单选题You are installing a new deployment of the Junos Pulse Access Control Service. In your environment, you have VoIP handsets that support 802.1X authentication with EAP-MD5.Which deployment constraint must you consider?()A EAP-MD5 is not supported by the

题目
单选题
You are installing a new deployment of the Junos Pulse Access Control Service. In your environment, you have VoIP handsets that support 802.1X authentication with EAP-MD5.Which deployment constraint must you consider?()
A

EAP-MD5 is not supported by the Junos Pulse Access Control Service

B

EAP-MD5 requires passwords to be stored in an encrypted format.

C

EAP-MD5 requires passwords to be stored in a clear text format.

D

EAP-MD5 performs a real time hash of the handset's MAC address.


相似考题
更多“单选题You are installing a new deployment of the Junos Pulse Access Control Service. In your environment, you have VoIP handsets that support 802.1X authentication with EAP-MD5.Which deployment constraint must you consider?()A EAP-MD5 is not supported by the”相关问题
  • 第1题:

    You are setting up a Junos Pulse Access Control Service. You cannot obtain a device certificate from an external certificate authority.Which tool should you use to generate a device certificate?()

    A.OpenSSL

    B.OpenSSH

    C.OpenLDAP

    D.OpenRADIUS


    参考答案:A

  • 第2题:

    If you want to use the Java EE platform’s built-in type of authentication that uses a custom HTML page for authentication. Which two statements are true?()

    • A、Your deployment descriptor will need to contain this tag: CUSTOM.
    • B、The related custom HTML login page must be named loginPage.html.
    • C、When you use this type of authentication, SSL is turned on automatically.
    • D、You must have a tag in your deployment descriptor that allows you to point to both a login HTML pageand an HTML page for handling any login errors.
    • E、In the HTML related to authentication for this application, you must use predefined variable names fort he variables that store the user and password values.

    正确答案:D,E

  • 第3题:

    Your IT director has decided to allow employees to use their laptops at home as well as in the office. You have deployed the Junos Pulse client to allow access to the offices 802.1X-enabled wired network. Your company also has the Junos Pulse Secure Access Service deployed. You want the Junos Pulse client to automatically launch the appropriate access method depending on each users location. Which three are supported to determine the users location?()

    • A、MAC address
    • B、DNS server
    • C、DHCP server
    • D、resolve address
    • E、endpoint address

    正确答案:B,D,E

  • 第4题:

    When using RADIUS as an external authentication method for 802.1X authentication for the Junos Pulse Access Control Service, what must you do to ensure that the RADIUS authentication works properly?()

    • A、Configure IP helper to forward the authentication requests from the clients to the external RADIUS server
    • B、Configure the supplicant as anexternal authentication server
    • C、Configure RADIUS proxy on the realm
    • D、Specify the correct RADIUS port 389 on the Junos Pulse Access Control Service

    正确答案:C

  • 第5题:

    Which three types of policies must you configure to allow remote users transparent access to protected resources using IF-MAP Federation between a Junos Pulse Secure Access Service and a Junos Pulse Access Control Service?()

    • A、Session-Export policies on the Junos Pulse Secure Access Service
    • B、Session-Export policies on the Junos Pulse Access Control Service
    • C、Session-Import policies on the Junos Pulse Secure Access Service
    • D、Session-Import policies on the Junos Pulse Access Control Service
    • E、Resource access policies on the Junos Pulse Access Control Service

    正确答案:A,D,E

  • 第6题:

    You want to provide 802.1X access for Windows clients using Junos Pulse as the agent. Which two considerations must you take into account()

    • A、Junos Pulse out erauth entication uses EAP-PEAP.
    • B、Junos Pulse ou terauth entication uses EAP-TTLS.
    • C、Junos Pulse innerauth entication uses EAP-MSCHAP-V2.
    • D、Theend point must use thenative Microsoft 802.1X supplicant.

