Remote Debugging
System Snapshot
User Access logs
Policy Tracing
第1题:
You are trying to deploy a configuration job to an ios access point using the wlse, but the job fails. Which of the following would cause this failure?()
第2题:
Which two management-software applications can you use to manage the Cisco Catalyst Express 500 Series Switches?()
第3题:
Without calling JTAC, which two troubleshooting tools on a MAG Series device would you use to identify the cause of an authentication failure?()
第4题:
Bob, a technician, is troubleshooting a PC that intermittently does not power on. Which of the following tools would be the BEST choice to use to verify a possible cause? ()
第5题:
You have a firewall enforcer protecting resources in a data center. A user is experiencing difficulty connecting to a protected resource.Which two elements must exist so the user can access the resource?()
第6题:
You administer a network containing SRX Series firewalls. New policy requires that you implement MAG Series devices to provide access control for end users. The policy requires that the SRX Series devices dynamically enforce security policy based on the source IP address of the user. The policy also requires that the users communicate with protected resources using encrypted traffic. Which two statements are true?()
第7题:
Which service is provided by a MAG Series device?()
第8题:
The MAG Series device has multiple ports associated with the certificate.
The MAG Series device's serial number needs to be configured on the SRX Series device.
The SRX Series device must have a certificate signed by the same authority as the MAG Series device.
The MAG Series device and SRX Series device are not synchronized to an NTP server.
第9题:
Resource access policy on the MAG Series device
IPsec routing policy on the MAG Series device
General traffic policy blocking access through the firewall enforcer
Auth table entry on the firewall enforcer
第10题:
The RADIUS server
The EAPoL server
The workstation's network adapter
The Ethernet switch
第11题:
The endpoints can use agentless access.
Encrypted traffic flows between the endpoint and the enforcer.
Encrypted traffic flows between the endpoint and the protected resource
The endpoints can use the Odyssey Access Client.
第12题:
Cisco Network Assistant
Cisco Security Device Manager
Cisco Device Manager
Cisco Adaptive Security Device Manager
第13题:
You are trying to deploy a configuration job to an IOS access point using the WLSE, but the jobfails. Which of the following would cause this failure?()
第14题:
Before replacing a MAG Series device, using the admin GUI, you export two backup files, system.cfg from "Maintenance" > "ImportfExport Configuration" and user.cfg from "Maintenance" > "Import/Export Users". When you receive the new hardware, you import all of the settings stored in the system.cfg file (including the IP address, network configuration, and device certificates), but you fail to import the user.cfg file. Which three configuration areas were updated by system.cfg?()
第15题:
A users Junos Pulse client uses 802.1X to access a wired network and is failing to authenticate. You run a packet capture from the users PC and notice that immediately after the client machine sends an EAPoL-start packet, an EAP-failure packet is returned. You review the RADIUS troubleshooting logs on the MAG Series device and do not see any authentication attempts from the user. Other users on the same Ethernet switch are successfully authenticating. Which device is sending the EAP-failure packet to the workstation?()
第16题:
You are installing a MAG Series device for access control using an SRX Series device as the firewall enforcer. The MAG Series device resides in the same security zone as users. However, the users reside in different subnets and use the SRX Series device as an IP gateway.Which statement is true?()
第17题:
Which two external authentication servers are supported for administrative access to a Junos device?()
第18题:
You are performing the initial setup of a new MAG Series device and have installed a valid CA- signed certificate on the MAG Series device. Connectivity to an existing SRX Series firewall enforcer cannot be obtained.What are two explanations for this behavior?()
第19题:
RADIUS
LDAP
ACE
TACACS+
第20题:
loss of power
QoS congestion
software failure occured
WX device exceeded its license speed
traffic does not match application definiton
第21题:
You must configure a security policy on the SRX Series device to allow traffic to flow from the user devices to the MAG Series device.
No security policy is necessary on the SRX Series device to allow traffic to flow from the user devices to the MAG Series device.
You must configure host-inbound traffic on the SRX Series device to allow SSL traffic between the MAG Series device and the user devices.
You must configure host-inbound traffic on the SRX Series device to allow EAP traffic between the MAG Series device and the user devices.
第22题:
The user will be instructed to call the network administrator.
The user will fail authentication.
The user will be prompted to install a new device certificate on the MAG Series device.
The user will successfully authenticate and have full network access.
第23题:
Cluster configuration settings
Static routes
SNMP settings
Sign-in policies
MAC authentication realms