多选题You are configuring an SRX210 as a firewall enforcer that will tunnel IPsec traffic from several Junos Pulse users.Which two parameters must you configure on the SRX210?()Aaccess profileBIKE parametersCtunneled interfaceDredirect policy

题目
多选题
You are configuring an SRX210 as a firewall enforcer that will tunnel IPsec traffic from several Junos Pulse users.Which two parameters must you configure on the SRX210?()
A

access profile

B

IKE parameters

C

tunneled interface

D

redirect policy

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

You have a firewall enforcer receiving resource access policies from a Junos Pulse Access Control Service. You are using Network and Security Manager (NSM) for configuration management on that firewall. The firewall can also be configured using its built-in command-line interface (CLI) or Web-based user interface (WebUI).To avoid conflicting configurations, which two interfaces must you use to configure the firewall enforcer?()

A. CLI

B. WebUI

C. NSM

D. Junos Pulse Access Control Service


参考答案:C, D

第2题:

You have a firewall enforcer protecting sensitive internal resources in a data center. The network traversed by endpoint traffic is semi-trusted, so you need to encrypt the traffic between the endpoints accessing the resources and the firewall enforcer.Which type of policies provide this level of protection?()

A. resource access policies

B. Host Enforcer policies

C. source IP enforcement policies

D. IPsec enforcement policies


参考答案:D

第3题:

You are configuring an SRX210 as a firewall enforcer that will tunnel IPsec traffic from several Junos Pulse users.Which two parameters must you configure on the SRX210?()

A. access profile

B. IKE parameters

C. tunneled interface

D. redirect policy


参考答案:A, B

第4题:

Which statement is correct about defining an Infranet Enforcer for use as a RADIUS Client? ()

  • A、You do not need to configure a RADIUS client policy.
  • B、You must know the exact model number of the Infranet Enforcer.
  • C、You must specify the NACN password of the device in the RADIUS client policy.
  • D、You do not need to designate a location group to which the Infranet Enforcer will belong.

正确答案:A

第5题:

You have a firewall enforcer protecting resources in a data center. A user is experiencing difficulty connecting to a protected resource.Which two elements must exist so the user can access the resource?()

A. Resource access policy on the MAG Series device

B. IPsec routing policy on the MAG Series device

C. General traffic policy blocking access through the firewall enforcer

D. Auth table entry on the firewall enforcer


参考答案:A, D

第6题:

You have created a security policy on an SRX240 that permits traffic from any source-address, any destination-address, and any application. The policy will be a source IP policy for use with the Junos Pulse Access Control Service.What must you add to complete the security policy configuration?()

A. The intranet-auth authentication option

B. The redirect-portal application service

C. The uac-policy application service

D. The ipsec-vpn tunnel


参考答案:C

第7题:

A user is successfully authenticating to the network but is unable to access protected resources behind a ScreenOS enforcer. You log in to the ScreenOS enforcer and issue the command get auth table infranet and you do not see the user listed.Which two event log settings on the Junos Pulse Access Control Service must you enable to troubleshootthis issue?()

A. Connection Requests

B. System Errors

C. Enforcer Events

D. Enforcer Command Trace


参考答案:C, D

第8题:

In a Junos Pulse Access Control Service firewall enforcement configuration, what is the purpose of the source IP policy?()

A. to specify the destination addresses to which access is permitted

B. to specify the source address permitted to access the resource

C. to specify the services to which access is permitted

D. to inform the enforcer to expect policy information from the Junos Pulse Access Control Service


参考答案:D

第9题:

You need to configure a GRE tunnel on a IPSec router. When you are using the SDM to configurea GRE tunnel over IPsec, which two parameters are required when defining the tunnel interfaceinformation?()

  • A、The crypto ACL number
  • B、The IPSEC mode (tunnel or transport)
  • C、The GRE tunnel interface IP address
  • D、The GRE tunnel source interface or IP address, and tunnel destination IP address
  • E、The MTU size of the GRE tunnel interface

正确答案:C,D

第10题:

A policy-based IPsec VPN is ideal for which scenario?()

  • A、when you want to conserve tunnel resources
  • B、when the remote peer is a dialup or remote access client
  • C、when you want to configure a tunnel policy with an action of deny
  • D、when a dynamic routing protocol such as OSPF must be sent across the VPN

正确答案:B

更多相关问题