单选题 Click the Exhibit button. A customer configures the Junos Pulse Access Control Service with a Contractor role, an Employee role, and a Remediation role. A user logs in and is assigned the Remediation role. Referring to the exhibit, to which RADIUS Return Attributes Policy will the user be assigned?()
CorporateVLAN
EmployeeVLAN
RemediationVLAN
GuestVLAN
单选题 You are customizing the user interface options for the finance department in your organization. Users in the department are able to see a session counter on the Web interface of the Junos Pulse Access Control Service. The CFO is unable to see the session counter.Which explanation would cause this behavior?()
The CFO is mapped to the finance role, but the session counter was enabled prior to the role mapping.
The CFO is mapped to the finance role, but the session counter was enabled after the role mapping.
The CFO is mapped to the executive and finance roles, but the CFO was mapped to the executive role first, which does not have the session counter enabled.
The CFO is mapped to the executive and finance roles, but the CFO was mapped to the executive role last, which does not have the session counter enabled.
多选题 Which two considerations must you take into account when deploying a Junos Pulse Access Control Service cluster?()
State synchronization occurs only through the internal network interface card (NIC)
Latency of the WAN must be less than 300 ms.
Authenticating endpoints must be on the same LAN segment.
Cluster members must use the same hardware platfor
多选题 You have three classes of users on your network: employee, contractor, and IT administrator. You configure the Junos Pulse Access Control Service to assign roles to each user class and require that a specific wireless SSID be preconfigured for the Odyssey Access Client based on the role. Which configuration method should you use to satisfy this scenario?()
Create a Settings Update file in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under User Roles > Agent > Odyssey Settings > Preconfigured Installer.
Configure a wired adapter and assign the required SSID under User Roles > Agent > Odyssey Settings.
Create a script in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under User Roles > Agent > Odyssey Settings > Preconfigured Installer.
Create a Preconfiguration file in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under User Roles > Agent > Odyssey Settings > Preconfigured Installer.
单选题 An outside vendor is eligible for the guest role and the contractor role when accessing your network, that is secured with the Junos Pulse Access Control Service.What is the default role-mapping behavior?()
The vendor must select a role from a list of eligible roles.
The vendor must select a rule from a list of eligible rules.
The vendor is automatically mapped to the first configured role
The vendor is automatically granted a merged role.
单选题 A customer is trying to decide which 802.1X inner protocol to use on their network. The customer requires that nopasswords be sent across the network in plain text, that the protocol be supported by the Windows native supplicant,and that the protocol supports password changes at Layer 2. Which protocol would meet the customers needs?()
EAP-TLS
EAP-MD5
PAP
EAP-MSCHAPv2
单选题 You have configured Junos Pulse on your Windows desktop and want to verify that the IPsec configuration policy is being pushed down to your workstation upon network authentication and login.Which utility program do you use to see this configuration and where do you find it?()
the Pulse Diagnostics Tool in the File > Tools menu option in the Pulse GUI
the Pulse Diagnostics Tool in the Start > All Programs > Juniper Networks > Junos Pulse menu folder next to the Junos Pulse application
the Pulse Diagnostics Viewer, which you access by simultaneously pressing Ctrl and F2
the Pulse Diagnostics Viewer in the File > Tools menu option in the Pulse GUI
多选题 You want to provide 802.1X access for Windows clients using Junos Pulse as the agent. Which two considerations must you take into account()
Junos Pulse out erauth entication uses EAP-PEAP.
Junos Pulse ou terauth entication uses EAP-TTLS.
Junos Pulse innerauth entication uses EAP-MSCHAP-V2.
Theend point must use thenative Microsoft 802.1X supplicant.
多选题 You have a firewall enforcer receiving resource access policies from a Junos Pulse Access Control Service. You are using Network and Security Manager (NSM) for configuration management on that firewall. The firewall can also be configured using its built-in command-line interface (CLI) or Web-based user interface (WebUI). To avoid conflicting configurations, which two interfaces must you use to configure the firewall enforcer?()
CLI
WebUI
NSM
Junos Pulse Access Control Service
多选题 An authentication realm consists of which three authentication resources?()
Authentication server
Session options
Authentication policy
End-point security policy
Role-mapping rules