单选题You want to provide all users in your corporation with a single agent that provides access to multiple connection types conditionally. For example, you connect to the Junos Pulse Access Control Service if you are connected to the intranet, but you conn

题目
单选题
You want to provide all users in your corporation with a single agent that provides access to multiple connection types conditionally. For example, you connect to the Junos Pulse Access Control Service if you are connected to the intranet, but you connect to the Junos Pulse Secure Access Service if you are on a remote network. Which agent should you use for this type of connection requirement?()
A

Junos Pulse should be configured with location awareness rules configured.

B

Odyssey Access Client should be installed with Host Checker configured to check the client's location.

C

Junos Pulse should be configured with all components installed.

D

Agentless access should be enabled so that clients can connect to any service without concern for installing an agent.


相似考题
更多“单选题You want to provide all users in your corporation with a single agent that provides access to multiple connection types conditionally. For example, you connect to the Junos Pulse Access Control Service if you are connected to the intranet, but you conn”相关问题
  • 第1题:

    End users want to map a network drive on their PCs when they are connected to the Junos Pulse Access Control Service. The mapped drive must be removed when users disconnect their session.Which feature addresses this requirement?()

    A. agent session scripts

    B. preconfiguration installer

    C. Junos Pulse component set

    D. agent actions


    参考答案:A

  • 第2题:

    You have a computer that runs Windows Vista.You connect to your company’s network by using a virtual private network (VPN) connection. You notice that when you establish the VPN connection, you are unable to access Internet Web sites. When you disconnect the VPN connection, you can access Internet Web sites.You need to access Internet Web sites while you are connected to the VPN connection.What should you do?()

    A.A

    B.B

    C.C

    D.D


    参考答案:D

  • 第3题:

    You are the network administrator for Company.You install Windows 2000 Professional on your computer at home. Your computer contains threemodems, each connected to a separate phone line. You create a new dial-up connection to connect toCompany’s remote access server. You configure the connection to dial up all three devices. You start thedial-up connection and connect to the remote access server. You notice that only one of the modems isconnected to the remote access server.You want to use as many modems as possible to make a single connection to the remote access server.What should you do? ()

    • A、Configure the dial-up connection to sue a SLIP connection.
    • B、Configure all three modems to use the same phone line.
    • C、Configure the remote access server to enable multi-link.
    • D、Configure the dial-up connection to only dial two of the three modems.
    • E、Configure the dial-up connection to Enable LCP extensions.

    正确答案:C

  • 第4题:

    Your IT director has decided to allow employees to use their laptops at home as well as in the office. You have deployed the Junos Pulse client to allow access to the offices 802.1X-enabled wired network. Your company also has the Junos Pulse Secure Access Service deployed. You want the Junos Pulse client to automatically launch the appropriate access method depending on each users location. Which three are supported to determine the users location?()

    • A、MAC address
    • B、DNS server
    • C、DHCP server
    • D、resolve address
    • E、endpoint address

    正确答案:B,D,E

  • 第5题:

    End users want to map a network drive on their PCs when they are connected to the Junos Pulse Access Control Service. The mapped drive must be removed when users disconnect their session.Which feature addresses this requirement?()

    • A、agent session scripts
    • B、preconfiguration installer
    • C、Junos Pulse component set
    • D、agent actions

    正确答案:A

  • 第6题:

    Which three types of policies must you configure to allow remote users transparent access to protected resources using IF-MAP Federation between a Junos Pulse Secure Access Service and a Junos Pulse Access Control Service?()

    • A、Session-Export policies on the Junos Pulse Secure Access Service
    • B、Session-Export policies on the Junos Pulse Access Control Service
    • C、Session-Import policies on the Junos Pulse Secure Access Service
    • D、Session-Import policies on the Junos Pulse Access Control Service
    • E、Resource access policies on the Junos Pulse Access Control Service

    正确答案:A,D,E

  • 第7题:

    You have three classes of users on your network: employee, contractor, and IT administrator. You configure the Junos Pulse Access Control Service to assign roles to each user class and require that a specific wireless SSID be preconfigured for the Odyssey Access Client based on the role. Which configuration method should you use to satisfy this scenario?()

    • A、Create a "Settings Update file" in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under "User Roles" > "Agent" > "Odyssey Settings" > "Preconfigured Installer".
    • B、Configure a wired adapter and assign the required SSID under "User Roles" > "Agent" > "Odyssey Settings".
    • C、Create a script in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under "User Roles" > "Agent" > "Odyssey Settings" > "Preconfigured Installer".
    • D、Create a "Preconfiguration file" in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under "User Roles" > "Agent" > "Odyssey Settings" > "Preconfigured Installer".

