third-party RADIUS support
Host Enforcer
Host Checker
IPsec
soft tokens
第1题:
A customer is trying to determine which client to deploy. The customer wants to be able to perform Layer 2 authentication as well as connect to the Junos Pulse Secure Access Service.Which client should the customer deploy?()
A. Windows native supplicant
B. Odyssey Access Client
C. Junos Pulse
D. Network Connect
第2题:
Which three types of policies must you configure to allow remote users transparent access to protected resources using IF-MAP Federation between a Junos Pulse Secure Access Service and a Junos Pulse Access Control Service?()
A. Session-Export policies on the Junos Pulse Secure Access Service
B. Session-Export policies on the Junos Pulse Access Control Service
C. Session-Import policies on the Junos Pulse Secure Access Service
D. Session-Import policies on the Junos Pulse Access Control Service
E. Resource access policies on the Junos Pulse Access Control Service
第3题:
What are two features provided by the Junos Pulse client?()
第4题:
Your IT director has decided to allow employees to use their laptops at home as well as in the office. You have deployed the Junos Pulse client to allow access to the offices 802.1X-enabled wired network. Your company also has the Junos Pulse Secure Access Service deployed. You want the Junos Pulse client to automatically launch the appropriate access method depending on each users location. Which three are supported to determine the users location?()
第5题:
When using RADIUS as an external authentication method for 802.1X authentication for the Junos Pulse Access Control Service, what must you do to ensure that the RADIUS authentication works properly?()
第6题:
Which three types of policies must you configure to allow remote users transparent access to protected resources using IF-MAP Federation between a Junos Pulse Secure Access Service and a Junos Pulse Access Control Service?()
第7题:
A customer is trying to determine which client to deploy. The customer wants to be able to perform Layer 2 authentication as well as connect to the Junos Pulse Secure Access Service.Which client should the customer deploy?()
第8题:
SHA-1
MD5 authentication
version 1 messages
version 2 messages
plain-text authentication
第9题:
802.1X
video messaging
IPsec
VoIP
第10题:
Add the switch to the Junos Pulse Access Control Service as a standard RADIUS.
Add the switch to the Junos Pulse Access Control Service using the Any make/model.
Add the switch as a firewall enforcer.
Obtain and configure the RADIUS dictionary for the switch and use that vendor listing for the make/model.
第11题:
Take a System Snapshot
Configure Licensing
Review the Events
Set the date and time
Upgrade or downgrade the firmware
第12题:
third-party RADIUS support
Host Enforcer
Host Checker
IPsec
soft tokens
第13题:
A. 802.1X
B. video messaging
C. IPsec
D. VoIP
第14题:
A. VIP is not required when using only agentless access for all endpoint platforms.
B. VIP is not required when using Junos Pulse or Odyssey Access Client for all endpoint platforms.
C. VIP is not required when using Junos Pulse and agentless access for all endpoint platforms.
D. VIP is not required when using Odyssey Access Client and agentless access for all endpoint platforms.
第15题:
Which Junos Pulse Access Control Service client provides a built-in viewer to access local logs?()
第16题:
Which three features are supported with the Junos Pulse client?()
第17题:
A customer has purchased a third-party switch to use for Layer 2 access with their Junos Pulse Access Controe Service. When configuring the switch on the Junos Pulse Access Control Service, the customer does not find a make/model entry for it . Which two actions should the customer take to make the switch work with the Junos Pulse Access Control Service?()
第18题:
You have three classes of users on your network: employee, contractor, and IT administrator. You configure the Junos Pulse Access Control Service to assign roles to each user class and require that a specific wireless SSID be preconfigured for the Odyssey Access Client based on the role. Which configuration method should you use to satisfy this scenario?()
第19题:
Which three user authentication methods are supported by the Junos OS?()
第20题:
Session-Export policies on the Junos Pulse Secure Access Service
Session-Export policies on the Junos Pulse Access Control Service
Session-Import policies on the Junos Pulse Secure Access Service
Session-Import policies on the Junos Pulse Access Control Service
Resource access policies on the Junos Pulse Access Control Service
第21题:
Create a Settings Update file in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under User Roles > Agent > Odyssey Settings > Preconfigured Installer.
Configure a wired adapter and assign the required SSID under User Roles > Agent > Odyssey Settings.
Create a script in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under User Roles > Agent > Odyssey Settings > Preconfigured Installer.
Create a Preconfiguration file in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under User Roles > Agent > Odyssey Settings > Preconfigured Installer.
第22题:
MAC address
DNS server
DHCP server
resolve address
endpoint address
第23题:
RADIUS
CHAP
local user database
TACACS+
PAP
第24题:
database integration
prompt and collect
VoiceXML
opening and parsing HTTP and XML documents
PQ
E-mail Queuing