单选题You are setting up a Junos Pulse Access Control Service. You cannot obtain a device certificate from an external certificate authority.Which tool should you use to generate a device certificate?()AOpenSSLBOpenSSHCOpenLDAPDOpenRADIUS

单选题
You are setting up a Junos Pulse Access Control Service. You cannot obtain a device certificate from an external certificate authority.Which tool should you use to generate a device certificate?()
A

OpenSSL

B

OpenSSH

C

OpenLDAP

D

OpenRADIUS


参考解析

解析: 暂无解析

相关考题:

You have a self-hosted Windows Communication Foundation (WCF) service. You need to configure the service to provide an X509 certificate during authentication. What should you use to configure the service?()A. the Certificate property of the X509 Certificate lnitiator Service Credential classB. the SetCertificate method of the X509 Certificate Initiator Service Credential classC. the SetCertificate method of the X509 Certificate Recipient Service Credential classD. the TrustedStoreLocation property of the X509 Certificate Recipient Service Credential class

On the Junos Pulse Access Control Service, you have created a role called Secret that you only want to provide to users who present a certificate.Using the admin GUI, which two features would you configure to satisfy this requirement?()A. Sign-in PolicyB. Role Mapping RuleC. Role RestrictionsD. Trusted Server CA

You are validating the configuration of your SRX Series device and see the output shown below.What does this indicate?() A.The SRX Series device has been configured correctly, the Junos Pulse Access Control Service is reachable on the network, and the SRX Series device is waiting to receive the initial connection from the Junos Pulse Access Control Service.B.The SRX Series device has confirmed that the Junos Pulse Access Control Service is configured and is reachable on the network, the SRX Series device is waiting to receive the connection from the Junos Pulse Access Control Service, and all that remains to be accomplished is to configure the SRX Series device.C.The SRX Series device is configured correctly and connected to the Junos Pulse Access Control Service. All that remains to be done to complete the configuration is to configure the SRX Series device on the Junos Pulse Access Control Service.D.Both the Junos Pulse Access Control Service and the SRX Series device are configured correctly and communicating with each other.

You have multiple realms configured on a MAG Series device. A user is authenticating with a non- Junos Pulse Access Control Service client. The username does not contain a realm suffix.Which behavior will the user experience?()A. The user will not be able to log-in, as the Junos Pulse Access Control Service device cannot map the user to a realm when the realm value is empty.B. The user will be mapped to all realms available to the user.C. The Junos Pulse Access Control Service device displays a page where the user must choose from a list of realms.D. The endpoint is assigned to the first realm in the list whose authentication server is a match with the endpoints software.

You have configured the Odyssey Access Client with a profile which has the "Disable Server Verification" setting cleared.What will be the result if the device certificate on the MAG Series device has expired and the user attempts to authenticate?()A. The user will be instructed to call the network administrator.B. The user will fail authentication.C. The user will be prompted to install a new device certificate on the MAG Series device.D. The user will successfully authenticate and have full network access.

You are setting up a Junos Pulse Access Control Service. You cannot obtain a device certificate from an external certificate authority.Which tool should you use to generate a device certificate?() A.OpenSSLB.OpenSSHC.OpenLDAPD.OpenRADIUS

On the Junos Pulse Access Control Service, you have created a role called Secret that you only want to provide to users who present a certificate.Using the admin GUI, which two features would you configure to satisfy this requirement?()A、Sign-in PolicyB、Role Mapping RuleC、Role RestrictionsD、Trusted Server CA

You have multiple realms configured on a MAG Series device. A user is authenticating with a non- Junos Pulse Access Control Service client. The username does not contain a realm suffix.Which behavior will the user experience?()A、The user will not be able to log-in, as the Junos Pulse Access Control Service device cannot map the user to a realm when the realm value is empty.B、The user will be mapped to all realms available to the user.C、The Junos Pulse Access Control Service device displays a page where the user must choose from a list of realms.D、The endpoint is assigned to the first realm in the list whose authentication server is a match with the endpoints software.

Your security policy requires that users authenticating to the Junos Pulse Access Control Service are connecting from a domain member endpoint on the internal corporate network.Which set of role access restrictions must you configure to enforce this security policy?()A、Source IP and browserB、Source IP and certificateC、Certificate and Host CheckerD、Host Checker and source IP

You want to provide all users in your corporation with a single agent that provides access to multiple connection types conditionally. For example, you connect to the Junos Pulse Access Control Service if you are connected to the intranet, but you connect to the Junos Pulse Secure Access Service if you are on a remote network. Which agent should you use for this type of connection requirement?()A、Junos Pulse should be configured with location awareness rules configured.B、Odyssey Access Client should be installed with Host Checker configured to check the client's location.C、Junos Pulse should be configured with all components installed.D、Agentless access should be enabled so that clients can connect to any service without concern for installing an agent.