    正确答案:B,D

  • 第7题:

    You have a firewall enforcer receiving resource access policies from a Junos Pulse Access Control Service. You are using Network and Security Manager (NSM) for configuration management on that firewall. The firewall can also be configured using its built-in command-line interface (CLI) or Web-based user interface (WebUI). To avoid conflicting configurations, which two interfaces must you use to configure the firewall enforcer?()

    • A、CLI
    • B、WebUI
    • C、NSM
    • D、Junos Pulse Access Control Service

    正确答案:C,D

  • 第8题:

    多选题
    You have a firewall enforcer receiving resource access policies from a Junos Pulse Access Control Service. You are using Network and Security Manager (NSM) for configuration management on that firewall. The firewall can also be configured using its built-in command-line interface (CLI) or Web-based user interface (WebUI). To avoid conflicting configurations, which two interfaces must you use to configure the firewall enforcer?()
    A

    CLI

    B

    WebUI

    C

    NSM

    D

    Junos Pulse Access Control Service


    正确答案: A,D
    解析: 暂无解析

  • 第9题:

    单选题
    You are installing a new deployment of the Junos Pulse Access Control Service. You have an existing RADIUS server that has a populated user file. You are considering using the RADIUS proxy feature.Which consideration must you take into account?()
    A

    Your RADIUS server database must be replicated onto another device for redundancy.

    B

    Inner proxy creates a tunnel between the supplicant and the external server.

    C

    RADIUS proxy causes the role assignment process to be skipped.

    D

    Outer proxy configuration passes authentication data to the external RADIUS server in clear text.


    正确答案: B
    解析: 暂无解析

  • 第10题:

    单选题
    You want to provide all users in your corporation with a single agent that provides access to multiple connection types conditionally. For example, you connect to the Junos Pulse Access Control Service if you are connected to the intranet, but you connect to the Junos Pulse Secure Access Service if you are on a remote network. Which agent should you use for this type of connection requirement?()
    A

    Junos Pulse should be configured with location awareness rules configured.

    B

    Odyssey Access Client should be installed with Host Checker configured to check the client's location.

    C

    Junos Pulse should be configured with all components installed.

    D

    Agentless access should be enabled so that clients can connect to any service without concern for installing an agent.


    正确答案: A
    解析: 暂无解析

  • 第11题:

    单选题
    You have configured Junos Pulse on your Windows desktop and want to verify that the IPsec configuration policy is being pushed down to your workstation upon network authentication and login.Which utility program do you use to see this configuration and where do you find it?()
    A

    the Pulse Diagnostics Tool in the File > Tools menu option in the Pulse GUI

    B

    the Pulse Diagnostics Tool in the Start > All Programs > Juniper Networks > Junos Pulse menu folder next to the Junos Pulse application

    C

    the Pulse Diagnostics Viewer, which you access by simultaneously pressing Ctrl and F2

    D

    the Pulse Diagnostics Viewer in the File > Tools menu option in the Pulse GUI


    正确答案: C
    解析: 暂无解析

  • 第12题:

    单选题
    You are setting up a Junos Pulse Access Control Service. You cannot obtain a device certificate from an external certificate authority.Which tool should you use to generate a device certificate?()
    A

    OpenSSL

    B

    OpenSSH

    C

    OpenLDAP

    D

    OpenRADIUS


    正确答案: A
    解析: 暂无解析

  • 第13题:

    You have configured Junos Pulse on your Windows desktop and want to verify that the IPsec configuration policy is being pushed down to your workstation upon network authentication and login.Which utility program do you use to see this configuration and where do you find it?()

    • A、the Pulse Diagnostics Tool in the "File" > "Tools" menu option in the Pulse GUI
    • B、the Pulse Diagnostics Tool in the "Start" > "All Programs" > "Juniper Networks" > "Junos Pulse" menu folder next to the Junos Pulse application
    • C、the Pulse Diagnostics Viewer, which you access by simultaneously pressing "Ctrl" and "F2"
    • D、the Pulse Diagnostics Viewer in the "File" > "Tools" menu option in the Pulse GUI

    正确答案:C

  • 第14题:

    You are installing a new deployment of the Junos Pulse Access Control Service. In your environment, you have VoIP handsets that support 802.1X authentication with EAP-MD5.Which deployment constraint must you consider?()

    • A、EAP-MD5 is not supported by the Junos Pulse Access Control Service
    • B、EAP-MD5 requires passwords to be stored in an encrypted format.
    • C、EAP-MD5 requires passwords to be stored in a clear text format.
    • D、EAP-MD5 performs a real time hash of the handset's MAC address.

    正确答案:C

  • 第15题:

    You are installing a new deployment of the Junos Pulse Access Control Service. You have an existing RADIUS server that has a populated user file. You are considering using the RADIUS proxy feature.Which consideration must you take into account?()

    • A、Your RADIUS server database must be replicated onto another device for redundancy.
    • B、Inner proxy creates a tunnel between the supplicant and the external server.
    • C、RADIUS proxy causes the role assignment process to be skipped.
    • D、Outer proxy configuration passes authentication data to the external RADIUS server in clear text.

