多选题 What are two benefits of integrating Junos Pulse Access Control Service with Security Threat Response Manager (STRM)?()
The ability to detect and prevent malicious traffic.
The ability to associate security breaches with a specific user.
Converged management of network and security events, network flow data, and identity information.
Consistent device management across administrative realms.
多选题 Which two actions are available in the GUI for creating location awareness rules?()
WINS server
DNS server
IP reachability
Resolve address
单选题 You have a Junos Pulse Secure Access Service acting as an IF-MAP client, configured to federate all user roles to a Junos Pulse Access Control Service acting as an IF-MAP Federation server. A remote user using Junos Pulse logs in to the Junos Pulse Secure Access Service; the Junos Pulse Secure Access Service provisions a remote access session for that user.What happens next?()
The Junos Pulse Secure Access Service redirects the user to the Junos Pulse Secure Access Service for authentication
The Junos Pulse Access Control Service provisions enforcement points to enable resource access for that user.
The Junos Pulse Secure Access Service publishes user session and role information to the IF- MAP Federation server,
The Junos Pulse Secure Access Service provisions enforcement points to enable resource access for that user.
多选题 In the Junos Pulse Access Control Service, which three actions are only available in the admin GUI? ()
Take a System Snapshot
Configure Licensing
Review the Events
Set the date and time
Upgrade or downgrade the firmware
单选题 Which service is provided by a MAG Series device?()
Routing
MPLS VPNs
Access control
Intrusion detection
单选题 What is the function of Host Checker?()
To allow clientless access to the network
To restrict access to protected resources on the network
To scan an endpointfor compliance with security policies
To push a firewall policy to the endpoint's local firewall application
单选题 End users want to map a network drive on their PCs when they are connected to the Junos Pulse Access Control Service. The mapped drive must be removed when users disconnect their session.Which feature addresses this requirement?()
agent session scripts
preconfiguration installer
Junos Pulse component set
agent actions
单选题 A customer is deploying a new Junos Pulse Access Control Service and has completed the initial boot configuration as prompted using a serial connection. The customer now wants to complete the rest of the configuration using the admin GUI.Into which port on the Junos Pulse Access Control Service should the customer plug the network cable to enable access to the admin GUI?()
the internal interface
the external interface
the management interface
the console interface
单选题 Click the Exhibit button. What is the cause of the error shown in the exhibit?()
A RADIUS request is being received from a device that is not configured on the RADIUS Client page.
A user entered an incorrect password during RADIUS authentication.
A RADIUS proxy attempt failed to reach the configured proxy server.
The RADIUS shared secret is incorrect.
多选题 A user logs in and is mapped to two roles. The first role has a maximum timeout value of 600 minutes and the default Juniper Networks logo on the user interface page. The second role has a maximum timeout value of 1200 minutes and a custom logo on the user interface page. Based on the merging of these two roles, which two will be applied?()
A custom logo on the user interface page
A maximum timeout value of 600 minutes
A maximum time out value of 1200 minutes
A default Juniper Networks logo on the user interface page