移动端

  • 题王微信公众号

    微信搜“题王网”真题密题、最新资讯、考试攻略、轻松拿下考试

其他类 | juniper认证考试

模式切换

0 0 0
我的错题 我的收藏 学习笔记

章节目录

单选题 You notice that during peak hours, some firewall enforcers contain a high number of auth table entries. As you investigate the issue, you discover that all users are getting auth table mappings to all firewalls, which is not acceptable. What should you do on the Junos Pulse Access Control Service to resolve this problem?()

A

Delete the default auth table mapping policy

B

Create auth table mapping policies that route users to specific resources

C

Create Resource Access policies that permit access to specific resources

D

Create Source Interface policies that route users to specific resources

单选题 How would an end user add both a Junos Pulse Access Control Service URL and a Junos Pulse Secure Access Service URL to the same Junos Pulse client?()

A

By adding two separate connections in the connections dialog box

B

By adding two separate intranet Controllers under the configuration hierarchy

C

By adding one intranet Controller and one SA under the configuration hierarchy

D

By adding two URLs under a connection in the connections dialog box

多选题 What are two use cases enabled by IF-MAP Federation?()

A

Users authenticated to one Junos Pulse Access Control Service can transparently access resources protected by another Junos Pulse Access Control Service.

B

Users authenticated to a Junos Pulse Access Control Service can transparently access resources protected by a Junos Pulse Secure Access Service.

C

Remote access users authenticated to a Junos Pulse Secure Access Service can transparently access resources protected by a Junos Pulse Access Control Service.

D

Remote access users authenticated to one Junos Pulse Secure Access Service can transparently access resources protected by another Junos Pulse Secure Access Service.

单选题 You want to provide all users in your corporation with a single agent that provides access to multiple connection types conditionally. For example, you connect to the Junos Pulse Access Control Service if you are connected to the intranet, but you connect to the Junos Pulse Secure Access Service if you are on a remote network. Which agent should you use for this type of connection requirement?()

A

Junos Pulse should be configured with location awareness rules configured.

B

Odyssey Access Client should be installed with Host Checker configured to check the client's location.

C

Junos Pulse should be configured with all components installed.

D

Agentless access should be enabled so that clients can connect to any service without concern for installing an agent.

单选题 You are installing a new deployment of the Junos Pulse Access Control Service. In your environment, you have VoIP handsets that support 802.1X authentication with EAP-MD5.Which deployment constraint must you consider?()

A

EAP-MD5 is not supported by the Junos Pulse Access Control Service

B

EAP-MD5 requires passwords to be stored in an encrypted format.

C

EAP-MD5 requires passwords to be stored in a clear text format.

D

EAP-MD5 performs a real time hash of the handset's MAC address.

单选题 You navigate to "UAC" > "Infranet Enforcer" > "Auth Table Mapping" in the admin GUI. You see one policy, which is the unmodified, original default policy.Which statement is true?()

A

Dynamic auth table mapping is not enabled.

B

A successful authentication attempt will result in a new authentication table entry, which will be delivered only to the Junos enforcer protecting the network from which the user has authenticated.

C

To create a static auth table mapping, you must delete the default policy.

D

The default policy applies only to the factory-default role User.

单选题 An administrator has created three different Odyssey Access Client preconfiguration files and assigned them to three different roles in the same realm.Which action should the administrator take to ensure that users get the correct Odyssey Access Client preconfiguration file?()

A

Configure each user account in the auth server with the appropriate Odyssey Access Client preconfiguration files.

B

Configure the role-mapping rules with the appropriate Odyssey Access Client preconfiguration files.

C

Ensure that merge roles is selected in the role-mapping rules.

D

Ensure that the first role a user is mapped to is the role with the appropriate Odyssey Access Client preconfiguration file.

多选题 What are three necessary steps for enabling 802.1X access when configuring Layer 2 enforcement?()

A

Configure a location group

B

Createan authentication protocol set

C

Configure the RADIUS AV pair list

D

Configure RADIUS clients

E

Configure role and role-mapping rules

推荐考题

最新资讯

1 2 3 4 5 下一页 尾页 /

到第