单选题Which action is optional when adding an authentication realm for use on an Infranet Controller? ()A Modify sign-in policy.B Configure role mapping.C Assign authentication server.D Configure authentication policy.

题目
单选题
Which action is optional when adding an authentication realm for use on an Infranet Controller? ()
A

Modify sign-in policy.

B

Configure role mapping.

C

Assign authentication server.

D

Configure authentication policy.

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

What are three necessary steps for enabling 802.1X access when configuring Layer 2 enforcement?()

A. Configure a location group

B. Createan authentication protocol set

C. Configure the RADIUS AV pair list

D. Configure RADIUS clients

E. Configure role and role-mapping rules


参考答案:A, D, E

第2题:

When using RADIUS as an external authentication method for 802.1X authentication for the Junos Pulse Access Control Service, what must you do to ensure that the RADIUS authentication works properly?()

A. Configure IP helper to forward the authentication requests from the clients to the external RADIUS server

B. Configure the supplicant as anexternal authentication server

C. Configure RADIUS proxy on the realm

D. Specify the correct RADIUS port 389 on the Junos Pulse Access Control Service


参考答案:C

第3题:

An authentication realm consists of which three authentication resources?()

A. Authentication server

B. Session options

C. Authentication policy

D. End-point security policy

E. Role-mapping rules


参考答案:A, C, E

第4题:

Which additional configuration must be completed when setting up role restrictions using certificates? ()

A. Set up a certificate authentication server.

B. Configure the authentication realm to remember certificate information.

C. Configure the authentication realm to use a certificate server for authentication.

D. Configure a role mapping rule requiring certification information to map user to role.


参考答案:B

第5题:

A company has completed two acquisitions over the previous year. Each of the acquired companies was allowed to keep its own independent authentication server. The network administrator has been asked to roll out the Junos Pulse Access Control Service to users within the original company along with each of the two acquired organizations.The administrator configures three authentication realms, one for each independent authentication server, and associates them all with a single sign-in policy. All of the client endpoints are running Junos Pulse on their Windows XP desktops.When a user signs in to the Junos Pulse Access Control Service, which statement is correct?()

A. The first authentication realm that was added to the sign-in policy is used by default.

B. The user is allowed to choose the correct authentication realm from a list presented by Junos Pulse.

C. When Junos Pulse is initially installed on the desktop, it must be configured with the correct realm.

D. This is not an allowed configuration; the administrator should configure separate sign-in policies for each realm.


参考答案:B

第6题:

You want to enforce a Host Checker policy so that only users who pass the policy receive the Employee role. In the admin GUI, which two parameters must you configure?()

A. Select "Require and Enforce" for the Host Checker Policy in the realm authentication policy.

B. Select "Evaluate Policies" for the Host Checker policy in the realm authentication policy.

C. Configure the Host Checker policy as a role restriction for the Employee role.

D. Configure the Host Checker policy as a resource access policy for the Employee role.


参考答案:B, C

第7题:

Which three authentication resources are grouped within an authentication realm?()

A. Authentication enforcer

B. Directory server

C. Captive authentication

D. Authentication policy

E. Role-mapping rules


参考答案:B, D, E

第8题:

What are two steps to configure user authentication for a Junos Pulse Access Control Service?()

A. Configure an authentication policy as part of the user role definitions.

B. Configure a Sign-in Policy.

C. Configure authentication agents as part of the user role definitions

D. Configure an authentication policy as part of the authentication realm definition.


参考答案:B, D

第9题:

Which action is optional when adding an authentication realm for use on an Infranet Controller? ()

A. Modify sign-in policy.

B. Configure role mapping.

C. Assign authentication server.

D. Configure authentication policy.


参考答案:D

第10题:

Which two methods of authentication are used by the Infranet Controller for IPSec enforcement?()

A. dial-up VPN

B. IKE authentication

C. XAuth authentication

D. shared IKE authentication


参考答案:A, C

更多相关问题