单选题When using RADIUS as an external authentication method for 802.1X authentication for the Junos Pulse Access Control Service, what must you do to ensure that the RADIUS authentication works properly?()A Configure IP helper to forward the authentication

题目
单选题
When using RADIUS as an external authentication method for 802.1X authentication for the Junos Pulse Access Control Service, what must you do to ensure that the RADIUS authentication works properly?()
A

Configure IP helper to forward the authentication requests from the clients to the external RADIUS server

B

Configure the supplicant as anexternal authentication server

C

Configure RADIUS proxy on the realm

D

Specify the correct RADIUS port 389 on the Junos Pulse Access Control Service


相似考题
更多“单选题When using RADIUS as an external authentication method for 802.1X authentication for the Junos Pulse Access Control Service, what must you do to ensure that the RADIUS authentication works properly?()A Configure IP helper to forward the authentication ”相关问题
  • 第1题:

    A company is using RADIUS to authenticate login requests to its Juniper Networks routers. Usersshould still be able to authenticate using the local password database but only if the RADIUS server is unreachable. Which JUNOS software configuration accomplishes this goal?()

    A. authentication-order radius;

    B. authentication-order password;

    C. authentication-order [radius password];

    D. authentication-order [password radius];


    参考答案:A

  • 第2题:

    What are two steps to configure user authentication for a Junos Pulse Access Control Service?()

    • A、Configure an authentication policy as part of the user role definitions.
    • B、Configure a Sign-in Policy.
    • C、Configure authentication agents as part of the user role definitions
    • D、Configure an authentication policy as part of the authentication realm definition.

    正确答案:B,D

  • 第3题:

    What are three necessary steps for enabling 802.1X access when configuring Layer 2 enforcement?()

    • A、Configure a location group
    • B、Createan authentication protocol set
    • C、Configure the RADIUS AV pair list
    • D、Configure RADIUS clients
    • E、Configure role and role-mapping rules

    正确答案:A,D,E

  • 第4题:

    You work as a network administrator at, You have been asked to configure 802.1x port-based authentication. You notice that the client workstation is not compatible with 802.1x port-based authentication.  What supported authentication server should be chosen?()

    • A、TACACS with LEAP extensions
    • B、RADIUS with EAP extensions
    • C、TACACS+
    • D、LDAP

    正确答案:B

  • 第5题:

    You are installing a new deployment of the Junos Pulse Access Control Service. You have an existing RADIUS server that has a populated user file. You are considering using the RADIUS proxy feature.Which consideration must you take into account?()

    • A、Your RADIUS server database must be replicated onto another device for redundancy.
    • B、Inner proxy creates a tunnel between the supplicant and the external server.
    • C、RADIUS proxy causes the role assignment process to be skipped.
    • D、Outer proxy configuration passes authentication data to the external RADIUS server in clear text.

    正确答案:C

  • 第6题:

    A customer has purchased a third-party switch to use for Layer 2 access with their Junos Pulse Access Controe Service. When configuring the switch on the Junos Pulse Access Control Service, the customer does not find a make/model entry for it . Which two actions should the customer take to make the switch work with the Junos Pulse Access Control Service?()

    • A、Add the switch to the Junos Pulse Access Control Service as a standard RADIUS.
    • B、Add the switch to the Junos Pulse Access Control Service using the "Any" make/model.
    • C、Add the switch as a firewall enforcer.
    • D、Obtain and configure the RADIUS dictionary for the switch and use that vendor listing for the make/model.

    正确答案:A,D

  • 第7题:

    Your company has deployed Network Access Protection (NAP).You configure secure wireless access to the network by using 802.1X authentication from any access point.You need to ensure that all client computers that access the network are evaluated by NAP. What should you do?()

    • A、Configure all access points as RADIUS clients to the Remediation Servers.
    • B、Configure all access points as RADIUS clients to the Network Policy Server (NPS).
    • C、Create a Network Policy that defines Remote Access Server as a network connection method. 
    • D、Create a Network Policy that specifies EAP-TLS as the only available authentication method.

    正确答案:B

  • 第8题:

    Your company has deployed Network Access Protection (NAP). You configure secure wireless access to the network by using 802.1x authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP.  what should you do()? 

