多选题You have a firewall enforcer protecting resources in a data center. A user is experiencing difficulty connecting to a protected resource.Which two elements must exist so the user can access the resource?()AResource access policy on the MAG Series deviceBIPsec routing policy on the MAG Series deviceCGeneral traffic policy blocking access through the firewall enforcerDAuth table entry on the firewall enforcer

多选题
You have a firewall enforcer protecting resources in a data center. A user is experiencing difficulty connecting to a protected resource.Which two elements must exist so the user can access the resource?()
A

Resource access policy on the MAG Series device

B

IPsec routing policy on the MAG Series device

C

General traffic policy blocking access through the firewall enforcer

D

Auth table entry on the firewall enforcer


参考解析

解析: 暂无解析

相关考题:

多选题What are three benefits of IF-MAP Federation?()AEnables seamless access for remote access users to firewall enforcer protected resources.BScales a Junos Pulse Access control Service deployment beyond the capacity of a single cluster.CEnables dynamic configuration synchronization across multiple MAG Series devices.DProvides a substitute for WAN clustering among geographically separated MAG Series devices.EShares non-localized DP integration and IPsec configuration information between multiple Junos Pulse Access Control Service instances.

单选题You want to create a Host Checker policy that looks for a specific antivirus product that is running on your client machines, but the predefined antivirus options do not include the antivirus product version that you use.Which feature should you verify the antivirus product is up to date?()AEnhanced Endpoint SecurityBDP signaturesCAntivirus licensingDEndpoint Security Assessment Plug-in

单选题When configuring resource access policies in a Junos Pulse Access Control Service device, which entry is permitted when defining the specific resources?()AHostnameBfully qualified domain nameCIP addressDaddress book entry

单选题You navigate to "UAC" "Infranet Enforcer" "Auth Table Mapping" in the admin GUI. You see one policy, which is the unmodified, original default policy.Which statement is true?()ADynamic auth table mapping is not enabled.BA successful authentication attempt will result in a new authentication table entry, which will be delivered only to the Junos enforcer protecting the network from which the user has authenticated.CTo create a static auth table mapping, you must delete the default policy.DThe default policy applies only to the factory-default role User.

单选题When configuring a single SRX210 as a firewall enforcer to a MAG4610 active/passive cluster, which statement supports a fault-tolerant configuration?()AThe cluster VIP is defined on the MAG4610 cluster, and the VIP of the cluster is defined as an instance on the SRX Series device.BThe cluster VIP is not defined on the MAG4610 cluster, and the IP address of both the active and passive nodes of the cluster are defined as separate instances on the SRX Series device.CThe cluster VIP is defined on the MAG4610 cluster, and the IP address of the active node is defined as an instance on the SRX Series device.DThe cluster VIP is not defined on the MAG4610 cluster, and the IP address of the passive node is defined as an instance on the SRX Series device.