移动端

  • 题王微信公众号

    题王微信公众号

    微信搜“题王网”真题密题、最新资讯、考试攻略、轻松拿下考试

计算机考试 | juniper认证考试

模式切换

0 0 0
我的错题 我的收藏 学习笔记

章节目录

单选题 Two MAG4610s are running in an active/passive cluster configuration. The system administrator is planning to apply a service package to the cluster.Which process should the administrator follow?()

A

Perform the upgrade on the active node of the cluster. When completed, the node reboots and then pushes the service package to the passive node automatically.

B

Perform the upgrade on the passive node of the cluster. When completed, the node reboots and then pushes the service package to the active node automatically.

C

On the clustering status page, disable the active node. Perform the upgrade on the disabled node. When completed and the node reboots, enable the node on the clustering status page.Repeat the process on the passive node.

D

On the clustering status page, disable the passive node. Perform the upgrade on the disabled node. When completed and the node reboots, enable the node on the clustering status page.Repeat the process on the active node.

多选题 Which three authentication resources are grouped within an authentication realm?()

A

Authentication enforcer

B

Directory server

C

Captive authentication

D

Authentication policy

E

Role-mapping rules

单选题 You have configured the Odyssey Access Client with a profile which has the "Disable Server Verification" setting cleared.What will be the result if the device certificate on the MAG Series device has expired and the user attempts to authenticate?()

A

The user will be instructed to call the network administrator.

B

The user will fail authentication.

C

The user will be prompted to install a new device certificate on the MAG Series device.

D

The user will successfully authenticate and have full network access.

多选题 Which three features are supported with the Junos Pulse client?()

A

third-party RADIUS support

B

Host Enforcer

C

Host Checker

D

IPsec

E

soft tokens

多选题 You administer a network with Windows-based endpoints that have custom software images. You want to use Host Checker to require that endpoints are running the custom software image.Which two Host Checker policy rules would be used to enforce this requirement?()

A

Isolate a file name unique to the custom image and create a custom rule-type of File which matches on the file. Select the Required option under the custom rule.

B

Identify the MAC address unique to network cards installed in PCs with the custom image and create a custom rule-type of MAC Address which matches on the appropriate MAC address.

C

Select the Required option under the custom rule Identify the IP address unique to the network cards installed in PCs with the custom image and create a custom rule-type of IP Address which matches on the appropriate IP address. Select the Required option under the custom rule.

D

Isolate or create a unique Windows registry key for the custom image and create a custom rule- type of Registry Setting which matches on the name of the registry key.

多选题 A customer wants to create a custom Junos Pulse configuration. Which two are required?()

A

Connection set

B

Configuration set

C

Custom installer

D

Component set

首页 上一页 1 2 3 4 5 下一页 尾页 /

到第