    • A、Configure all access points as RADIUS clients to the Remediation Servers
    • B、Configure all access points as RADIUS clients to the Network Policy Server (NPS)
    • C、Create a Network Policy that defines Remote Access Server as a network connection method
    • D、Create a Network Policy that specifies EAP-TLS as the only availible authentication method.

    正确答案:B

  • 第9题:

    单选题
    Your company has deployed network access protection (NAP). You configure secure wireless access to the network by using 802.1x authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP what should you do?()
    A

    Configure all access points as RADIUS clients to the remediation servers.

    B

    Configure all access points as RADIUS clients to the network Policy Server (NPS).

    C

    Create a network policy that defines remote access server as a network connection method.

    D

    Create a network policy that specifies EAP-TLS as the only available authentication method.


    正确答案: A
    解析: 暂无解析

  • 第10题:

    单选题
    You are installing a new deployment of the Junos Pulse Access Control Service. You have an existing RADIUS server that has a populated user file. You are considering using the RADIUS proxy feature.Which consideration must you take into account?()
    A

    Your RADIUS server database must be replicated onto another device for redundancy.

    B

    Inner proxy creates a tunnel between the supplicant and the external server.

    C

    RADIUS proxy causes the role assignment process to be skipped.

    D

    Outer proxy configuration passes authentication data to the external RADIUS server in clear text.


    正确答案: B
    解析: 暂无解析

  • 第11题:

    单选题
    Your company has deployed Network Access Protection (NAP). You configure secure wireless access to the network by using 802.1x authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP.  what should you do()?
    A

    Configure all access points as RADIUS clients to the Remediation Servers

    B

    Configure all access points as RADIUS clients to the Network Policy Server (NPS)

    C

    Create a Network Policy that defines Remote Access Server as a network connection method

    D

    Create a Network Policy that specifies EAP-TLS as the only availible authentication method.


    正确答案: B
    解析: 暂无解析

  • 第12题:

    单选题
    When using RADIUS as an external authentication method for 802.1X authentication for the Junos Pulse Access Control Service, what must you do to ensure that the RADIUS authentication works properly?()
    A

    Configure IP helper to forward the authentication requests from the clients to the external RADIUS server

    B

    Configure the supplicant as anexternal authentication server

    C

    Configure RADIUS proxy on the realm

    D

    Specify the correct RADIUS port 389 on the Junos Pulse Access Control Service


    正确答案: C
    解析: 暂无解析

  • 第13题:

    An Enterprise decides to implement Authentication Proxy for per-user authentication for home offices. Each home office also supports an IP Phone. What should you do?()

    • A、Configure Access Control Lists to ensure Voice over IP traffic is checked by Auth Proxy.
    • B、Configure pNAT to ensure Voice over IP packets are properly translated.
    • C、Configure IOS firewall to permit RTP port numbers through the firewall via VPN. 
    • D、Configure Access Control Lists to allow Voice over IP traffic to bypass Auth Proxy checking.

    正确答案:D

  • 第14题:

    Your company has deployed network access protection (NAP). You configure secure wireless access to the network by using 802.1x authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP what should you do?()

    • A、Configure all access points as RADIUS clients to the remediation servers.
    • B、Configure all access points as RADIUS clients to the network Policy Server (NPS).
    • C、Create a network policy that defines remote access server as a network connection method.
    • D、Create a network policy that specifies EAP-TLS as the only available authentication method.

    正确答案:B

  • 第15题:

    A company is using RADIUS to authenticate login requests to its Juniper Networks routers. Usersshould still be able to authenticate using the local password database but only if the RADIUS server is unreachable. Which JUNOS software configuration accomplishes this goal?()

    • A、authentication-order radius;
    • B、authentication-order password;
    • C、authentication-order [radius password];
    • D、authentication-order [password radius];

    正确答案:A

  • 第16题:

    You are the network administrator for your company. A user is complaining that they are not able to access the network with the Junos Pulse client. You run a packet capture on the network interface to monitor the 802.1X authentication process. You notice that after the EAP- request/identity packet is received, and the supplicant responds with an EAP-response/identity packet, no further communication occurs for several seconds. What are three causes for this behavior?()

    • A、The authenticator is not licensed to support Junos Pulse.
    • B、The authenticator did not receive the EAP-response/identity packet.
    • C、The authentication server is not receiving the RADIUS packet containing the EAP-response/identity data.
    • D、The authenticator is sending the request over its loopback interface.
    • E、The authentication server is sending back a RADIUS response packet, but the authenticator is not forwarding the response back to the supplicant.

