Authentication enforcer
Directory server
Captive authentication
Authentication policy
Role-mapping rules
第1题:
A company has completed two acquisitions over the previous year. Each of the acquired companies was allowed to keep its own independent authentication server. The network administrator has been asked to roll out the Junos Pulse Access Control Service to users within the original company along with each of the two acquired organizations.The administrator configures three authentication realms, one for each independent authentication server, and associates them all with a single sign-in policy. All of the client endpoints are running Junos Pulse on their Windows XP desktops.When a user signs in to the Junos Pulse Access Control Service, which statement is correct?()
A. The first authentication realm that was added to the sign-in policy is used by default.
B. The user is allowed to choose the correct authentication realm from a list presented by Junos Pulse.
C. When Junos Pulse is initially installed on the desktop, it must be configured with the correct realm.
D. This is not an allowed configuration; the administrator should configure separate sign-in policies for each realm.
第2题:
A. Modify sign-in policy.
B. Configure role mapping.
C. Assign authentication server.
D. Configure authentication policy.
第3题:
A. Authentication server
B. Session options
C. Authentication policy
D. End-point security policy
E. Role-mapping rules
第4题:
Which three authentication server types are supported for retrieving user attributes used in role- mapping rules?()
第5题:
An authentication realm consists of which three authentication resources?()
第6题:
A. LDAP
B. S/Key
C. TACACS+
D. RADIUS
E. SiteMinder
第7题:
A. Set up a certificate authentication server.
B. Configure the authentication realm to remember certificate information.
C. Configure the authentication realm to use a certificate server for authentication.
D. Configure a role mapping rule requiring certification information to map user to role.
第8题:
A. Authentication enforcer
B. Directory server
C. Captive authentication
D. Authentication policy
E. Role-mapping rules
第9题:
Which security mechanism uses the concept of a realm?()
第10题:
Which action is optional when adding an authentication realm for use on an Infranet Controller? ()