    正确答案:A,B,D

  • 第8题:

    You have a Junos Pulse Secure Access Service acting as an IF-MAP client, configured to federate all user roles to a Junos Pulse Access Control Service acting as an IF-MAP Federation server. A remote user using Junos Pulse logs in to the Junos Pulse Secure Access Service; the Junos Pulse Secure Access Service provisions a remote access session for that user.What happens next?()

    • A、The Junos Pulse Secure Access Service redirects the user to the Junos Pulse Secure Access Service for authentication
    • B、The Junos Pulse Access Control Service provisions enforcement points to enable resource access for that user.
    • C、The Junos Pulse Secure Access Service publishes user session and role information to the IF- MAP Federation server,
    • D、The Junos Pulse Secure Access Service provisions enforcement points to enable resource access for that user.

    正确答案:C

  • 第9题:

    单选题
    You are validating the configuration of your SRX Series device and see the output shown below. What does this indicate?()
    A

    The SRX Series device has been configured correctly, the Junos Pulse Access Control Service is reachable on the network, and the SRX Series device is waiting to receive the initial connection from the Junos Pulse Access Control Service.

    B

    The SRX Series device has confirmed that the Junos Pulse Access Control Service is configured and is reachable on the network, the SRX Series device is waiting to receive the connection from the Junos Pulse Access Control Service, and all that remains to be accomplished is to configure the SRX Series device.

    C

    The SRX Series device is configured correctly and connected to the Junos Pulse Access Control Service. All that remains to be done to complete the configuration is to configure the SRX Series device on the Junos Pulse Access Control Service.

    D

    Both the Junos Pulse Access Control Service and the SRX Series device are configured correctly and communicating with each other.


    正确答案: The SRX Series device has been configured correctly, the Junos Pulse Access Control Service is reachable on the network, and the SRX Series device is waiting to receive the initial connection from the Junos Pulse Access Control Service., The SRX Series device has confirmed that the Junos Pulse Access Control Service is configured and is reachable on the network, the SRX Series device is waiting to receive the connection from the Junos Pulse Access Control Service, and all that remains to be accomplished is to configure the SRX Series device., The SRX Series device is configured correctly and connected to the Junos Pulse Access Control Service. All that remains to be done to complete the configuration is to configure the SRX Series device on the Junos Pulse Access Control Service., Both the Junos Pulse Access Control Service and the SRX Series device are configured correctly and communicating with each other.
    解析: 暂无解析

  • 第10题:

    单选题
    You are deploying a Junos Pulse Access Control Service cluster in active/passive mode. How do you configure the IP address on the SRX Series devices?()
    A

    Configure a single Junos Pulse Access Control Service instance on the enforcer, specifying the VIP as the IP address the instance.

    B

    Configure multiple Junos Pulse Access Control Service instances on the enforcer, specifying the specific IP address each device in a separate instance.

    C

    Configure a single Junos Pulse Access Control Service instance on the enforcer, specifying the VIP and active node address in the instance.

    D

    Configure a single Junos Pulse Access Control Service instance on the enforcer, specifying the VIP and passive node address in the instance.


    正确答案: A
    解析: 暂无解析

  • 第11题:

    单选题
    You notice that during peak hours, some firewall enforcers contain a high number of auth table entries. As you investigate the issue, you discover that all users are getting auth table mappings to all firewalls, which is not acceptable. What should you do on the Junos Pulse Access Control Service to resolve this problem?()
    A

    Delete the default auth table mapping policy

    B

    Create auth table mapping policies that route users to specific resources

    C

    Create Resource Access policies that permit access to specific resources

    D

    Create Source Interface policies that route users to specific resources


    正确答案: A
    解析: 暂无解析

  • 第12题:

    单选题
    You want to connect to your company network from your Windows 2000 Professional computer at home. You have an ISDN line that is used for internet connectivity. You create a VPN connection and are able to connect successfully to the company network. While connected to the company network, you are unable to access the Internet.   What must you do so that you can access the Internet?()
    A

    Configure the ISDN connection to use SLIP instead of PPP.

