多选题A customer wants to create a custom Junos Pulse configuration. Which two are required?()AConnection setBConfiguration setCCustom installerDComponent set

题目
多选题
A customer wants to create a custom Junos Pulse configuration. Which two are required?()
A

Connection set

B

Configuration set

C

Custom installer

D

Component set


相似考题
更多“多选题A customer wants to create a custom Junos Pulse configuration. Which two are required?()AConnection setBConfiguration setCCustom installerDComponent set”相关问题
  • 第1题:

    A customer is deploying a new Junos Pulse Access Control Service and has completed the initial boot configuration as prompted using a serial connection. The customer now wants to complete the rest of the configuration using the admin GUI.Into which port on the Junos Pulse Access Control Service should the customer plug the network cable to enable access to the admin GUI?()

    A. the internal interface

    B. the external interface

    C. the management interface

    D. the console interface


    参考答案:A

  • 第2题:

    A customer is deploying a new Junos Pulse Access Control Service and has completed the initial boot configuration as prompted using a serial connection. The customer now wants to complete the rest of the configuration using the admin GUI.Into which port on the Junos Pulse Access Control Service should the customer plug the network cable to enable access to the admin GUI?()

    • A、the internal interface
    • B、the external interface
    • C、the management interface
    • D、the console interface

    正确答案:A

  • 第3题:

    A customer has purchased a third-party switch to use for Layer 2 access with their Junos Pulse Access Controe Service. When configuring the switch on the Junos Pulse Access Control Service, the customer does not find a make/model entry for it . Which two actions should the customer take to make the switch work with the Junos Pulse Access Control Service?()

    • A、Add the switch to the Junos Pulse Access Control Service as a standard RADIUS.
    • B、Add the switch to the Junos Pulse Access Control Service using the "Any" make/model.
    • C、Add the switch as a firewall enforcer.
    • D、Obtain and configure the RADIUS dictionary for the switch and use that vendor listing for the make/model.

    正确答案:A,D

  • 第4题:

    A customer has purchased a new Junos Pulse Access Control Service and wants to install it in an existing cluster.After initial configuration, the customer finds that the firmware version running on the Junos Pulse Access Control Service is 4.1 r5, but the existing cluster is running firmware version 4.1 r3. Which two actions must be performed to allow the new Junos Pulse Access Control Service to load the older version of firmware?()

    • A、Install a valid license on the new Junos Pulse Access Control Service.
    • B、When loading the older firmware, delete all the existing data on the Junos Pulse Access Control Service.
    • C、Add the new Junos Pulse Access Control Service to the existing cluster.
    • D、Download the 4.1 r3 version firmware from the Juniper support website.

    正确答案:B,D

  • 第5题:

    You administer a network with Windows-based endpoints that have custom software images. You want to use Host Checker to require that endpoints are running the custom software image.Which two Host Checker policy rules would be used to enforce this requirement?()

    • A、Isolate a file name unique to the custom image and create a custom rule-type of "File" which matches on the file. Select the "Required" option under the custom rule.
    • B、Identify the MAC address unique to network cards installed in PCs with the custom image and create a custom rule-type of "MAC Address" which matches on the appropriate MAC address.
    • C、Select the "Required" option under the custom rule Identify the IP address unique to the network cards installed in PCs with the custom image and create a custom rule-type of "IP Address" which matches on the appropriate IP address. Select the "Required" option under the custom rule.
    • D、Isolate or create a unique Windows registry key for the custom image and create a custom rule- type of "Registry Setting" which matches on the name of the registry key.

    正确答案:A,D

  • 第6题:

    What are two use cases enabled by IF-MAP Federation?()

    • A、Users authenticated to one Junos Pulse Access Control Service can transparently access resources protected by another Junos Pulse Access Control Service.
    • B、Users authenticated to a Junos Pulse Access Control Service can transparently access resources protected by a Junos Pulse Secure Access Service.
    • C、Remote access users authenticated to a Junos Pulse Secure Access Service can transparently access resources protected by a Junos Pulse Access Control Service.
    • D、Remote access users authenticated to one Junos Pulse Secure Access Service can transparently access resources protected by another Junos Pulse Secure Access Service.

    正确答案:A,C

  • 第7题:

    You want to provide 802.1X access for Windows clients using Junos Pulse as the agent. Which two considerations must you take into account()

    • A、Junos Pulse out erauth entication uses EAP-PEAP.
    • B、Junos Pulse ou terauth entication uses EAP-TTLS.
    • C、Junos Pulse innerauth entication uses EAP-MSCHAP-V2.
    • D、Theend point must use thenative Microsoft 802.1X supplicant.

