多选题 Your company has deployed the Junos Pulse Access Control Service. The system administrator notices that the Host Checker policies are not being applied and enforced. You have verified that the controllers configuration is correct.Which two conditions are causing this issue?()
The endpoint is using EAP-PEAP with EAP-GTC as the inner protocol,
The endpoint is using EAP-TTLS with EAP-JUAC as the inner protocol.
The endpoint is using EAP-FAST with EAP-GTC as the inner protocol,
The endpoint is using EAP-PEAP with EAP-JUAC as the inner protocol.
多选题 Your IT director has decided to allow employees to use their laptops at home as well as in the office. You have deployed the Junos Pulse client to allow access to the offices 802.1X-enabled wired network. Your company also has the Junos Pulse Secure Access Service deployed. You want the Junos Pulse client to automatically launch the appropriate access method depending on each users location. Which three are supported to determine the users location?()
MAC address
DNS server
DHCP server
resolve address
endpoint address
单选题 A customer is trying to determine which client to deploy. The customer wants to be able to perform Layer 2 authentication as well as connect to the Junos Pulse Secure Access Service.Which client should the customer deploy?()
Windows native supplicant
Odyssey Access Client
Junos Pulse
Network Connect
单选题 In a Junos Pulse Access Control Service active/active clustered environment, which statement is true about VIPs?()
VIP is not required when using only agentless access for all endpoint platforms.
VIP is not required when using Junos Pulse or Odyssey Access Client for all endpoint platforms.
VIP is not required when using Junos Pulse and agentless access for all endpoint platforms.
VIP is not required when using Odyssey Access Client and agentless access for all endpoint platforms.
多选题 You have a firewall enforcer protecting resources in a data center. A user is experiencing difficulty connecting to a protected resource.Which two elements must exist so the user can access the resource?()
Resource access policy on the MAG Series device
IPsec routing policy on the MAG Series device
General traffic policy blocking access through the firewall enforcer
Auth table entry on the firewall enforcer
单选题 You are installing a new deployment of the Junos Pulse Access Control Service. You have an existing RADIUS server that has a populated user file. You are considering using the RADIUS proxy feature.Which consideration must you take into account?()
Your RADIUS server database must be replicated onto another device for redundancy.
Inner proxy creates a tunnel between the supplicant and the external server.
RADIUS proxy causes the role assignment process to be skipped.
Outer proxy configuration passes authentication data to the external RADIUS server in clear text.
多选题 Which three settings are accessible from the serial console menu on a MAG Series device?()
The ping command
Factory default reset
Personality image
License imports
Admin login credentials
单选题 You are installing a MAG Series device for access control using an SRX Series device as the firewall enforcer. The MAG Series device resides in the same security zone as users. However, the users reside in different subnets and use the SRX Series device as an IP gateway.Which statement is true?()
You must configure a security policy on the SRX Series device to allow traffic to flow from the user devices to the MAG Series device.
No security policy is necessary on the SRX Series device to allow traffic to flow from the user devices to the MAG Series device.
You must configure host-inbound traffic on the SRX Series device to allow SSL traffic between the MAG Series device and the user devices.
You must configure host-inbound traffic on the SRX Series device to allow EAP traffic between the MAG Series device and the user devices.
多选题 You want to customize access to the corporate network so that agentiess users are instructed to obtain a certificatebefore accessing the network.Which two configurations solve this problem? ()
Create a custom sign-in page with specific instructions in the Instructions field.
Create a custom sign-in page with specific Missing Certificate messages in the Custom error messages field.
Create a custom sign-in policy with specific instructions in the Instructions field.
Create a custom sign-in notification and assign it to the Pre-Auth Sign-in Notification in the sign-in policy.
单选题 You are deploying a Junos Pulse Access Control Service cluster in active/passive mode. How do you configure the IP address on the SRX Series devices?()
Configure a single Junos Pulse Access Control Service instance on the enforcer, specifying the VIP as the IP address the instance.
Configure multiple Junos Pulse Access Control Service instances on the enforcer, specifying the specific IP address each device in a separate instance.
Configure a single Junos Pulse Access Control Service instance on the enforcer, specifying the VIP and active node address in the instance.
Configure a single Junos Pulse Access Control Service instance on the enforcer, specifying the VIP and passive node address in the instance.