You must configure a security policy on the SRX Series device to allow traffic to flow from the user devices to the MAG Series device.
No security policy is necessary on the SRX Series device to allow traffic to flow from the user devices to the MAG Series device.
You must configure host-inbound traffic on the SRX Series device to allow SSL traffic between the MAG Series device and the user devices.
You must configure host-inbound traffic on the SRX Series device to allow EAP traffic between the MAG Series device and the user devices.
第1题:
A. Routing
B. MPLS VPNs
C. Access control
D. Intrusion detection
第2题:
A.OpenSSL
B.OpenSSH
C.OpenLDAP
D.OpenRADIUS
第3题:
A. The cluster VIP is defined on the MAG4610 cluster, and the VIP of the cluster is defined as an instance on the SRX Series device.
B. The cluster VIP is not defined on the MAG4610 cluster, and the IP address of both the active and passive nodes of the cluster are defined as separate instances on the SRX Series device.
C. The cluster VIP is defined on the MAG4610 cluster, and the IP address of the active node is defined as an instance on the SRX Series device.
D. The cluster VIP is not defined on the MAG4610 cluster, and the IP address of the passive node is defined as an instance on the SRX Series device.
第4题:
You are configuring an active/passive cluster of SRX Series devices as the firewall enforcer on a MAG Series device.Which statement is true?()
第5题:
You have a firewall enforcer protecting resources in a data center. A user is experiencing difficulty connecting to a protected resource.Which two elements must exist so the user can access the resource?()
A. Resource access policy on the MAG Series device
B. IPsec routing policy on the MAG Series device
C. General traffic policy blocking access through the firewall enforcer
D. Auth table entry on the firewall enforcer
第6题:
A. Remote Debugging
B. System Snapshot
C. User Access logs
D. Policy Tracing
第7题:
A. Enables seamless access for remote access users to firewall enforcer protected resources.
B. Scales a Junos Pulse Access control Service deployment beyond the capacity of a single cluster.
C. Enables dynamic configuration synchronization across multiple MAG Series devices.
D. Provides a substitute for WAN clustering among geographically separated MAG Series devices.
E. Shares non-localized DP integration and IPsec configuration information between multiple Junos Pulse Access Control Service instances.
第8题:
You are installing a MAG Series device for access control using an SRX Series device as the firewall enforcer. The MAG Series device resides in the same security zone as users. However, the users reside in different subnets and use the SRX Series device as an IP gateway.Which statement is true?()
A. You must configure a security policy on the SRX Series device to allow traffic to flow from the user devices to the MAG Series device.
B. No security policy is necessary on the SRX Series device to allow traffic to flow from the user devices to the MAG Series device.
C. You must configure host-inbound traffic on the SRX Series device to allow SSL traffic between the MAG Series device and the user devices.
D. You must configure host-inbound traffic on the SRX Series device to allow EAP traffic between the MAG Series device and the user devices.
第9题:
A. Checkpoint firewall
B. SRX Series device
C. DP sensor
D. MX Series device
第10题:
You have configured the Odyssey Access Client with a profile which has the "Disable Server Verification" setting cleared.What will be the result if the device certificate on the MAG Series device has expired and the user attempts to authenticate?()