access profile
IKE parameters
tunneled interface
redirect policy
第1题:
You have a firewall enforcer protecting sensitive internal resources in a data center. The network traversed by endpoint traffic is semi-trusted, so you need to encrypt the traffic between the endpoints accessing the resources and the firewall enforcer.Which type of policies provide this level of protection?()
A. resource access policies
B. Host Enforcer policies
C. source IP enforcement policies
D. IPsec enforcement policies
第2题:
You have a firewall enforcer protecting resources in a data center. A user is experiencing difficulty connecting to a protected resource.Which two elements must exist so the user can access the resource?()
A. Resource access policy on the MAG Series device
B. IPsec routing policy on the MAG Series device
C. General traffic policy blocking access through the firewall enforcer
D. Auth table entry on the firewall enforcer
第3题:
Which statement is correct about defining an Infranet Enforcer for use as a RADIUS Client? ()
第4题:
You have created a security policy on an SRX240 that permits traffic from any source-address, any destination-address, and any application. The policy will be a source IP policy for use with the Junos Pulse Access Control Service. What must you add to complete the security policy configuration?()
第5题:
You are installing a MAG Series device for access control using an SRX Series device as the firewall enforcer. The MAG Series device resides in the same security zone as users. However, the users reside in different subnets and use the SRX Series device as an IP gateway.Which statement is true?()
第6题:
A user is successfully authenticating to the network but is unable to access protected resources behind a ScreenOS enforcer. You log in to the ScreenOS enforcer and issue the command get auth table infranet and you do not see the user listed.Which two event log settings on the Junos Pulse Access Control Service must you enable to troubleshootthis issue?()
第7题:
You have a firewall enforcer protecting resources in a data center. A user is experiencing difficulty connecting to a protected resource.Which two elements must exist so the user can access the resource?()
第8题:
You are deploying a Junos Pulse Access Control Service cluster in active/passive mode. How do you configure the IP address on the SRX Series devices?()
第9题:
Configure a captive-portal service that redirects all traffic back to the Junos Pulse Access Control Service.
Configure a security policy that references the unified-access-control captive-portal service.
Configure a captive-portal service that redirects unauthenticated traffic back to the Junos Pulse Access Control Service.
Configure a security policy that references the unified-access-control intranet-controller service.
第10题:
Configure a single Junos Pulse Access Control Service instance on the enforcer, specifying the VIP as the IP address the instance.
Configure multiple Junos Pulse Access Control Service instances on the enforcer, specifying the specific IP address each device in a separate instance.
Configure a single Junos Pulse Access Control Service instance on the enforcer, specifying the VIP and active node address in the instance.
Configure a single Junos Pulse Access Control Service instance on the enforcer, specifying the VIP and passive node address in the instance.
第11题:
Resource access policy on the MAG Series device
IPsec routing policy on the MAG Series device
General traffic policy blocking access through the firewall enforcer
Auth table entry on the firewall enforcer
第12题:
Add the switch to the Junos Pulse Access Control Service as a standard RADIUS.
Add the switch to the Junos Pulse Access Control Service using the Any make/model.
Add the switch as a firewall enforcer.
Obtain and configure the RADIUS dictionary for the switch and use that vendor listing for the make/model.
第13题:
A user is successfully authenticating to the network but is unable to access protected resources behind a ScreenOS enforcer. You log in to the ScreenOS enforcer and issue the command get auth table infranet and you do not see the user listed.Which two event log settings on the Junos Pulse Access Control Service must you enable to troubleshootthis issue?()
A. Connection Requests
B. System Errors
C. Enforcer Events
D. Enforcer Command Trace
第14题:
You need to configure a GRE tunnel on a IPSec router. When you are using the SDM to configurea GRE tunnel over IPsec, which two parameters are required when defining the tunnel interfaceinformation?()
第15题:
A policy-based IPsec VPN is ideal for which scenario?()
第16题:
You are configuring an SRX210 as a firewall enforcer that will tunnel IPsec traffic from several Junos Pulse users.Which two parameters must you configure on the SRX210?()
第17题:
In a Junos Pulse Access Control Service firewall enforcement configuration, what is the purpose of the source IP policy?()
第18题:
You want to create a security policy on an SRX240 that redirects unauthenticated users back to the Junos Pulse Access Control Service.Which two steps must you take to accomplish this task?()
第19题:
You have a firewall enforcer receiving resource access policies from a Junos Pulse Access Control Service. You are using Network and Security Manager (NSM) for configuration management on that firewall. The firewall can also be configured using its built-in command-line interface (CLI) or Web-based user interface (WebUI). To avoid conflicting configurations, which two interfaces must you use to configure the firewall enforcer?()
第20题:
You have a firewall enforcer protecting sensitive internal resources in a data center. The network traversed by endpoint traffic is semi-trusted, so you need to encrypt the traffic between the endpoints accessing the resources and the firewall enforcer.Which type of policies provide this level of protection?()
第21题:
CLI
WebUI
NSM
Junos Pulse Access Control Service
第22题:
The crypto ACL number
The IPSEC mode (tunnel or transport)
The GRE tunnel interface IP address
The GRE tunnel source interface or IP address, and tunnel destination IP address
The MTU size of the GRE tunnel interface
第23题:
Connection Requests
System Errors
Enforcer Events
Enforcer Command Trace
第24题:
access profile
IKE parameters
tunneled interface
redirect policy