移动端

  • 题王微信公众号

    微信搜“题王网”真题密题、最新资讯、考试攻略、轻松拿下考试

计算机考试 | juniper认证考试

模式切换

0 0 0
我的错题 我的收藏 学习笔记

章节目录

多选题 Your company has deployed the Junos Pulse Access Control Service. The system administrator notices that the Host Checker policies are not being applied and enforced. You have verified that the controllers configuration is correct.Which two conditions are causing this issue?()

A

The endpoint is using EAP-PEAP with EAP-GTC as the inner protocol,

B

The endpoint is using EAP-TTLS with EAP-JUAC as the inner protocol.

C

The endpoint is using EAP-FAST with EAP-GTC as the inner protocol,

D

The endpoint is using EAP-PEAP with EAP-JUAC as the inner protocol.

单选题 In a Junos Pulse Access Control Service active/active clustered environment, which statement is true about VIPs?()

A

VIP is not required when using only agentless access for all endpoint platforms.

B

VIP is not required when using Junos Pulse or Odyssey Access Client for all endpoint platforms.

C

VIP is not required when using Junos Pulse and agentless access for all endpoint platforms.

D

VIP is not required when using Odyssey Access Client and agentless access for all endpoint platforms.

多选题 You have a firewall enforcer protecting resources in a data center. A user is experiencing difficulty connecting to a protected resource.Which two elements must exist so the user can access the resource?()

A

Resource access policy on the MAG Series device

B

IPsec routing policy on the MAG Series device

C

General traffic policy blocking access through the firewall enforcer

D

Auth table entry on the firewall enforcer

单选题 You are installing a new deployment of the Junos Pulse Access Control Service. You have an existing RADIUS server that has a populated user file. You are considering using the RADIUS proxy feature.Which consideration must you take into account?()

A

Your RADIUS server database must be replicated onto another device for redundancy.

B

Inner proxy creates a tunnel between the supplicant and the external server.

C

RADIUS proxy causes the role assignment process to be skipped.

D

Outer proxy configuration passes authentication data to the external RADIUS server in clear text.

多选题 Which three settings are accessible from the serial console menu on a MAG Series device?()

A

The ping command

B

Factory default reset

C

Personality image

D

License imports

E

Admin login credentials

单选题 You are installing a MAG Series device for access control using an SRX Series device as the firewall enforcer. The MAG Series device resides in the same security zone as users. However, the users reside in different subnets and use the SRX Series device as an IP gateway.Which statement is true?()

A

You must configure a security policy on the SRX Series device to allow traffic to flow from the user devices to the MAG Series device.

B

No security policy is necessary on the SRX Series device to allow traffic to flow from the user devices to the MAG Series device.

C

You must configure host-inbound traffic on the SRX Series device to allow SSL traffic between the MAG Series device and the user devices.

D

You must configure host-inbound traffic on the SRX Series device to allow EAP traffic between the MAG Series device and the user devices.

多选题 You want to customize access to the corporate network so that agentiess users are instructed to obtain a certificatebefore accessing the network.Which two configurations solve this problem? ()

A

Create a custom sign-in page with specific instructions in the Instructions field.

B

Create a custom sign-in page with specific Missing Certificate messages in the Custom error messages field.

C

Create a custom sign-in policy with specific instructions in the Instructions field.

D

Create a custom sign-in notification and assign it to the Pre-Auth Sign-in Notification in the sign-in policy.

单选题 You are deploying a Junos Pulse Access Control Service cluster in active/passive mode. How do you configure the IP address on the SRX Series devices?()

A

Configure a single Junos Pulse Access Control Service instance on the enforcer, specifying the VIP as the IP address the instance.

B

Configure multiple Junos Pulse Access Control Service instances on the enforcer, specifying the specific IP address each device in a separate instance.

C

Configure a single Junos Pulse Access Control Service instance on the enforcer, specifying the VIP and active node address in the instance.

D

Configure a single Junos Pulse Access Control Service instance on the enforcer, specifying the VIP and passive node address in the instance.

1 2 3 4 5 下一页 尾页 /

到第