When configuring resource access policies in a Junos Pulse A

题目
单选题
When configuring resource access policies in a Junos Pulse Access Control Service device, which entry is permitted when defining the specific resources?()
A

Hostname

B

fully qualified domain name

C

IP address

D

address book entry

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

End users want to map a network drive on their PCs when they are connected to the Junos Pulse Access Control Service. The mapped drive must be removed when users disconnect their session.Which feature addresses this requirement?()

A. agent session scripts

B. preconfiguration installer

C. Junos Pulse component set

D. agent actions


参考答案:A

第2题:

When configuring resource access policies in a Junos Pulse Access Control Service device, which entry is permitted when defining the specific resources?()

A. Hostname

B. fully qualified domain name

C. IP address

D. address book entry


参考答案:C

第3题:

Which Junos Pulse feature allows the user to log in once through a Junos Pulse Secure Access Service on the network and then access resources protected by a Junos Pulse Access Control Service without reauthentication?()

A. Roaming Session

B. Session Migration

C. Location Awareness

D. Persistent Session


参考答案:B

第4题:

A company has completed two acquisitions over the previous year. Each of the acquired companies was allowed to keep its own independent authentication server. The network administrator has been asked to roll out the Junos Pulse Access Control Service to users within the original company along with each of the two acquired organizations.The administrator configures three authentication realms, one for each independent authentication server, and associates them all with a single sign-in policy. All of the client endpoints are running Junos Pulse on their Windows XP desktops. When a user signs in to the Junos Pulse Access Control Service, which statement is correct?()

  • A、The first authentication realm that was added to the sign-in policy is used by default.
  • B、The user is allowed to choose the correct authentication realm from a list presented by Junos Pulse.
  • C、When Junos Pulse is initially installed on the desktop, it must be configured with the correct realm.
  • D、This is not an allowed configuration; the administrator should configure separate sign-in policies for each realm.

正确答案:B

第5题:

Which three types of policies must you configure to allow remote users transparent access to protected resources using IF-MAP Federation between a Junos Pulse Secure Access Service and a Junos Pulse Access Control Service?()

A. Session-Export policies on the Junos Pulse Secure Access Service

B. Session-Export policies on the Junos Pulse Access Control Service

C. Session-Import policies on the Junos Pulse Secure Access Service

D. Session-Import policies on the Junos Pulse Access Control Service

E. Resource access policies on the Junos Pulse Access Control Service


参考答案:A, D, E

第6题:

You have a firewall enforcer receiving resource access policies from a Junos Pulse Access Control Service. You are using Network and Security Manager (NSM) for configuration management on that firewall. The firewall can also be configured using its built-in command-line interface (CLI) or Web-based user interface (WebUI).To avoid conflicting configurations, which two interfaces must you use to configure the firewall enforcer?()

A. CLI

B. WebUI

C. NSM

D. Junos Pulse Access Control Service


参考答案:C, D

第7题:

A customer has purchased a new Junos Pulse Access Control Service and wants to install it in an existing cluster.After initial configuration, the customer finds that the firmware version running on the Junos Pulse Access Control Service is 4.1 r5, but the existing cluster is running firmware version 4.1 r3.Which two actions must be performed to allow the new Junos Pulse Access Control Service to load the older version of firmware?()

A. Install a valid license on the new Junos Pulse Access Control Service.

B. When loading the older firmware, delete all the existing data on the Junos Pulse Access Control Service.

C. Add the new Junos Pulse Access Control Service to the existing cluster.

D. Download the 4.1 r3 version firmware from the Juniper support website.


参考答案:B, D

第8题:

You notice that during peak hours, some firewall enforcers contain a high number of auth table entries. As you investigate the issue, you discover that all users are getting auth table mappings to all firewalls, which is not acceptable.What should you do on the Junos Pulse Access Control Service to resolve this problem?()

A. Delete the default auth table mapping policy

B. Create auth table mapping policies that route users to specific resources

C. Create Resource Access policies that permit access to specific resources

D. Create Source Interface policies that route users to specific resources


参考答案:A

第9题:

A site administrator is configuring Resource-level access control.  Which of the following statements about Resource-level access control are true? Resource-level access control policies:()

  • A、are optional
  • B、are used to protect data beans
  • C、provide coarse-grained access control
  • D、never specify a relationship

正确答案:A,B

第10题:

End users want to map a network drive on their PCs when they are connected to the Junos Pulse Access Control Service. The mapped drive must be removed when users disconnect their session.Which feature addresses this requirement?()

  • A、agent session scripts
  • B、preconfiguration installer
  • C、Junos Pulse component set
  • D、agent actions

正确答案:A

更多相关问题