移动端

  • 题王微信公众号

    微信搜“题王网”真题密题、最新资讯、考试攻略、轻松拿下考试

计算机考试 | juniper认证考试

模式切换

0 0 0
我的错题 我的收藏 学习笔记

章节目录

多选题 Which three settings are accessible from the serial console menu on a MAG Series device?()

A

The ping command

B

Factory default reset

C

Personality image

D

License imports

E

Admin login credentials

单选题 In a Junos Pulse Access Control Service active/active clustered environment, which statement is true about VIPs?()

A

VIP is not required when using only agentless access for all endpoint platforms.

B

VIP is not required when using Junos Pulse or Odyssey Access Client for all endpoint platforms.

C

VIP is not required when using Junos Pulse and agentless access for all endpoint platforms.

D

VIP is not required when using Odyssey Access Client and agentless access for all endpoint platforms.

多选题 You have a firewall enforcer protecting resources in a data center. A user is experiencing difficulty connecting to a protected resource.Which two elements must exist so the user can access the resource?()

A

Resource access policy on the MAG Series device

B

IPsec routing policy on the MAG Series device

C

General traffic policy blocking access through the firewall enforcer

D

Auth table entry on the firewall enforcer

单选题 What is a type of firewall enforcer supported by the Junos Pulse Access Control Service?()

A

Checkpoint firewall

B

SRX Series device

C

DP sensor

D

MX Series device

多选题 You want to customize access to the corporate network so that agentiess users are instructed to obtain a certificatebefore accessing the network.Which two configurations solve this problem? ()

A

Create a custom sign-in page with specific instructions in the Instructions field.

B

Create a custom sign-in page with specific Missing Certificate messages in the Custom error messages field.

C

Create a custom sign-in policy with specific instructions in the Instructions field.

D

Create a custom sign-in notification and assign it to the Pre-Auth Sign-in Notification in the sign-in policy.

单选题 You are installing a MAG Series device for access control using an SRX Series device as the firewall enforcer. The MAG Series device resides in the same security zone as users. However, the users reside in different subnets and use the SRX Series device as an IP gateway.Which statement is true?()

A

You must configure a security policy on the SRX Series device to allow traffic to flow from the user devices to the MAG Series device.

B

No security policy is necessary on the SRX Series device to allow traffic to flow from the user devices to the MAG Series device.

C

You must configure host-inbound traffic on the SRX Series device to allow SSL traffic between the MAG Series device and the user devices.

D

You must configure host-inbound traffic on the SRX Series device to allow EAP traffic between the MAG Series device and the user devices.

单选题 You are deploying a Junos Pulse Access Control Service cluster in active/passive mode. How do you configure the IP address on the SRX Series devices?()

A

Configure a single Junos Pulse Access Control Service instance on the enforcer, specifying the VIP as the IP address the instance.

B

Configure multiple Junos Pulse Access Control Service instances on the enforcer, specifying the specific IP address each device in a separate instance.

C

Configure a single Junos Pulse Access Control Service instance on the enforcer, specifying the VIP and active node address in the instance.

D

Configure a single Junos Pulse Access Control Service instance on the enforcer, specifying the VIP and passive node address in the instance.

多选题 What are three default role-mapping rule values that are available for all realms?()

A

Username

B

LDAP user

C

Certificate

D

Custom expressions

E

Source y IP

单选题 A system administrator wants to configure 802.1X on an Ethernet switch to enable access to specific parts of the network based on group memberships.How can the administrator accomplish this goal?()

A

Configure roles based on departments and assign access based on source IP address.

B

Configure roles based on the user's manager and assign access based on the user's MAC address

C

Configure roles based on group memberships and assign a specific VLAN to the role.

D

Configure roles based on RADIUS request attribute and assign a specific VLAN to the role.

1 2 3 4 5 下一页 尾页 /

到第