多选题You want to create a security policy on an SRX240 that redirects unauthenticated users back to the Junos Pulse Access Control Service.Which two steps must you take to accomplish this task?()AConfigure a captive-portal service that redirects all traffic

题目
多选题
You want to create a security policy on an SRX240 that redirects unauthenticated users back to the Junos Pulse Access Control Service.Which two steps must you take to accomplish this task?()
A

Configure a captive-portal service that redirects all traffic back to the Junos Pulse Access Control Service.

B

Configure a security policy that references the unified-access-control captive-portal service.

C

Configure a captive-portal service that redirects unauthenticated traffic back to the Junos Pulse Access Control Service.

D

Configure a security policy that references the unified-access-control intranet-controller service.

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

You notice that during peak hours, some firewall enforcers contain a high number of auth table entries. As you investigate the issue, you discover that all users are getting auth table mappings to all firewalls, which is not acceptable.What should you do on the Junos Pulse Access Control Service to resolve this problem?()

A. Delete the default auth table mapping policy

B. Create auth table mapping policies that route users to specific resources

C. Create Resource Access policies that permit access to specific resources

D. Create Source Interface policies that route users to specific resources


参考答案:A

第2题:

You have created a security policy on an SRX240 that permits traffic from any source-address, any destination-address, and any application. The policy will be a source IP policy for use with the Junos Pulse Access Control Service.What must you add to complete the security policy configuration?()

A. The intranet-auth authentication option

B. The redirect-portal application service

C. The uac-policy application service

D. The ipsec-vpn tunnel


参考答案:C

第3题:

Your security policy requires that users authenticating to the Junos Pulse Access Control Service are connecting from a domain member endpoint on the internal corporate network.Which set of role access restrictions must you configure to enforce this security policy?()

A. Source IP and browser

B. Source IP and certificate

C. Certificate and Host Checker

D. Host Checker and source IP


参考答案:D

第4题:

You are configuring an SRX210 as a firewall enforcer that will tunnel IPsec traffic from several Junos Pulse users.Which two parameters must you configure on the SRX210?()

  • A、access profile
  • B、IKE parameters
  • C、tunneled interface
  • D、redirect policy

正确答案:A,B

第5题:

You have created a security policy on an SRX240 that permits traffic from any source-address, any destination-address, and any application. The policy will be a source IP policy for use with the Junos Pulse Access Control Service. What must you add to complete the security policy configuration?()

  • A、The intranet-auth authentication option
  • B、The redirect-portal application service
  • C、The uac-policy application service
  • D、The ipsec-vpn tunnel

正确答案:C

第6题:

You have a firewall enforcer receiving resource access policies from a Junos Pulse Access Control Service. You are using Network and Security Manager (NSM) for configuration management on that firewall. The firewall can also be configured using its built-in command-line interface (CLI) or Web-based user interface (WebUI).To avoid conflicting configurations, which two interfaces must you use to configure the firewall enforcer?()

A. CLI

B. WebUI

C. NSM

D. Junos Pulse Access Control Service


参考答案:C, D

第7题:

Which three types of policies must you configure to allow remote users transparent access to protected resources using IF-MAP Federation between a Junos Pulse Secure Access Service and a Junos Pulse Access Control Service?()

A. Session-Export policies on the Junos Pulse Secure Access Service

B. Session-Export policies on the Junos Pulse Access Control Service

C. Session-Import policies on the Junos Pulse Secure Access Service

D. Session-Import policies on the Junos Pulse Access Control Service

E. Resource access policies on the Junos Pulse Access Control Service


参考答案:A, D, E

第8题:

You are configuring an SRX210 as a firewall enforcer that will tunnel IPsec traffic from several Junos Pulse users.Which two parameters must you configure on the SRX210?()

A. access profile

B. IKE parameters

C. tunneled interface

D. redirect policy


参考答案:A, B

第9题:

On the Junos Pulse Access Control Service, you have created a role called Secret that you only want to provide to users who present a certificate.Using the admin GUI, which two features would you configure to satisfy this requirement?()

  • A、Sign-in Policy
  • B、Role Mapping Rule
  • C、Role Restrictions
  • D、Trusted Server CA

正确答案:B,C

第10题:

You notice that during peak hours, some firewall enforcers contain a high number of auth table entries. As you investigate the issue, you discover that all users are getting auth table mappings to all firewalls, which is not acceptable. What should you do on the Junos Pulse Access Control Service to resolve this problem?()

  • A、Delete the default auth table mapping policy
  • B、Create auth table mapping policies that route users to specific resources
  • C、Create Resource Access policies that permit access to specific resources
  • D、Create Source Interface policies that route users to specific resources

正确答案:A

更多相关问题