By adding two separate connections in the connections dialog box
By adding two separate intranet Controllers under the configuration hierarchy
By adding one intranet Controller and one SA under the configuration hierarchy
By adding two URLs under a connection in the connections dialog box
第1题:
A. By adding two separate connections in the connections dialog box
B. By adding two separate intranet Controllers under the configuration hierarchy
C. By adding one intranet Controller and one SA under the configuration hierarchy
D. By adding two URLs under a connection in the connections dialog box
第2题:
A company has completed two acquisitions over the previous year. Each of the acquired companies was allowed to keep its own independent authentication server. The network administrator has been asked to roll out the Junos Pulse Access Control Service to users within the original company along with each of the two acquired organizations.The administrator configures three authentication realms, one for each independent authentication server, and associates them all with a single sign-in policy. All of the client endpoints are running Junos Pulse on their Windows XP desktops.When a user signs in to the Junos Pulse Access Control Service, which statement is correct?()
A. The first authentication realm that was added to the sign-in policy is used by default.
B. The user is allowed to choose the correct authentication realm from a list presented by Junos Pulse.
C. When Junos Pulse is initially installed on the desktop, it must be configured with the correct realm.
D. This is not an allowed configuration; the administrator should configure separate sign-in policies for each realm.
第3题:
Which Junos Pulse feature allows the user to log in once through a Junos Pulse Secure Access Service on the network and then access resources protected by a Junos Pulse Access Control Service without reauthentication?()
A. Roaming Session
B. Session Migration
C. Location Awareness
D. Persistent Session
第4题:
You want to create a security policy on an SRX240 that redirects unauthenticated users back to the Junos Pulse Access Control Service.Which two steps must you take to accomplish this task?()
第5题:
Which Junos Pulse Access Control Service client provides a built-in viewer to access local logs?()
第6题:
Which three types of policies must you configure to allow remote users transparent access to protected resources using IF-MAP Federation between a Junos Pulse Secure Access Service and a Junos Pulse Access Control Service?()
A. Session-Export policies on the Junos Pulse Secure Access Service
B. Session-Export policies on the Junos Pulse Access Control Service
C. Session-Import policies on the Junos Pulse Secure Access Service
D. Session-Import policies on the Junos Pulse Access Control Service
E. Resource access policies on the Junos Pulse Access Control Service
第7题:
A user calls the help desk and explains that they just purchased a Macintosh computer. When they log into the network, the Odyssey Access Client is not automatically downloaded as it was when the user used their Windows PC.How do you resolve this issue?()
第8题:
A.The SRX Series device has been configured correctly, the Junos Pulse Access Control Service is reachable on the network, and the SRX Series device is waiting to receive the initial connection from the Junos Pulse Access Control Service.
B.The SRX Series device has confirmed that the Junos Pulse Access Control Service is configured and is reachable on the network, the SRX Series device is waiting to receive the connection from the Junos Pulse Access Control Service, and all that remains to be accomplished is to configure the SRX Series device.
C.The SRX Series device is configured correctly and connected to the Junos Pulse Access Control Service. All that remains to be done to complete the configuration is to configure the SRX Series device on the Junos Pulse Access Control Service.
D.Both the Junos Pulse Access Control Service and the SRX Series device are configured correctly and communicating with each other.
第9题:
You have multiple realms configured on a MAG Series device. A user is authenticating with a non- Junos Pulse Access Control Service client. The username does not contain a realm suffix.Which behavior will the user experience?()
第10题:
A customer has purchased a third-party switch to use for Layer 2 access with their Junos Pulse Access Controe Service. When configuring the switch on the Junos Pulse Access Control Service, the customer does not find a make/model entry for it . Which two actions should the customer take to make the switch work with the Junos Pulse Access Control Service?()