What are two benefits of integrating Junos Pulse Access Cont

题目
多选题
What are two benefits of integrating Junos Pulse Access Control Service with Security Threat Response Manager (STRM)?()
A

The ability to detect and prevent malicious traffic.

B

The ability to associate security breaches with a specific user.

C

Converged management of network and security events, network flow data, and identity information.

D

Consistent device management across administrative realms.

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

What are two features provided by the Junos Pulse client?()

A. 802.1X

B. video messaging

C. IPsec

D. VoIP


参考答案:B, D

第2题:

What are three benefits of IF-MAP Federation?()

A. Enables seamless access for remote access users to firewall enforcer protected resources.

B. Scales a Junos Pulse Access control Service deployment beyond the capacity of a single cluster.

C. Enables dynamic configuration synchronization across multiple MAG Series devices.

D. Provides a substitute for WAN clustering among geographically separated MAG Series devices.

E. Shares non-localized DP integration and IPsec configuration information between multiple Junos Pulse Access Control Service instances.


参考答案:A, B, E

第3题:

Which Junos Pulse feature allows the user to log in once through a Junos Pulse Secure Access Service on the network and then access resources protected by a Junos Pulse Access Control Service without reauthentication?()

A. Roaming Session

B. Session Migration

C. Location Awareness

D. Persistent Session


参考答案:B

第4题:

How would an end user add both a Junos Pulse Access Control Service URL and a Junos Pulse Secure Access Service URL to the same Junos Pulse client?()

  • A、By adding two separate connections in the connections dialog box
  • B、By adding two separate intranet Controllers under the configuration hierarchy
  • C、By adding one intranet Controller and one SA under the configuration hierarchy
  • D、By adding two URLs under a connection in the connections dialog box

正确答案:A

第5题:

In a Junos Pulse Access Control Service firewall enforcement configuration, what is the purpose of the source IP policy?()

  • A、to specify the destination addresses to which access is permitted
  • B、to specify the source address permitted to access the resource
  • C、to specify the services to which access is permitted
  • D、to inform the enforcer to expect policy information from the Junos Pulse Access Control Service

正确答案:D

第6题:

Which three types of policies must you configure to allow remote users transparent access to protected resources using IF-MAP Federation between a Junos Pulse Secure Access Service and a Junos Pulse Access Control Service?()

A. Session-Export policies on the Junos Pulse Secure Access Service

B. Session-Export policies on the Junos Pulse Access Control Service

C. Session-Import policies on the Junos Pulse Secure Access Service

D. Session-Import policies on the Junos Pulse Access Control Service

E. Resource access policies on the Junos Pulse Access Control Service


参考答案:A, D, E

第7题:

What are two benefits of integrating Junos Pulse Access Control Service with Security Threat Response Manager (STRM)?()

  • A、The ability to detect and prevent malicious traffic.
  • B、The ability to associate security breaches with a specific user.
  • C、Converged management of network and security events, network flow data, and identity information.
  • D、Consistent device management across administrative realms.

正确答案:B,C

第8题:

You want to provide 802.1X access for Windows clients using Junos Pulse as the agent. Which two considerations must you take into account()

A.Junos Pulse out erauth entication uses EAP-PEAP.

B.Junos Pulse ou terauth entication uses EAP-TTLS.

C.Junos Pulse innerauth entication uses EAP-MSCHAP-V2.

D.Theend point must use thenative Microsoft 802.1X supplicant.


参考答案:B, D

第9题:

Which Junos Pulse feature allows the user to log in once through a Junos Pulse Secure Access Service on the network and then access resources protected by a Junos Pulse Access Control Service without reauthentication?()

  • A、Roaming Session
  • B、Session Migration
  • C、Location Awareness
  • D、Persistent Session

正确答案:B

第10题:

What are three elements the Junos Pulse Access Control Service uses to establish endpoint access to protected resources?()

  • A、sign-in policy
  • B、authentication realms
  • C、role restrictions
  • D、policy realms
  • E、routing policy

正确答案:A,B,C

更多相关问题