You are setting up a Junos Pulse Access Control Service. You cannot obtain a device certificate from an external certificate authority.Which tool should you use to generate a device certificate?()A、OpenSSLB、OpenSSHC、OpenLDAPD、OpenRADIUS

You have a firewall enforcer receiving resource access policies from a Junos Pulse Access Control Service. You are using Network and Security Manager (NSM) for configuration management on that firewall. The firewall can also be configured using its built-in command-line interface (CLI) or Web-based user interface (WebUI). To avoid conflicting configurations, which two interfaces must you use to configure the firewall enforcer?()A、CLIB、WebUIC、NSMD、Junos Pulse Access Control Service

You are performing the initial setup of a new MAG Series device and have installed a valid CA- signed certificate on the MAG Series device. Connectivity to an existing SRX Series firewall enforcer cannot be obtained.What are two explanations for this behavior?()A、The MAG Series device has multiple ports associated with the certificate.B、The MAG Series device's serial number needs to be configured on the SRX Series device.C、The SRX Series device must have a certificate signed by the same authority as the MAG Series device.D、The MAG Series device and SRX Series device are not synchronized to an NTP server.

You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange  Server 2010 organization.Company.com contains an exchange server 2010 server named -sr15 that has the following roles installed: client access, hub transport, and mailbox server.the Company.com also has a windows server 2008 r2 certification authority (ca).Company.com has merged with another company named Courseware Publishers that contains an internal root C A.You have received instructions from the CIO to install a certificate to create the federated trust as well as to reduce the cost. What should you do?()A、You need to set up a computer certificate request on -sr15; thereafter you should submit the request to a third-party trusted caB、You need to use -sr15 and generate a self-signed certificateC、You need to use request a computer certificate from the Company.com.com ca from -sr15D、You need to set up a computer certificate request on -sr15; thereafter you should submit the request to courseware publishers ca

You have an enterprise subordinate certification authority (CA). You have a custom Version 3  certificate template.     Users can enroll for certificates based on the custom certificate template by using the Certificates  console.     The certificate template is unavailable for Web enrollment. You need to ensure that the certificate  template is available on the Web enrollment pages.     What should you do()A、Run certutil.exe -pulse.B、Run certutil.exe -installcert.C、Change the certificate template to a Version 2 certificate template.D、On the certificate template, assign the Autoenroll permission to the users.

You have a server that runs Windows Server 2003 Service Pack 2 (SP2). The server contains one volume. You install Certificate Services. You need to back up the Certificates Services database by using the minimum amount of storage space. Which tool should you use? ()A、Certification Authority snap-inB、Certificates snap-inC、Certificate Templates snap-inD、Windows Backup

Your company has an internal Web site that requires HTTPS. The Web site s certificate is self-signed. Youhave a computer that runs Windows 7 and Windows Internet Explorer 8. You use HTTPS to browse to theWeb site and receive the following warning message: There is a problem with this website s security certificate. You need to prevent the warning message from appearing when you access the Web site.  What should you do?()A、From Internet Explorer, enable InPrivate Browsing.B、From Internet Explorer, add the Web site to the Trusted sites zone.C、From Certificate Manager, import the Web site s certificate into your Personal store.D、From Certificate Manager, import the Web site s certificate into your Trusted Root CertificationAuthorities store.

You have a server named Server1 that has the following Active Directory Certificate Services (AD CS)   role services installed:   ( Enterprise root certification authority (CA)  .Certificate Enrollment Web Service   .Certificate Enrollment Policy Web Service   You create a new certificate template.   External users report that the new template is unavailable when they request a new certificate.  You verify that all other templates are available to the external users.   You need to ensure that the external users can request certificates by using the new template.  What should you do on Server1()A、Run iisreset.exe /restart.  B、Run gpupdate.exe /force.  C、Run certutil.exe dspublish.D、Restart the Active Directory Certificate Services service.

You have a self-hosted Windows Communication Foundation (WCF) service. You need to configure the service to provide an X509 certificate during authentication. What should you use to configure the service?()A、the Certificate property of the X509 Certificate lnitiator Service Credential classB、the SetCertificate method of the X509 Certificate Initiator Service Credential classC、the SetCertificate method of the X509 Certificate Recipient Service Credential classD、the TrustedStoreLocation property of the X509 Certificate Recipient Service Credential class

You purchase a wildcard certificate.You plan to use the certificate for Outlook Anywhere. You need to configure an Exchange organization to use the certificate.What should you do first?()A、From the Exchange Management Shell, modify the properties of the WEB Outlook Provider.B、From the Exchange Management Shell, modify the properties of the EXPR Outlook Provider.C、From the Internet Information Services (IIS) Manager, modify the properties of the RPC virtual directory.D、From the Internet Information Services (IIS) Manager, modify the properties of the Autodiscover virtual directory.