    B

    Select the Enable Internet Connection Sharing for this connection check box in the ISDN connection properties.

    C

    Clear the Use default gateway on remote network check box.

    D

    Install and configure the SAP Agent service.


    正确答案: C
    解析: 暂无解析

  • 第13题:

    Which three types of policies must you configure to allow remote users transparent access to protected resources using IF-MAP Federation between a Junos Pulse Secure Access Service and a Junos Pulse Access Control Service?()

    A. Session-Export policies on the Junos Pulse Secure Access Service

    B. Session-Export policies on the Junos Pulse Access Control Service

    C. Session-Import policies on the Junos Pulse Secure Access Service

    D. Session-Import policies on the Junos Pulse Access Control Service

    E. Resource access policies on the Junos Pulse Access Control Service


    参考答案:A, D, E

  • 第14题:

    A user calls the help desk and explains that they just purchased a Macintosh computer. When they log into the network, the Odyssey Access Client is not automatically downloaded as it was when the user used their Windows PC.How do you resolve this issue?()

    • A、Download the Macintosh installer from the Junos Pulse Access Control Service and manually install the Odyssey Access Client.
    • B、Provide the user with the sign-in URL you set up for Macintosh users; this will push the Odyssey Access Client to the user's machine.
    • C、Assist the user to configure the Macintosh native supplicant and provide the AppleScnptto expose the EAP-JUAC inner authentication protocol.
    • D、Configure the user's role to install the Java agent, which is a requirement to allow the Junos Pulse Access Control Service to deploy the Odyssey Access Client.

    正确答案:A

  • 第15题:

    On the Junos Pulse Access Control Service, you have created a role called Secret that you only want to provide to users who present a certificate.Using the admin GUI, which two features would you configure to satisfy this requirement?()

    • A、Sign-in Policy
    • B、Role Mapping Rule
    • C、Role Restrictions
    • D、Trusted Server CA

    正确答案:B,C

  • 第16题:

    You notice that during peak hours, some firewall enforcers contain a high number of auth table entries. As you investigate the issue, you discover that all users are getting auth table mappings to all firewalls, which is not acceptable. What should you do on the Junos Pulse Access Control Service to resolve this problem?()

    • A、Delete the default auth table mapping policy
    • B、Create auth table mapping policies that route users to specific resources
    • C、Create Resource Access policies that permit access to specific resources
    • D、Create Source Interface policies that route users to specific resources

    正确答案:A

  • 第17题:

    You want to create a security policy on an SRX240 that redirects unauthenticated users back to the Junos Pulse Access Control Service.Which two steps must you take to accomplish this task?()

    • A、Configure a captive-portal service that redirects all traffic back to the Junos Pulse Access Control Service.
    • B、Configure a security policy that references the unified-access-control captive-portal service.
    • C、Configure a captive-portal service that redirects unauthenticated traffic back to the Junos Pulse Access Control Service.
    • D、Configure a security policy that references the unified-access-control intranet-controller service.

    正确答案:B,C

  • 第18题:

    You want to provide all users in your corporation with a single agent that provides access to multiple connection types conditionally. For example, you connect to the Junos Pulse Access Control Service if you are connected to the intranet, but you connect to the Junos Pulse Secure Access Service if you are on a remote network. Which agent should you use for this type of connection requirement?()

    • A、Junos Pulse should be configured with location awareness rules configured.
    • B、Odyssey Access Client should be installed with Host Checker configured to check the client's location.
    • C、Junos Pulse should be configured with all components installed.
    • D、Agentless access should be enabled so that clients can connect to any service without concern for installing an agent.

