题目内容 (请给出正确答案)
[主观题]

You have a Junos Pulse Secure Access Service acting as an IF-MAP client, configured to fed

erate all user roles to a Junos Pulse Access Control Service acting as an IF-MAP Federation server. A remote user using Junos Pulse logs in to the Junos Pulse Secure Access Service; the Junos Pulse Secure Access Service provisions a remote access session for that user.What happens next?()

A. The Junos Pulse Secure Access Service redirects the user to the Junos Pulse Secure Access Service for authentication

B. The Junos Pulse Access Control Service provisions enforcement points to enable resource access for that user.

C. The Junos Pulse Secure Access Service publishes user session and role information to the IF- MAP Federation server,

D. The Junos Pulse Secure Access Service provisions enforcement points to enable resource access for that user.

查看答案
如搜索结果不匹配,请 联系老师 获取答案
您可能会需要:
您的账号:,可能会需要:
您的账号:
发送账号密码至手机
发送
更多“You have a Junos Pulse Secure …”相关的问题

第1题

On the Junos Pulse Access Control Service, you have created a role called Secret that you
only want to provide to users who present a certificate.Using the admin GUI, which two features would you configure to satisfy this requirement?()

A. Sign-in Policy

B. Role Mapping Rule

C. Role Restrictions

D. Trusted Server CA

点击查看答案

第2题

How can you verify that you have correctly configured SSH access to your Junos device?()

A. user@router# show system services

B. user@router> show configuration services

C. user@router# show configuration system services

D. user@router# show system login

点击查看答案

第3题

You are installing a new deployment of the Junos Pulse Access Control Service. In your env
ironment, you have VoIP handsets that support 802.1X authentication with EAP-MD5.Which deployment constraint must you consider?()

A. EAP-MD5 is not supported by the Junos Pulse Access Control Service

B. EAP-MD5 requires passwords to be stored in an encrypted format.

C. EAP-MD5 requires passwords to be stored in a clear text format.

D. EAP-MD5 performs a real time hash of the handset‘s MAC address.

点击查看答案

第4题

You have created a security policy on an SRX240 that permits traffic from any source-addre
ss, any destination-address, and any application. The policy will be a source IP policy for use with the Junos Pulse Access Control Service.What must you add to complete the security policy configuration?()

A. The intranet-auth authentication option

B. The redirect-portal application service

C. The uac-policy application service

D. The ipsec-vpn tunnel

点击查看答案

第5题

Your IT director has decided to allow employees to use their laptops at home as well as in
the office. You have deployed the Junos Pulse client to allow access to the offices 802.1X-enabled wired network. Your company also has the Junos Pulse Secure Access Service deployed. You want the Junos Pulse client to automatically launch the appropriate access method depending on each users location.Which three are supported to determine the users location?()

A. MAC address

B. DNS server

C. DHCP server

D. resolve address

E. endpoint address

点击查看答案

第6题

You have a firewall enforcer receiving resource access policies from a Junos Pulse Access
Control Service. You are using Network and Security Manager (NSM) for configuration management on that firewall. The firewall can also be configured using its built-in command-line interface (CLI) or Web-based user interface (WebUI).To avoid conflicting configurations, which two interfaces must you use to configure the firewall enforcer?()

A. CLI

B. WebUI

C. NSM

D. Junos Pulse Access Control Service

点击查看答案

第7题

You have configured Junos Pulse on your Windows desktop and want to verify that the IPsec
configuration policy is being pushed down to your workstation upon network authentication and login.Which utility program do you use to see this configuration and where do you find it?()

A. the Pulse Diagnostics Tool in the "File" > "Tools" menu option in the Pulse GUI

B. the Pulse Diagnostics Tool in the "Start" > "All Programs" > "Juniper Networks" > "Junos Pulse" menu folder next to the Junos Pulse application

C. the Pulse Diagnostics Viewer, which you access by simultaneously pressing "Ctrl" and "F2"

D. the Pulse Diagnostics Viewer in the "File" > "Tools" menu option in the Pulse GUI

点击查看答案

第8题

You are investigating routing problems on a device running the Junos OS. You receive the e
rror shown in the exhibit when you attempt to restart the routing process.Which statement describes the problem?()

You are investigating routing problems on a device

A. You have typed an invalid command.

B. You must be in configuration mode to restart the routing process.

C. You do not have permission to restart the routing process.

D. You must wait until close of business to restart the routing process, based on user-defined policy.

点击查看答案

第9题

You have three classes of users on your network: employee, contractor, and IT administrato
r. You configure the Junos Pulse Access Control Service to assign roles to each user class and require that a specific wireless SSID be preconfigured for the Odyssey Access Client based on the role.Which configuration method should you use to satisfy this scenario?()

A. Create a "Settings Update file" in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under "User Roles" > "Agent" > "Odyssey Settings" > "Preconfigured Installer".

B. Configure a wired adapter and assign the required SSID under "User Roles" > "Agent" > "Odyssey Settings".

C. Create a script in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under "User Roles" > "Agent" > "Odyssey Settings" > "Preconfigured Installer".

D. Create a "Preconfiguration file" in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under "User Roles" > "Agent" > "Odyssey Settings" > "Preconfigured Installer".

点击查看答案

第10题

Which two statements are true about static routes in the Junos OS?()

A. Static routes are defined at the [edit routing-instances] hierarchy.

B. Static routes must have a next hop defined.

C. Static routes remain in the routing table until you remove them or until they become inactive.

D. Static routes are learned by neighboring devices and added to their routing tables.

点击查看答案
发送账号至手机
密码将被重置
获取验证码
发送
温馨提示
该问题答案仅针对搜题卡用户开放,请点击购买搜题卡。
马上购买搜题卡
我已购买搜题卡, 登录账号 继续查看答案
重置密码
确认修改
温馨提示
每个试题只能免费做一次,如需多次做题,请购买搜题卡
立即购买
稍后再说
警告:系统检测到您的账号存在安全风险

为了保护您的账号安全,请在“赏学吧”公众号进行验证,点击“官网服务”-“账号验证”后输入验证码“”完成验证,验证成功后方可继续查看答案!

微信搜一搜
赏学吧
点击打开微信
警告:系统检测到您的账号存在安全风险
抱歉,您的账号因涉嫌违反赏学吧购买须知被冻结。您可在“赏学吧”微信公众号中的“官网服务”-“账号解封申请”申请解封,或联系客服
微信搜一搜
赏学吧
点击打开微信