    正确答案:C

  • 第16题:

    You want to create a security policy on an SRX240 that redirects unauthenticated users back to the Junos Pulse Access Control Service.Which two steps must you take to accomplish this task?()

    • A、Configure a captive-portal service that redirects all traffic back to the Junos Pulse Access Control Service.
    • B、Configure a security policy that references the unified-access-control captive-portal service.
    • C、Configure a captive-portal service that redirects unauthenticated traffic back to the Junos Pulse Access Control Service.
    • D、Configure a security policy that references the unified-access-control intranet-controller service.

    正确答案:B,C

  • 第17题:

    You want to provide all users in your corporation with a single agent that provides access to multiple connection types conditionally. For example, you connect to the Junos Pulse Access Control Service if you are connected to the intranet, but you connect to the Junos Pulse Secure Access Service if you are on a remote network. Which agent should you use for this type of connection requirement?()

    • A、Junos Pulse should be configured with location awareness rules configured.
    • B、Odyssey Access Client should be installed with Host Checker configured to check the client's location.
    • C、Junos Pulse should be configured with all components installed.
    • D、Agentless access should be enabled so that clients can connect to any service without concern for installing an agent.

    正确答案:A

  • 第18题:

    You are setting up a Junos Pulse Access Control Service. You cannot obtain a device certificate from an external certificate authority.Which tool should you use to generate a device certificate?()

    • A、OpenSSL
    • B、OpenSSH
    • C、OpenLDAP
    • D、OpenRADIUS

    正确答案:A

  • 第19题:

    You have a server that runs windows server 2008 you need to configure the server as a VPN server. What should you install on the server?()

    • A、Windows deployment Services role and deployment server role service.
    • B、Windows deployment services role and deployment transport role service.
    • C、Network policy and access services role and routing and remote access services role service.
    • D、Network policy and access services and host credential authorization protocol role service.

    正确答案:C

  • 第20题:

    单选题
    You have a server that runs windows server 2008 you need to configure the server as a VPN server. What should you install on the server?()
    A

    Windows deployment Services role and deployment server role service.

    B

    Windows deployment services role and deployment transport role service.

    C

    Network policy and access services role and routing and remote access services role service.

    D

    Network policy and access services and host credential authorization protocol role service.


    正确答案: A
    解析: 暂无解析

  • 第21题:

    单选题
    You have created a security policy on an SRX240 that permits traffic from any source-address, any destination-address, and any application. The policy will be a source IP policy for use with the Junos Pulse Access Control Service. What must you add to complete the security policy configuration?()
    A

    The intranet-auth authentication option

    B

    The redirect-portal application service

    C

    The uac-policy application service

    D

    The ipsec-vpn tunnel


    正确答案: D
    解析: 暂无解析

  • 第22题:

    单选题
    You are installing a new deployment of the Junos Pulse Access Control Service. In your environment, you have VoIP handsets that support 802.1X authentication with EAP-MD5.Which deployment constraint must you consider?()
    A

    EAP-MD5 is not supported by the Junos Pulse Access Control Service

    B

    EAP-MD5 requires passwords to be stored in an encrypted format.

    C

    EAP-MD5 requires passwords to be stored in a clear text format.

    D

    EAP-MD5 performs a real time hash of the handset's MAC address.


    正确答案: D
    解析: 暂无解析

  • 第23题:

    单选题
    When using RADIUS as an external authentication method for 802.1X authentication for the Junos Pulse Access Control Service, what must you do to ensure that the RADIUS authentication works properly?()
    A

    Configure IP helper to forward the authentication requests from the clients to the external RADIUS server

    B

    Configure the supplicant as anexternal authentication server

    C

    Configure RADIUS proxy on the realm

    D

    Specify the correct RADIUS port 389 on the Junos Pulse Access Control Service


    正确答案: C
    解析: 暂无解析

  • 第24题:

    单选题
    You have a server that runs windows server 2008. You need to configure the server as a VPN server. What should you install on the server?()
    A

    Windows deployment services role and deployment server role service.

    B

    Windows deployment services role and deployment transport role service.

    C

    Network policy and access services role and routing and remote access services role service.

    D

    Network policy and access services and host credential authorization protocol role service.


    正确答案: A
    解析: 暂无解析