单选题You have a self-hosted Windows Communication Foundation (WCF) service. You need to configure the service to provide an X509 certificate during authentication. What should you use to configure the service?()Athe Certificate property of the X509 Certificate lnitiator Service Credential classBthe SetCertificate method of the X509 Certificate Initiator Service Credential classCthe SetCertificate method of the X509 Certificate Recipient Service Credential classDthe TrustedStoreLocation property of the X509 Certificate Recipient Service Credential class

单选题You are validating the configuration of your SRX Series device and see the output shown below. What does this indicate?()A The SRX Series device has been configured correctly, the Junos Pulse Access Control Service is reachable on the network, and the SRX Series device is waiting to receive the initial connection from the Junos Pulse Access Control Service.B The SRX Series device has confirmed that the Junos Pulse Access Control Service is configured and is reachable on the network, the SRX Series device is waiting to receive the connection from the Junos Pulse Access Control Service, and all that remains to be accomplished is to configure the SRX Series device.C The SRX Series device is configured correctly and connected to the Junos Pulse Access Control Service. All that remains to be done to complete the configuration is to configure the SRX Series device on the Junos Pulse Access Control Service.D Both the Junos Pulse Access Control Service and the SRX Series device are configured correctly and communicating with each other.

单选题You have a server named Server1 that has the following Active Directory Certificate Services (AD CS)   role services installed:   ( Enterprise root certification authority (CA)  .Certificate Enrollment Web Service   .Certificate Enrollment Policy Web Service   You create a new certificate template.   External users report that the new template is unavailable when they request a new certificate.  You verify that all other templates are available to the external users.   You need to ensure that the external users can request certificates by using the new template.  What should you do on Server1()ARun iisreset.exe /restart.  BRun gpupdate.exe /force.  CRun certutil.exe dspublish.DRestart the Active Directory Certificate Services service.

单选题You have multiple realms configured on a MAG Series device. A user is authenticating with a non- Junos Pulse Access Control Service client. The username does not contain a realm suffix.Which behavior will the user experience?()AThe user will not be able to log-in, as the Junos Pulse Access Control Service device cannot map the user to a realm when the realm value is empty.BThe user will be mapped to all realms available to the user.CThe Junos Pulse Access Control Service device displays a page where the user must choose from a list of realms.DThe endpoint is assigned to the first realm in the list whose authentication server is a match with the endpoints software.

单选题You have configured the Odyssey Access Client with a profile which has the "Disable Server Verification" setting cleared.What will be the result if the device certificate on the MAG Series device has expired and the user attempts to authenticate?()AThe user will be instructed to call the network administrator.BThe user will fail authentication.CThe user will be prompted to install a new device certificate on the MAG Series device.DThe user will successfully authenticate and have full network access.

单选题You have an enterprise subordinate certification authority (CA). You have a custom Version 3 certificate template.  Users can enroll for certificates based on the custom certificate template by using the Certificates console. The certificate template is unavailable for Web enrollment. You need to ensure that the certificate template is available on the Web enrollment pages. What should you do()ARun certutil.exe pulse.BRun certutil.exe installcert.CChange the certificate template to a Version 2 certificate template.DOn the certificate template, assign the Autoenroll permission to the users.

单选题You are setting up a Junos Pulse Access Control Service. You cannot obtain a device certificate from an external certificate authority.Which tool should you use to generate a device certificate?()AOpenSSLBOpenSSHCOpenLDAPDOpenRADIUS

单选题You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange  Server 2010 organization.Company.com contains an exchange server 2010 server named -sr15 that has the following roles installed: client access, hub transport, and mailbox server.the Company.com also has a windows server 2008 r2 certification authority (ca).Company.com has merged with another company named Courseware Publishers that contains an internal root C A.You have received instructions from the CIO to install a certificate to create the federated trust as well as to reduce the cost. What should you do?()AYou need to set up a computer certificate request on -sr15; thereafter you should submit the request to a third-party trusted caBYou need to use -sr15 and generate a self-signed certificateCYou need to use request a computer certificate from the Company.com.com ca from -sr15DYou need to set up a computer certificate request on -sr15; thereafter you should submit the request to courseware publishers ca