移动端

  • 题王微信公众号

    题王微信公众号

    微信搜“题王网”真题密题、最新资讯、考试攻略、轻松拿下考试

计算机考试 | juniper认证考试

模式切换

0 0 0
我的错题 我的收藏 学习笔记

章节目录

单选题 You are customizing the user interface options for the finance department in your organization. Users in the department are able to see a session counter on the Web interface of the Junos Pulse Access Control Service. The CFO is unable to see the session counter.Which explanation would cause this behavior?()

A

The CFO is mapped to the finance role, but the session counter was enabled prior to the role mapping.

B

The CFO is mapped to the finance role, but the session counter was enabled after the role mapping.

C

The CFO is mapped to the executive and finance roles, but the CFO was mapped to the executive role first, which does not have the session counter enabled.

D

The CFO is mapped to the executive and finance roles, but the CFO was mapped to the executive role last, which does not have the session counter enabled.

多选题 Which two considerations must you take into account when deploying a Junos Pulse Access Control Service cluster?()

A

State synchronization occurs only through the internal network interface card (NIC)

B

Latency of the WAN must be less than 300 ms.

C

Authenticating endpoints must be on the same LAN segment.

D

Cluster members must use the same hardware platfor

多选题 You have three classes of users on your network: employee, contractor, and IT administrator. You configure the Junos Pulse Access Control Service to assign roles to each user class and require that a specific wireless SSID be preconfigured for the Odyssey Access Client based on the role. Which configuration method should you use to satisfy this scenario?()

A

Create a Settings Update file in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under User Roles > Agent > Odyssey Settings > Preconfigured Installer.

B

Configure a wired adapter and assign the required SSID under User Roles > Agent > Odyssey Settings.

C

Create a script in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under User Roles > Agent > Odyssey Settings > Preconfigured Installer.

D

Create a Preconfiguration file in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under User Roles > Agent > Odyssey Settings > Preconfigured Installer.

单选题 An outside vendor is eligible for the guest role and the contractor role when accessing your network, that is secured with the Junos Pulse Access Control Service.What is the default role-mapping behavior?()

A

The vendor must select a role from a list of eligible roles.

B

The vendor must select a rule from a list of eligible rules.

C

The vendor is automatically mapped to the first configured role

D

The vendor is automatically granted a merged role.

单选题 You have configured Junos Pulse on your Windows desktop and want to verify that the IPsec configuration policy is being pushed down to your workstation upon network authentication and login.Which utility program do you use to see this configuration and where do you find it?()

A

the Pulse Diagnostics Tool in the File > Tools menu option in the Pulse GUI

B

the Pulse Diagnostics Tool in the Start > All Programs > Juniper Networks > Junos Pulse menu folder next to the Junos Pulse application

C

the Pulse Diagnostics Viewer, which you access by simultaneously pressing Ctrl and F2

D

the Pulse Diagnostics Viewer in the File > Tools menu option in the Pulse GUI

多选题 You want to provide 802.1X access for Windows clients using Junos Pulse as the agent. Which two considerations must you take into account()

A

Junos Pulse out erauth entication uses EAP-PEAP.

B

Junos Pulse ou terauth entication uses EAP-TTLS.

C

Junos Pulse innerauth entication uses EAP-MSCHAP-V2.

D

Theend point must use thenative Microsoft 802.1X supplicant.

多选题 An authentication realm consists of which three authentication resources?()

A

Authentication server

B

Session options

C

Authentication policy

D

End-point security policy

E

Role-mapping rules

1 2 3 4 5 下一页 尾页 /

到第