移动端

  • 题王微信公众号

    题王微信公众号

    微信搜“题王网”真题密题、最新资讯、考试攻略、轻松拿下考试

计算机考试 | juniper认证考试

模式切换

0 0 0
我的错题 我的收藏 学习笔记

章节目录

多选题 You are performing the initial setup of a new MAG Series device and have installed a valid CA- signed certificate on the MAG Series device. Connectivity to an existing SRX Series firewall enforcer cannot be obtained.What are two explanations for this behavior?()

A

The MAG Series device has multiple ports associated with the certificate.

B

The MAG Series device's serial number needs to be configured on the SRX Series device.

C

The SRX Series device must have a certificate signed by the same authority as the MAG Series device.

D

The MAG Series device and SRX Series device are not synchronized to an NTP server.

多选题 Click the Exhibit button. A user logs in, is assigned the default role, and successfully loads the Host Enforcer policies shown in the exhibit.Which three statements are true? ()

A

The local host will respond to ICMP echo-request packets from 192.168.53.10.

B

The local host will respond to UDP port 53 requests from 192.168.1.25.

C

The local host can send any packet of any type to host 172.16.1.1.

D

The local host will accept any packet of any type from host 172.16.1.1.

E

The local host can send packets to UDP port512 on server 192.168.53.10.

单选题 You are the administrator of a Junos Pulse Access Control Service implementation. You must restrict authenticated users connected from the branch offices to a few specific resources within the data center. However, when the authenticated users are connected at the corporate office, they are allowed more access to the data center resources. You have created two roles with different levels of access and are trying to determine the best way of controlling when a user is mapped to a specific role. Having the user prompted to manually select their role is possible, but you want to automate the process. Which configuration solves this problem?()

A

Implement a RADIUS request attribute policy to assist with realm selection and create different role-mapping rules for the user in each realm.

B

Implement a directory/attribute server on the realm and set up this server to determine by group membership the proper role to which a user should be mapped.

C

Reorder the role-mapping rules to allow for the more open role to be mapped first and then enable the stop processing rules when this rule matches function on this role.

D

Implement a Host Checker policy on the realm that determines the geographic location of the device and restricts the user based on the results of the policy.

多选题 Your manager has informed you that only specific users can have access to the Preferred Members role, and that these users are restricted to the Preferred Members role. The Preferred Members role-mapping rule is currently set as the last rule in your role-mapping rules and is based on username. Currently all users are assigned to the Preferred Members role-mapping rule. Which three changes in the admin GUI will enforce your managers change request?()

A

Move the Preferred Members role-mapping rule to the top of the list.

B

Remove the Preferred Members role from the role-mapping rule.

C

Edit the Preferred Members role-mapping rule so that the username is equal to *.

D

Edit the Preferred Members role-mapping rule so that only the select users are assigned to the role-mapping rule.

E

Edit the Preferred Members role-mapping rule and select Stop processing rules when this rule matches.

多选题 You want to enforce a Host Checker policy so that only users who pass the policy receive the Employee role. In the admin GUI, which two parameters must you configure?()

A

Select Require and Enforce for the Host Checker Policy in the realm authentication policy.

B

Select Evaluate Policies for the Host Checker policy in the realm authentication policy.

C

Configure the Host Checker policy as a role restriction for the Employee role.

D

Configure the Host Checker policy as a resource access policy for the Employee role.

单选题 What is a function of a user role?()

A

It defines the IPsec parameters for the role.

B

It assigns access to resources.

C

It associates the user with a RADIUS server.

D

It defines the types of authentication methods available to the user

首页 上一页 1 2 3 4 5 下一页 尾页 /

到第