多选题 You administer a network containing SRX Series firewalls. New policy requires that you implement MAG Series devices to provide access control for end users. The policy requires that the SRX Series devices dynamically enforce security policy based on the source IP address of the user. The policy also requires that the users communicate with protected resources using encrypted traffic. Which two statements are true?()
The endpoints can use agentless access.
Encrypted traffic flows between the endpoint and the enforcer.
Encrypted traffic flows between the endpoint and the protected resource
The endpoints can use the Odyssey Access Client.
单选题 Two MAG4610s are running in an active/passive cluster configuration. The system administrator is planning to apply a service package to the cluster.Which process should the administrator follow?()
Perform the upgrade on the active node of the cluster. When completed, the node reboots and then pushes the service package to the passive node automatically.
Perform the upgrade on the passive node of the cluster. When completed, the node reboots and then pushes the service package to the active node automatically.
On the clustering status page, disable the active node. Perform the upgrade on the disabled node. When completed and the node reboots, enable the node on the clustering status page.Repeat the process on the passive node.
On the clustering status page, disable the passive node. Perform the upgrade on the disabled node. When completed and the node reboots, enable the node on the clustering status page.Repeat the process on the active node.
单选题 You want to create a Host Checker policy that looks for a specific antivirus product that is running on your client machines, but the predefined antivirus options do not include the antivirus product version that you use.Which feature should you verify the antivirus product is up to date?()
Enhanced Endpoint Security
DP signatures
Antivirus licensing
Endpoint Security Assessment Plug-in
多选题 Which three authentication resources are grouped within an authentication realm?()
Authentication enforcer
Directory server
Captive authentication
Authentication policy
Role-mapping rules
单选题 You have configured the Odyssey Access Client with a profile which has the "Disable Server Verification" setting cleared.What will be the result if the device certificate on the MAG Series device has expired and the user attempts to authenticate?()
The user will be instructed to call the network administrator.
The user will fail authentication.
The user will be prompted to install a new device certificate on the MAG Series device.
The user will successfully authenticate and have full network access.
多选题 Which three features are supported with the Junos Pulse client?()
third-party RADIUS support
Host Enforcer
Host Checker
IPsec
soft tokens
多选题 You administer a network with Windows-based endpoints that have custom software images. You want to use Host Checker to require that endpoints are running the custom software image.Which two Host Checker policy rules would be used to enforce this requirement?()
Isolate a file name unique to the custom image and create a custom rule-type of File which matches on the file. Select the Required option under the custom rule.
Identify the MAC address unique to network cards installed in PCs with the custom image and create a custom rule-type of MAC Address which matches on the appropriate MAC address.
Select the Required option under the custom rule Identify the IP address unique to the network cards installed in PCs with the custom image and create a custom rule-type of IP Address which matches on the appropriate IP address. Select the Required option under the custom rule.
Isolate or create a unique Windows registry key for the custom image and create a custom rule- type of Registry Setting which matches on the name of the registry key.
多选题 You are configuring an SRX210 as a firewall enforcer that will tunnel IPsec traffic from several Junos Pulse users.Which two parameters must you configure on the SRX210?()
access profile
IKE parameters
tunneled interface
redirect policy
多选题 You want to restrict access to a role based on the client machine from which the user is accessing the network.Which two role restrictions accomplish this goal? ()
user name
password length
certificate
Host Checker
多选题 A customer wants to create a custom Junos Pulse configuration. Which two are required?()
Connection set
Configuration set
Custom installer
Component set