    正确答案:B,D

  • 第8题:

    多选题
    A customer wants to create a custom Junos Pulse configuration. Which two are required?()
    A

    Connection set

    B

    Configuration set

    C

    Custom installer

    D

    Component set


    正确答案: D,B
    解析: 暂无解析

  • 第9题:

    单选题
    A customer is trying to determine which client to deploy. The customer wants to be able to perform Layer 2 authentication as well as connect to the Junos Pulse Secure Access Service.Which client should the customer deploy?()
    A

    Windows native supplicant

    B

    Odyssey Access Client

    C

    Junos Pulse

    D

    Network Connect


    正确答案: D
    解析: 暂无解析

  • 第10题:

    多选题
    Which three types of policies must you configure to allow remote users transparent access to protected resources using IF-MAP Federation between a Junos Pulse Secure Access Service and a Junos Pulse Access Control Service?()
    A

    Session-Export policies on the Junos Pulse Secure Access Service

    B

    Session-Export policies on the Junos Pulse Access Control Service

    C

    Session-Import policies on the Junos Pulse Secure Access Service

    D

    Session-Import policies on the Junos Pulse Access Control Service

    E

    Resource access policies on the Junos Pulse Access Control Service


    正确答案: B,A
    解析: 暂无解析

  • 第11题:

    多选题
    A user is successfully authenticating to the network but is unable to access protected resources behind a ScreenOS enforcer. You log in to the ScreenOS enforcer and issue the command get auth table infranet and you do not see the user listed.Which two event log settings on the Junos Pulse Access Control Service must you enable to troubleshootthis issue?()
    A

    Connection Requests

    B

    System Errors

    C

    Enforcer Events

    D

    Enforcer Command Trace


    正确答案: B,A
    解析: 暂无解析

  • 第12题:

    多选题
    A customer has purchased a third-party switch to use for Layer 2 access with their Junos Pulse Access Controe Service. When configuring the switch on the Junos Pulse Access Control Service, the customer does not find a make/model entry for it . Which two actions should the customer take to make the switch work with the Junos Pulse Access Control Service?()
    A

    Add the switch to the Junos Pulse Access Control Service as a standard RADIUS.

    B

    Add the switch to the Junos Pulse Access Control Service using the Any make/model.

    C

    Add the switch as a firewall enforcer.

    D

    Obtain and configure the RADIUS dictionary for the switch and use that vendor listing for the make/model.


    正确答案: D,B
    解析: 暂无解析

  • 第13题:

    A customer wants to create a custom Junos Pulse configuration. Which two are required?()

    A. Connection set

    B. Configuration set

    C. Custom installer

    D. Component set


    参考答案:A, D

  • 第14题:

    You want to create a security policy on an SRX240 that redirects unauthenticated users back to the Junos Pulse Access Control Service.Which two steps must you take to accomplish this task?()

    • A、Configure a captive-portal service that redirects all traffic back to the Junos Pulse Access Control Service.
    • B、Configure a security policy that references the unified-access-control captive-portal service.
    • C、Configure a captive-portal service that redirects unauthenticated traffic back to the Junos Pulse Access Control Service.
    • D、Configure a security policy that references the unified-access-control intranet-controller service.

    正确答案:B,C

  • 第15题:

    Which three types of policies must you configure to allow remote users transparent access to protected resources using IF-MAP Federation between a Junos Pulse Secure Access Service and a Junos Pulse Access Control Service?()

    • A、Session-Export policies on the Junos Pulse Secure Access Service
    • B、Session-Export policies on the Junos Pulse Access Control Service
    • C、Session-Import policies on the Junos Pulse Secure Access Service
    • D、Session-Import policies on the Junos Pulse Access Control Service
    • E、Resource access policies on the Junos Pulse Access Control Service

    正确答案:A,D,E

  • 第16题:

    How would an end user add both a Junos Pulse Access Control Service URL and a Junos Pulse Secure Access Service URL to the same Junos Pulse client?()

    • A、By adding two separate connections in the connections dialog box
    • B、By adding two separate intranet Controllers under the configuration hierarchy
    • C、By adding one intranet Controller and one SA under the configuration hierarchy
    • D、By adding two URLs under a connection in the connections dialog box

    正确答案:A

  • 第17题:

