移动端

  • 题王微信公众号

    题王微信公众号

    微信搜“题王网”真题密题、最新资讯、考试攻略、轻松拿下考试

计算机考试 | juniper认证考试

模式切换

0 0 0
我的错题 我的收藏 学习笔记

章节目录

单选题 When using RADIUS as an external authentication method for 802.1X authentication for the Junos Pulse Access Control Service, what must you do to ensure that the RADIUS authentication works properly?()

A

Configure IP helper to forward the authentication requests from the clients to the external RADIUS server

B

Configure the supplicant as anexternal authentication server

C

Configure RADIUS proxy on the realm

D

Specify the correct RADIUS port 389 on the Junos Pulse Access Control Service

单选题 You are validating the configuration of your SRX Series device and see the output shown below. What does this indicate?()

A

The SRX Series device has been configured correctly, the Junos Pulse Access Control Service is reachable on the network, and the SRX Series device is waiting to receive the initial connection from the Junos Pulse Access Control Service.

B

The SRX Series device has confirmed that the Junos Pulse Access Control Service is configured and is reachable on the network, the SRX Series device is waiting to receive the connection from the Junos Pulse Access Control Service, and all that remains to be accomplished is to configure the SRX Series device.

C

The SRX Series device is configured correctly and connected to the Junos Pulse Access Control Service. All that remains to be done to complete the configuration is to configure the SRX Series device on the Junos Pulse Access Control Service.

D

Both the Junos Pulse Access Control Service and the SRX Series device are configured correctly and communicating with each other.

多选题 You are the network administrator for your company. A user is complaining that they are not able to access the network with the Junos Pulse client. You run a packet capture on the network interface to monitor the 802.1X authentication process. You notice that after the EAP- request/identity packet is received, and the supplicant responds with an EAP-response/identity packet, no further communication occurs for several seconds. What are three causes for this behavior? ()

A

The authenticator is not licensed to support Junos Pulse.

B

The authenticator did not receive the EAP-response/identity packet.

C

The authentication server is not receiving the RADIUS packet containing the EAP-response/identity data.

D

The authenticator is sending the request over its loopback interface.

E

The authentication server is sending back a RADIUS response packet, but the authenticator is not forwarding the response back to the supplicant.

单选题 You are configuring captive portal on your SRX Series device for guest user access.When would you use the redirect-traffic all command?()

A

When you want all unauthenticated traffic to be redirected

B

When you want all clear text traffic to be redirected.

C

When you want all authenticated traffic to be redirected.

D

When you want all encrypted traffic to be redirected.

多选题 You want to create a security policy on an SRX240 that redirects unauthenticated users back to the Junos Pulse Access Control Service.Which two steps must you take to accomplish this task?()

A

Configure a captive-portal service that redirects all traffic back to the Junos Pulse Access Control Service.

B

Configure a security policy that references the unified-access-control captive-portal service.

C

Configure a captive-portal service that redirects unauthenticated traffic back to the Junos Pulse Access Control Service.

D

Configure a security policy that references the unified-access-control intranet-controller service.

单选题 You are configuring an active/passive cluster of SRX Series devices as the firewall enforcer on a MAG Series device.Which statement is true?()

A

Multiple Infranet Enforcer instances are created with a single serial number of an SRX Series device defined in each configuration.

B

A single Infranet Enforcer instance is created with both serial numbers of the clustered SRX Series devices defined in the configuration.

C

Multiple Infranet Enforcer instances are created with a single IP address of an SRX Series device defined in each configuration.

D

A single Infranet enforcer instance is created with the VIP of the clustered SRX Series device defined in the configuration.

单选题 What is a Host Enforcer policy?()

A

A policy that is defined on the endpoint that permits or denies inbound or outbound traffic.

B

A policy that is sent to the endpoint that permits or denies inbound or outbound traffic.

C

A policy that is sent to the protected resource that permits or denies inbound or outbound traffic.

D

A policy that is defined on the protected resource that permits or denies inbound or outbound traffic.

单选题 In a Junos Pulse Access Control Service firewall enforcement configuration, what is the purpose of the source IP policy?()

A

to specify the destination addresses to which access is permitted

B

to specify the source address permitted to access the resource

C

to specify the services to which access is permitted

D

to inform the enforcer to expect policy information from the Junos Pulse Access Control Service

首页 上一页 1 2 3 4 5 尾页 /

到第