Configure a location group
Createan authentication protocol set
Configure the RADIUS AV pair list
Configure RADIUS clients
Configure role and role-mapping rules
第1题:
A.It binds an interface to a virtual router.
B.It allows for dynamic interface creation.
C.It assigns a Domain Name Server for a session.
D.It identifies the RADIUS server to use for authentication
第2题:
What is a function of a user role?()
第3题:
An authentication realm consists of which three authentication resources?()
第4题:
When using RADIUS as an external authentication method for 802.1X authentication for the Junos Pulse Access Control Service, what must you do to ensure that the RADIUS authentication works properly?()
第5题:
Which three authentication resources are grouped within an authentication realm?()
第6题:
What will serve as a RADIUS Client to the Infranet Controller for 802.1x authentication? ()
第7题:
Network Access Protection (NAP) is configured for the corporate network.Users connect to the corporate network by using portable computers.The company policy requires confidentiality of data when the data is in transit between the portable computers and the servers.You need to ensure that users can access network resources only from computers that comply with the company policy.What should you do?()
第8题:
an ACE server
a wireless network
an Ethernet switch
Odyssey Access Client
第9题:
Configure all access points as RADIUS clients to the Remediation Servers
Configure all access points as RADIUS clients to the Network Policy Server (NPS)
Create a Network Policy that defines Remote Access Server as a network connection method
Create a Network Policy that specifies EAP-TLS as the only availible authentication method.
第10题:
It binds an interface to a virtual router.
It allows for dynamic interface creation.
It assigns a Domain Name Server for a session.
It identifies the RADIUS server to use for authentication
第11题:
Add the switch to the Junos Pulse Access Control Service as a standard RADIUS.
Add the switch to the Junos Pulse Access Control Service using the Any make/model.
Add the switch as a firewall enforcer.
Obtain and configure the RADIUS dictionary for the switch and use that vendor listing for the make/model.
第12题:
Configure all access points as RADIUS clients to the Remediation Servers.
Configure all access points as RADIUS clients to the Network Policy Server (NPS).
Create a Network Policy that defines Remote Access Server as a network connection method.
Create a Network Policy that specifies EAP-TLS as the only available authentication method.
第13题:
A. an ACE server
B. a wireless network
C. an Ethernet switch
D. Odyssey Access Client
第14题:
What are three necessary steps for enabling 802.1X access when configuring Layer 2 enforcement?()
第15题:
You work as a network administrator at, You have been asked to configure 802.1x port-based authentication. You notice that the client workstation is not compatible with 802.1x port-based authentication. What supported authentication server should be chosen?()
第16题:
A customer has purchased a third-party switch to use for Layer 2 access with their Junos Pulse Access Controe Service. When configuring the switch on the Junos Pulse Access Control Service, the customer does not find a make/model entry for it . Which two actions should the customer take to make the switch work with the Junos Pulse Access Control Service?()
第17题:
When configuring PPP over ATM interfaces, what does the profile utility accomplish?()
第18题:
Your company has deployed Network Access Protection (NAP).You configure secure wireless access to the network by using 802.1X authentication from any access point.You need to ensure that all client computers that access the network are evaluated by NAP. What should you do?()
第19题:
Your company has deployed Network Access Protection (NAP). You configure secure wireless access to the network by using 802.1x authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP. what should you do()?
第20题:
It defines the IPsec parameters for the role.
It assigns access to resources.
It associates the user with a RADIUS server.
It defines the types of authentication methods available to the user
第21题:
Configure an authentication policy as part of the user role definitions.
Configure a Sign-in Policy.
Configure authentication agents as part of the user role definitions
Configure an authentication policy as part of the authentication realm definition.
第22题:
Configure each user account in the auth server with the appropriate Odyssey Access Client preconfiguration files.
Configure the role-mapping rules with the appropriate Odyssey Access Client preconfiguration files.
Ensure that merge roles is selected in the role-mapping rules.
Ensure that the first role a user is mapped to is the role with the appropriate Odyssey Access Client preconfiguration file.
第23题:
Configure IP helper to forward the authentication requests from the clients to the external RADIUS server
Configure the supplicant as anexternal authentication server
Configure RADIUS proxy on the realm
Specify the correct RADIUS port 389 on the Junos Pulse Access Control Service