    正确答案:B,C,E

  • 第17题:

    When using RADIUS as an external authentication method for 802.1X authentication for the Junos Pulse Access Control Service, what must you do to ensure that the RADIUS authentication works properly?()

    • A、Configure IP helper to forward the authentication requests from the clients to the external RADIUS server
    • B、Configure the supplicant as anexternal authentication server
    • C、Configure RADIUS proxy on the realm
    • D、Specify the correct RADIUS port 389 on the Junos Pulse Access Control Service

    正确答案:C

  • 第18题:

    What are three elements the Junos Pulse Access Control Service uses to establish endpoint access to protected resources?()

    • A、sign-in policy
    • B、authentication realms
    • C、role restrictions
    • D、policy realms
    • E、routing policy

    正确答案:A,B,C

  • 第19题:

    You need to design an authentication solution for the wireless network. Your solution must meet the security requirements. What should you do?()

    • A、Create wireless VPNs using L2TP/IPSec between the client computers to the wireless access point
    • B、Configure IEEE 802.1x authentication with smart cards
    • C、Configure the wireless network to use Wired Equivalent Privacy (WEP)
    • D、Install and configure an Internet Authentication Service (IAS) server

    正确答案:C

  • 第20题:

    Your network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2).You have a VPN server named Server1. You have an Internet Authentication Service (IAS) server named Server2. You need to ensure that all VPN connections to Server1 are authenticated by Server2.Which two actions should you perform?()

    • A、From the Internet Authentication Service snap-in on Server2, create a new RADIUS client. 
    • B、From the Internet Authentication Service snap-in on Server2, create a new remote access policy. 
    • C、From the Routing and Remote Access snap-in, configure Server1 to use RADIUS accounting. 
    • D、From the Routing and Remote Access snap-in, configure Server1 to use RADIUS authentication. 

    正确答案:A,D

  • 第21题:

    单选题
    A company has completed two acquisitions over the previous year. Each of the acquired companies was allowed to keep its own independent authentication server. The network administrator has been asked to roll out the Junos Pulse Access Control Service to users within the original company along with each of the two acquired organizations.The administrator configures three authentication realms, one for each independent authentication server, and associates them all with a single sign-in policy. All of the client endpoints are running Junos Pulse on their Windows XP desktops. When a user signs in to the Junos Pulse Access Control Service, which statement is correct?()
    A

    The first authentication realm that was added to the sign-in policy is used by default.

    B

    The user is allowed to choose the correct authentication realm from a list presented by Junos Pulse.

    C

    When Junos Pulse is initially installed on the desktop, it must be configured with the correct realm.

    D

    This is not an allowed configuration; the administrator should configure separate sign-in policies for each realm.


    正确答案: C
    解析: 暂无解析

  • 第22题:

    单选题
    You need to design an authentication solution for the wireless network. Your solution must meet the security requirements. What should you do?()
    A

    Create wireless VPNs using L2TP/IPSec between the client computers to the wireless access point

    B

    Configure IEEE 802.1x authentication with smart cards

    C

    Configure the wireless network to use Wired Equivalent Privacy (WEP)

    D

    Install and configure an Internet Authentication Service (IAS) server


    正确答案: A
    解析: 暂无解析

  • 第23题:

    多选题
    What are two steps to configure user authentication for a Junos Pulse Access Control Service?()
    A

    Configure an authentication policy as part of the user role definitions.

    B

    Configure a Sign-in Policy.

    C

    Configure authentication agents as part of the user role definitions

    D

    Configure an authentication policy as part of the authentication realm definition.


    正确答案: B,D
    解析: 暂无解析

  • 第24题:

    单选题
    Your company has deployed Network Access Protection (NAP).You configure secure wireless access to the network by using 802.1X authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP.  What should you do?()
    A

    Configure all access points as RADIUS clients to the Remediation Servers.

    B

    Configure all access points as RADIUS clients to the Network Policy Server (NPS).

    C

    Create a Network Policy that defines Remote Access Server as a network connection method.

    D

    Create a Network Policy that specifies EAP-TLS as the only available authentication method.


    正确答案: D
    解析: 暂无解析