHost CheckerDIPsecEsoft tokens...
问题:单选题In a Junos Pulse Access Control Service active/active clustered environment, which statement is true about VIPs?()A VIP is not required when using only agentless access for all endpoint platforms.B VIP is not required when using Junos Pulse or Odyssey ...