Your IT director has decided to allow employees to use their laptops at home as well as in the office. You have deployed the Junos Pulse client to allow access to the offices 802.1X-enabled wired network. Your company also has the Junos Pulse Secure Acces

题目

Your IT director has decided to allow employees to use their laptops at home as well as in the office. You have deployed the Junos Pulse client to allow access to the offices 802.1X-enabled wired network. Your company also has the Junos Pulse Secure Access Service deployed. You want the Junos Pulse client to automatically launch the appropriate access method depending on each users location. Which three are supported to determine the users location?()

  • A、MAC address
  • B、DNS server
  • C、DHCP server
  • D、resolve address
  • E、endpoint address
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

You are validating the configuration of your SRX Series device and see the output shown below.What does this indicate?()

A.The SRX Series device has been configured correctly, the Junos Pulse Access Control Service is reachable on the network, and the SRX Series device is waiting to receive the initial connection from the Junos Pulse Access Control Service.

B.The SRX Series device has confirmed that the Junos Pulse Access Control Service is configured and is reachable on the network, the SRX Series device is waiting to receive the connection from the Junos Pulse Access Control Service, and all that remains to be accomplished is to configure the SRX Series device.

C.The SRX Series device is configured correctly and connected to the Junos Pulse Access Control Service. All that remains to be done to complete the configuration is to configure the SRX Series device on the Junos Pulse Access Control Service.

D.Both the Junos Pulse Access Control Service and the SRX Series device are configured correctly and communicating with each other.


参考答案:D

第2题:

You want to provide 802.1X access for Windows clients using Junos Pulse as the agent. Which two considerations must you take into account()

A.Junos Pulse out erauth entication uses EAP-PEAP.

B.Junos Pulse ou terauth entication uses EAP-TTLS.

C.Junos Pulse innerauth entication uses EAP-MSCHAP-V2.

D.Theend point must use thenative Microsoft 802.1X supplicant.


参考答案:B, D

第3题:

Which Junos Pulse feature allows the user to log in once through a Junos Pulse Secure Access Service on the network and then access resources protected by a Junos Pulse Access Control Service without reauthentication?()

A. Roaming Session

B. Session Migration

C. Location Awareness

D. Persistent Session


参考答案:B

第4题:

Which three types of policies must you configure to allow remote users transparent access to protected resources using IF-MAP Federation between a Junos Pulse Secure Access Service and a Junos Pulse Access Control Service?()

A. Session-Export policies on the Junos Pulse Secure Access Service

B. Session-Export policies on the Junos Pulse Access Control Service

C. Session-Import policies on the Junos Pulse Secure Access Service

D. Session-Import policies on the Junos Pulse Access Control Service

E. Resource access policies on the Junos Pulse Access Control Service


参考答案:A, D, E

第5题:

You have configured Junos Pulse on your Windows desktop and want to verify that the IPsec configuration policy is being pushed down to your workstation upon network authentication and login.Which utility program do you use to see this configuration and where do you find it?()

A. the Pulse Diagnostics Tool in the "File" > "Tools" menu option in the Pulse GUI

B. the Pulse Diagnostics Tool in the "Start" > "All Programs" > "Juniper Networks" > "Junos Pulse" menu folder next to the Junos Pulse application

C. the Pulse Diagnostics Viewer, which you access by simultaneously pressing "Ctrl" and "F2"

D. the Pulse Diagnostics Viewer in the "File" > "Tools" menu option in the Pulse GUI


参考答案:C

第6题:

You have a firewall enforcer receiving resource access policies from a Junos Pulse Access Control Service. You are using Network and Security Manager (NSM) for configuration management on that firewall. The firewall can also be configured using its built-in command-line interface (CLI) or Web-based user interface (WebUI).To avoid conflicting configurations, which two interfaces must you use to configure the firewall enforcer?()

A. CLI

B. WebUI

C. NSM

D. Junos Pulse Access Control Service


参考答案:C, D

第7题:

How would an end user add both a Junos Pulse Access Control Service URL and a Junos Pulse Secure Access Service URL to the same Junos Pulse client?()

A. By adding two separate connections in the connections dialog box

B. By adding two separate intranet Controllers under the configuration hierarchy

C. By adding one intranet Controller and one SA under the configuration hierarchy

D. By adding two URLs under a connection in the connections dialog box


参考答案:A

第8题:

Your IT director has decided to allow employees to use their laptops at home as well as in the office. You have deployed the Junos Pulse client to allow access to the offices 802.1X-enabled wired network. Your company also has the Junos Pulse Secure Access Service deployed. You want the Junos Pulse client to automatically launch the appropriate access method depending on each users location.Which three are supported to determine the users location?()

A. MAC address

B. DNS server

C. DHCP server

D. resolve address

E. endpoint address


参考答案:B, D, E

第9题:

A customer is trying to determine which client to deploy. The customer wants to be able to perform Layer 2 authentication as well as connect to the Junos Pulse Secure Access Service.Which client should the customer deploy?()

A. Windows native supplicant

B. Odyssey Access Client

C. Junos Pulse

D. Network Connect


参考答案:C

第10题:

A company has completed two acquisitions over the previous year. Each of the acquired companies was allowed to keep its own independent authentication server. The network administrator has been asked to roll out the Junos Pulse Access Control Service to users within the original company along with each of the two acquired organizations.The administrator configures three authentication realms, one for each independent authentication server, and associates them all with a single sign-in policy. All of the client endpoints are running Junos Pulse on their Windows XP desktops.When a user signs in to the Junos Pulse Access Control Service, which statement is correct?()

A. The first authentication realm that was added to the sign-in policy is used by default.

B. The user is allowed to choose the correct authentication realm from a list presented by Junos Pulse.

C. When Junos Pulse is initially installed on the desktop, it must be configured with the correct realm.

D. This is not an allowed configuration; the administrator should configure separate sign-in policies for each realm.


参考答案:B

更多相关问题