Junos Pulse out erauth entication uses EAP-PEAP.
Junos Pulse ou terauth entication uses EAP-TTLS.
Junos Pulse innerauth entication uses EAP-MSCHAP-V2.
Theend point must use thenative Microsoft 802.1X supplicant.
第1题:
A. Configure IP helper to forward the authentication requests from the clients to the external RADIUS server
B. Configure the supplicant as anexternal authentication server
C. Configure RADIUS proxy on the realm
D. Specify the correct RADIUS port 389 on the Junos Pulse Access Control Service
第2题:
What are two indicators that a customer should consider the installation of a Wireless LAN Controller? ()
第3题:
You must configure access to the corporate network for employees using a client access method. Users require IPsec tunneling to protected resources and an 802.1X supplicant. Users will access the network using Windows platforms.Which two client access methods would support these requirements?()
A. Junos Pulse
B. Java Agent
C. Odyssey Access Client
D. Native 802.1X supplicant
第4题:
You have an Active Directory domain named contoso.com.You have an Exchange Server 2010 organization that contains a Client Access server named CAS1.Users connect to CAS1 from the Internet by using mail.contoso.com.The organization contains the following mobile clients: (1)Windows Mobile 5.0 (2)Windows Mobile 6.1 (3)Windows Mobile 6.5 You plan to install a certificate on CAS1.You need to ensure that all clients can connect to CAS1 from the Internet by using Exchange ActiveSync.Which name should you include in the certificate?()
第5题:
You are charged with implementing a secure wireless installation which will provide Internet access to client devices but will not allow communications between wireless clients. In addition toimplementing PSPF or peer-to-peer blocking on the wireless side. Which of the following actionsshould you perform on the wired infrastructure?()
第6题:
A.Junos Pulse out erauth entication uses EAP-PEAP.
B.Junos Pulse ou terauth entication uses EAP-TTLS.
C.Junos Pulse innerauth entication uses EAP-MSCHAP-V2.
D.Theend point must use thenative Microsoft 802.1X supplicant.
第7题:
You are using ADU and are authenticated and associated to an access point. However, you areunable to obtain an IP address. Which of these has caused this problem?()
第8题:
On the Junos Pulse Access Control Service, you have created a role called Secret that you only want to provide to users who present a certificate.Using the admin GUI, which two features would you configure to satisfy this requirement?()
A. Sign-in Policy
B. Role Mapping Rule
C. Role Restrictions
D. Trusted Server CA
第9题:
You are charged with implementing a secure wireless installation which will provide Internet access to clientdevices but will not allow communications between wireless clients. In addition to implementing PSPF orpeer-to-peer blocking on the wireless side. Which of the following actions should you perform on the wiredinfrastructure?()
第10题:
Your company has deployed Network Access Protection (NAP).You configure secure wireless access to the network by using 802.1X authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP. What should you do?()