    正确答案:A

  • 第19题:

    You are deploying a Junos Pulse Access Control Service cluster in active/passive mode. How do you configure the IP address on the SRX Series devices?()

    • A、Configure a single Junos Pulse Access Control Service instance on the enforcer, specifying the VIP as the IP address the instance.
    • B、Configure multiple Junos Pulse Access Control Service instances on the enforcer, specifying the specific IP address each device in a separate instance.
    • C、Configure a single Junos Pulse Access Control Service instance on the enforcer, specifying the VIP and active node address in the instance.
    • D、Configure a single Junos Pulse Access Control Service instance on the enforcer, specifying the VIP and passive node address in the instance.

    正确答案:A

  • 第20题:

    You want to connect to your company network from your Windows 2000 Professional computer at home. You have an ISDN line that is used for internet connectivity. You create a VPN connection and are able to connect successfully to the company network. While connected to the company network, you are unable to access the Internet.   What must you do so that you can access the Internet?()

    • A、Configure the ISDN connection to use SLIP instead of PPP.
    • B、Select the Enable Internet Connection Sharing for this connection check box in the ISDN connection properties.
    • C、Clear the Use default gateway on remote network check box.
    • D、Install and configure the SAP Agent service.

    正确答案:C

  • 第21题:

    单选题
    A user calls the help desk and explains that they just purchased a Macintosh computer. When they log into the network, the Odyssey Access Client is not automatically downloaded as it was when the user used their Windows PC.How do you resolve this issue?()
    A

    Download the Macintosh installer from the Junos Pulse Access Control Service and manually install the Odyssey Access Client.

    B

    Provide the user with the sign-in URL you set up for Macintosh users; this will push the Odyssey Access Client to the user's machine.

    C

    Assist the user to configure the Macintosh native supplicant and provide the AppleScnptto expose the EAP-JUAC inner authentication protocol.

    D

    Configure the user's role to install the Java agent, which is a requirement to allow the Junos Pulse Access Control Service to deploy the Odyssey Access Client.


    正确答案: B
    解析: 暂无解析

  • 第22题:

    单选题
    You are the network administrator for Company.You install Windows 2000 Professional on your computer at home. Your computer contains threemodems, each connected to a separate phone line. You create a new dial-up connection to connect toCompany’s remote access server. You configure the connection to dial up all three devices. You start thedial-up connection and connect to the remote access server. You notice that only one of the modems isconnected to the remote access server.You want to use as many modems as possible to make a single connection to the remote access server.What should you do? ()
    A

    Configure the dial-up connection to sue a SLIP connection.

    B

    Configure all three modems to use the same phone line.

    C

    Configure the remote access server to enable multi-link.

    D

    Configure the dial-up connection to only dial two of the three modems.

    E

    Configure the dial-up connection to Enable LCP extensions.


    正确答案: C
    解析: 暂无解析

  • 第23题:

    单选题
    You want to provide all users in your corporation with a single agent that provides access to multiple connection types conditionally. For example, you connect to the Junos Pulse Access Control Service if you are connected to the intranet, but you connect to the Junos Pulse Secure Access Service if you are on a remote network. Which agent should you use for this type of connection requirement?()
    A

    Junos Pulse should be configured with location awareness rules configured.

    B

    Odyssey Access Client should be installed with Host Checker configured to check the client's location.

    C

    Junos Pulse should be configured with all components installed.

    D

    Agentless access should be enabled so that clients can connect to any service without concern for installing an agent.


    正确答案: A
    解析: 暂无解析

  • 第24题:

    单选题
    You have a Junos Pulse Secure Access Service acting as an IF-MAP client, configured to federate all user roles to a Junos Pulse Access Control Service acting as an IF-MAP Federation server. A remote user using Junos Pulse logs in to the Junos Pulse Secure Access Service; the Junos Pulse Secure Access Service provisions a remote access session for that user.What happens next?()
    A

    The Junos Pulse Secure Access Service redirects the user to the Junos Pulse Secure Access Service for authentication

    B

    The Junos Pulse Access Control Service provisions enforcement points to enable resource access for that user.

    C

    The Junos Pulse Secure Access Service publishes user session and role information to the IF- MAP Federation server,

    D

    The Junos Pulse Secure Access Service provisions enforcement points to enable resource access for that user.


    正确答案: D
    解析: 暂无解析