    You have three classes of users on your network: employee, contractor, and IT administrator. You configure the Junos Pulse Access Control Service to assign roles to each user class and require that a specific wireless SSID be preconfigured for the Odyssey Access Client based on the role. Which configuration method should you use to satisfy this scenario?()

    • A、Create a "Settings Update file" in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under "User Roles" > "Agent" > "Odyssey Settings" > "Preconfigured Installer".
    • B、Configure a wired adapter and assign the required SSID under "User Roles" > "Agent" > "Odyssey Settings".
    • C、Create a script in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under "User Roles" > "Agent" > "Odyssey Settings" > "Preconfigured Installer".
    • D、Create a "Preconfiguration file" in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under "User Roles" > "Agent" > "Odyssey Settings" > "Preconfigured Installer".

    正确答案:A,B,D

  • 第18题:

    A customer is trying to determine which client to deploy. The customer wants to be able to perform Layer 2 authentication as well as connect to the Junos Pulse Secure Access Service.Which client should the customer deploy?()

    • A、Windows native supplicant
    • B、Odyssey Access Client
    • C、Junos Pulse
    • D、Network Connect

    正确答案:C

  • 第19题:

    A customer wants to create a custom Junos Pulse configuration. Which two are required?()

    • A、Connection set
    • B、Configuration set
    • C、Custom installer
    • D、Component set

    正确答案:A,D

  • 第20题:

    多选题
    You want to create a security policy on an SRX240 that redirects unauthenticated users back to the Junos Pulse Access Control Service.Which two steps must you take to accomplish this task?()
    A

    Configure a captive-portal service that redirects all traffic back to the Junos Pulse Access Control Service.

    B

    Configure a security policy that references the unified-access-control captive-portal service.

    C

    Configure a captive-portal service that redirects unauthenticated traffic back to the Junos Pulse Access Control Service.

    D

    Configure a security policy that references the unified-access-control intranet-controller service.


    正确答案: A,D
    解析: 暂无解析

  • 第21题:

    多选题
    You administer a network with Windows-based endpoints that have custom software images. You want to use Host Checker to require that endpoints are running the custom software image.Which two Host Checker policy rules would be used to enforce this requirement?()
    A

    Isolate a file name unique to the custom image and create a custom rule-type of File which matches on the file. Select the Required option under the custom rule.

    B

    Identify the MAC address unique to network cards installed in PCs with the custom image and create a custom rule-type of MAC Address which matches on the appropriate MAC address.

    C

    Select the Required option under the custom rule Identify the IP address unique to the network cards installed in PCs with the custom image and create a custom rule-type of IP Address which matches on the appropriate IP address. Select the Required option under the custom rule.

    D

    Isolate or create a unique Windows registry key for the custom image and create a custom rule- type of Registry Setting which matches on the name of the registry key.


    正确答案: C,D
    解析: 暂无解析

  • 第22题:

    多选题
    What are two use cases enabled by IF-MAP Federation?()
    A

    Users authenticated to one Junos Pulse Access Control Service can transparently access resources protected by another Junos Pulse Access Control Service.

    B

    Users authenticated to a Junos Pulse Access Control Service can transparently access resources protected by a Junos Pulse Secure Access Service.

    C

    Remote access users authenticated to a Junos Pulse Secure Access Service can transparently access resources protected by a Junos Pulse Access Control Service.

    D

    Remote access users authenticated to one Junos Pulse Secure Access Service can transparently access resources protected by another Junos Pulse Secure Access Service.


    正确答案: D,C
    解析: 暂无解析

  • 第23题:

    多选题
    What are two features provided by the Junos Pulse client?()
    A

    802.1X

    B

    video messaging

    C

    IPsec

    D

    VoIP


    正确答案: D,B
    解析: 暂无解析

  • 第24题:

    多选题
    A customer has purchased a new Junos Pulse Access Control Service and wants to install it in an existing cluster.After initial configuration, the customer finds that the firmware version running on the Junos Pulse Access Control Service is 4.1 r5, but the existing cluster is running firmware version 4.1 r3. Which two actions must be performed to allow the new Junos Pulse Access Control Service to load the older version of firmware?()
    A

    Install a valid license on the new Junos Pulse Access Control Service.

    B

    When loading the older firmware, delete all the existing data on the Junos Pulse Access Control Service.

    C

    Add the new Junos Pulse Access Control Service to the existing cluster.

    D

    Download the 4.1 r3 version firmware from the Juniper support website.


    正确答案: C,B
    解析: 暂无解析