单选题 A company has completed two acquisitions over the previous year. Each of the acquired companies was allowed to keep its own independent authentication server. The network administrator has been asked to roll out the Junos Pulse Access Control Service to users within the original company along with each of the two acquired organizations.The administrator configures three authentication realms, one for each independent authentication server, and associates them all with a single sign-in policy. All of the client endpoints are running Junos Pulse on their Windows XP desktops. When a user signs in to the Junos Pulse Access Control Service, which statement is correct?（）
The first authentication realm that was added to the sign-in policy is used by default.
The user is allowed to choose the correct authentication realm from a list presented by Junos Pulse.
When Junos Pulse is initially installed on the desktop, it must be configured with the correct realm.
This is not an allowed configuration; the administrator should configure separate sign-in policies for each realm.
多选题 What are two benefits of integrating Junos Pulse Access Control Service with Security Threat Response Manager (STRM)?（）
The ability to detect and prevent malicious traffic.
The ability to associate security breaches with a specific user.
Converged management of network and security events, network flow data, and identity information.
Consistent device management across administrative realms.
单选题 You have a Junos Pulse Secure Access Service acting as an IF-MAP client, configured to federate all user roles to a Junos Pulse Access Control Service acting as an IF-MAP Federation server. A remote user using Junos Pulse logs in to the Junos Pulse Secure Access Service; the Junos Pulse Secure Access Service provisions a remote access session for that user.What happens next?（）
The Junos Pulse Secure Access Service redirects the user to the Junos Pulse Secure Access Service for authentication
The Junos Pulse Access Control Service provisions enforcement points to enable resource access for that user.
The Junos Pulse Secure Access Service publishes user session and role information to the IF- MAP Federation server,
The Junos Pulse Secure Access Service provisions enforcement points to enable resource access for that user.
To allow clientless access to the network
To restrict access to protected resources on the network
To scan an endpointfor compliance with security policies
To push a firewall policy to the endpoint's local firewall application
单选题 A customer is deploying a new Junos Pulse Access Control Service and has completed the initial boot configuration as prompted using a serial connection. The customer now wants to complete the rest of the configuration using the admin GUI.Into which port on the Junos Pulse Access Control Service should the customer plug the network cable to enable access to the admin GUI?（）
the internal interface
the external interface
the management interface
the console interface
单选题 End users want to map a network drive on their PCs when they are connected to the Junos Pulse Access Control Service. The mapped drive must be removed when users disconnect their session.Which feature addresses this requirement?（）
agent session scripts
Junos Pulse component set
多选题 In the Junos Pulse Access Control Service, which three actions are only available in the admin GUI? （）
Take a System Snapshot
Review the Events
Set the date and time
Upgrade or downgrade the firmware
A RADIUS request is being received from a device that is not configured on the RADIUS Client page.
A user entered an incorrect password during RADIUS authentication.
A RADIUS proxy attempt failed to reach the configured proxy server.
The RADIUS shared secret is incorrect.