单选题 You notice that during peak hours, some firewall enforcers contain a high number of auth table entries. As you investigate the issue, you discover that all users are getting auth table mappings to all firewalls, which is not acceptable. What should you do on the Junos Pulse Access Control Service to resolve this problem?（）
Delete the default auth table mapping policy
Create auth table mapping policies that route users to specific resources
Create Resource Access policies that permit access to specific resources
Create Source Interface policies that route users to specific resources
单选题 How would an end user add both a Junos Pulse Access Control Service URL and a Junos Pulse Secure Access Service URL to the same Junos Pulse client?（）
By adding two separate connections in the connections dialog box
By adding two separate intranet Controllers under the configuration hierarchy
By adding one intranet Controller and one SA under the configuration hierarchy
By adding two URLs under a connection in the connections dialog box
多选题 You are configuring an LDAP authentication server, and you want to configure role-mapping rules based on group membership. When you attempt to search for groups in the server catalog, no groups appear.Assuming the LDAP server is reachable and functioning properly, in the admin GUI. Which two parts of the configuration should you verify are correct?（）
Finding user entries
LDAP Server Type
Determining group membership
多选题 On the Junos Pulse Access Control Service, you have created a role called Secret that you only want to provide to users who present a certificate.Using the admin GUI, which two features would you configure to satisfy this requirement?（）
Role Mapping Rule
Trusted Server CA
Users authenticated to one Junos Pulse Access Control Service can transparently access resources protected by another Junos Pulse Access Control Service.
Users authenticated to a Junos Pulse Access Control Service can transparently access resources protected by a Junos Pulse Secure Access Service.
Remote access users authenticated to a Junos Pulse Secure Access Service can transparently access resources protected by a Junos Pulse Access Control Service.
Remote access users authenticated to one Junos Pulse Secure Access Service can transparently access resources protected by another Junos Pulse Secure Access Service.
单选题 You want to provide all users in your corporation with a single agent that provides access to multiple connection types conditionally. For example, you connect to the Junos Pulse Access Control Service if you are connected to the intranet, but you connect to the Junos Pulse Secure Access Service if you are on a remote network. Which agent should you use for this type of connection requirement?（）
Junos Pulse should be configured with location awareness rules configured.
Odyssey Access Client should be installed with Host Checker configured to check the client's location.
Junos Pulse should be configured with all components installed.
Agentless access should be enabled so that clients can connect to any service without concern for installing an agent.
单选题 You are installing a new deployment of the Junos Pulse Access Control Service. In your environment, you have VoIP handsets that support 802.1X authentication with EAP-MD5.Which deployment constraint must you consider?（）
EAP-MD5 is not supported by the Junos Pulse Access Control Service
EAP-MD5 requires passwords to be stored in an encrypted format.
EAP-MD5 requires passwords to be stored in a clear text format.
EAP-MD5 performs a real time hash of the handset's MAC address.
单选题 You navigate to "UAC" > "Infranet Enforcer" > "Auth Table Mapping" in the admin GUI. You see one policy, which is the unmodified, original default policy.Which statement is true?（）
Dynamic auth table mapping is not enabled.
A successful authentication attempt will result in a new authentication table entry, which will be delivered only to the Junos enforcer protecting the network from which the user has authenticated.
To create a static auth table mapping, you must delete the default policy.
The default policy applies only to the factory-default role User.
单选题 An administrator has created three different Odyssey Access Client preconfiguration files and assigned them to three different roles in the same realm.Which action should the administrator take to ensure that users get the correct Odyssey Access Client preconfiguration file?（）
Configure each user account in the auth server with the appropriate Odyssey Access Client preconfiguration files.
Configure the role-mapping rules with the appropriate Odyssey Access Client preconfiguration files.
Ensure that merge roles is selected in the role-mapping rules.
Ensure that the first role a user is mapped to is the role with the appropriate Odyssey Access Client preconfiguration file.
多选题 What are three necessary steps for enabling 802.1X access when configuring Layer 2 enforcement?（）
Configure a location group
Createan authentication protocol set
Configure the RADIUS AV pair list
Configure RADIUS clients
Configure role and role-mapping rules