Which three features are supported with the Junos Pulse client?()A、third-party RADIUS supportB、Host EnforcerC、Host CheckerD、IPsecE、soft tokens
Which three features are supported with the Junos Pulse client?()
- A、third-party RADIUS support
- B、Host Enforcer
- C、Host Checker
- D、IPsec
- E、soft tokens
相关考题:
Your security policy requires that users authenticating to the Junos Pulse Access Control Service are connecting from a domain member endpoint on the internal corporate network.Which set of role access restrictions must you configure to enforce this security policy?()A. Source IP and browserB. Source IP and certificateC. Certificate and Host CheckerD. Host Checker and source IP
Your IT director has decided to allow employees to use their laptops at home as well as in the office. You have deployed the Junos Pulse client to allow access to the offices 802.1X-enabled wired network. Your company also has the Junos Pulse Secure Access Service deployed. You want the Junos Pulse client to automatically launch the appropriate access method depending on each users location.Which three are supported to determine the users location?()A. MAC addressB. DNS serverC. DHCP serverD. resolve addressE. endpoint address
Which three features are supported with the Junos Pulse client?() A. third-party RADIUS supportB. Host EnforcerC. Host CheckerD. IPsecE. soft tokens
A customer is trying to determine which client to deploy. The customer wants to be able to perform Layer 2 authentication as well as connect to the Junos Pulse Secure Access Service.Which client should the customer deploy?()A. Windows native supplicantB. Odyssey Access ClientC. Junos PulseD. Network Connect
What are two features provided by the Junos Pulse client?() A. 802.1XB. video messagingC. IPsecD. VoIP
Which three types of policies must you configure to allow remote users transparent access to protected resources using IF-MAP Federation between a Junos Pulse Secure Access Service and a Junos Pulse Access Control Service?()A. Session-Export policies on the Junos Pulse Secure Access ServiceB. Session-Export policies on the Junos Pulse Access Control ServiceC. Session-Import policies on the Junos Pulse Secure Access ServiceD. Session-Import policies on the Junos Pulse Access Control ServiceE. Resource access policies on the Junos Pulse Access Control Service
In a Junos Pulse Access Control Service active/active clustered environment, which statement is true about VIPs?() A. VIP is not required when using only agentless access for all endpoint platforms.B. VIP is not required when using Junos Pulse or Odyssey Access Client for all endpoint platforms.C. VIP is not required when using Junos Pulse and agentless access for all endpoint platforms.D. VIP is not required when using Odyssey Access Client and agentless access for all endpoint platforms.
The remote host parameter configured on the LNS must match which parameter on the LAC?() A.hostnameB.hostC.client-nameD.remote-host
A client host uses IPv4 to communicate with one ser ver and IPv6 to communicate with another.Which of the following IPv6 coexistence features is likely at work on the host?() A. Native IPv6B. Point - to -point tunnelsC. Multipoint tunnelsD. NAT - PTE. Dual stacks
pany has implemented 802.1X authentication as a security enhancement. Which statement is true about 802.1x port-based authentication?()A、 TACACS+ is the only supported authentication server type.B、 If a host initiates the authentication process and does not receive a response, it assumes it is not authorized.C、 RADIUS is the only supported authentication server type.D、 Before transmitting data, an 802.1x host must determine the authorization state of the switch.E、 Hosts are required to havea 802.1x authentication client or utilize PPPoE.F、 None of the other alternatives apply.
What are two features provided by the Junos Pulse client?()A、802.1XB、video messagingC、IPsecD、VoIP
Which Junos Pulse Access Control Service client provides a built-in viewer to access local logs?()A、Odyssey Access ClientB、Junos PulseC、Java agentD、Agent less access
Your IT director has decided to allow employees to use their laptops at home as well as in the office. You have deployed the Junos Pulse client to allow access to the offices 802.1X-enabled wired network. Your company also has the Junos Pulse Secure Access Service deployed. You want the Junos Pulse client to automatically launch the appropriate access method depending on each users location. Which three are supported to determine the users location?()A、MAC addressB、DNS serverC、DHCP serverD、resolve addressE、endpoint address
A client host uses IPv4 to communicate with one ser ver and IPv6 to communicate with another.Which of the following IPv6 coexistence features is likely at work on the host?()A、Native IPv6B、Point - to -point tunnelsC、Multipoint tunnelsD、NAT - PTE、Dual stacks
When run on a machine called client, which of the following commands would mount the /usr/local/bin directory from the host machine over the /home/bin directory on client?()A、mount host:/usr/local/bin /home/binB、mount client:/home/bin /usr/local/binC、mount -o client:/usr/local/bin /home/binD、mount -n host:/home/bin /usr/local/bin
When run on a machine called client, which of the following commands will mount the /usr/local/bin directory from the host over the /home/bin directory on client?()A、mount host:/home/bin /usr/local/binB、mount client:/home/bin /usr/local/binC、mount -n host /usr/local/bin /home/binD、mount -o host:/usr/local/bin /home/bin
Your security policy requires that users authenticating to the Junos Pulse Access Control Service are connecting from a domain member endpoint on the internal corporate network.Which set of role access restrictions must you configure to enforce this security policy?()A、Source IP and browserB、Source IP and certificateC、Certificate and Host CheckerD、Host Checker and source IP
The remote host parameter configured on the LNS must match which parameter on the LAC?()A、hostnameB、hostC、client-nameD、remote-host
A customer has purchased a third-party switch to use for Layer 2 access with their Junos Pulse Access Controe Service. When configuring the switch on the Junos Pulse Access Control Service, the customer does not find a make/model entry for it . Which two actions should the customer take to make the switch work with the Junos Pulse Access Control Service?()A、Add the switch to the Junos Pulse Access Control Service as a standard RADIUS.B、Add the switch to the Junos Pulse Access Control Service using the "Any" make/model.C、Add the switch as a firewall enforcer.D、Obtain and configure the RADIUS dictionary for the switch and use that vendor listing for the make/model.
Which three types of policies must you configure to allow remote users transparent access to protected resources using IF-MAP Federation between a Junos Pulse Secure Access Service and a Junos Pulse Access Control Service?()A、Session-Export policies on the Junos Pulse Secure Access ServiceB、Session-Export policies on the Junos Pulse Access Control ServiceC、Session-Import policies on the Junos Pulse Secure Access ServiceD、Session-Import policies on the Junos Pulse Access Control ServiceE、Resource access policies on the Junos Pulse Access Control Service
You want to provide all users in your corporation with a single agent that provides access to multiple connection types conditionally. For example, you connect to the Junos Pulse Access Control Service if you are connected to the intranet, but you connect to the Junos Pulse Secure Access Service if you are on a remote network. Which agent should you use for this type of connection requirement?()A、Junos Pulse should be configured with location awareness rules configured.B、Odyssey Access Client should be installed with Host Checker configured to check the client's location.C、Junos Pulse should be configured with all components installed.D、Agentless access should be enabled so that clients can connect to any service without concern for installing an agent.
You have three classes of users on your network: employee, contractor, and IT administrator. You configure the Junos Pulse Access Control Service to assign roles to each user class and require that a specific wireless SSID be preconfigured for the Odyssey Access Client based on the role. Which configuration method should you use to satisfy this scenario?()A、Create a "Settings Update file" in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under "User Roles" "Agent" "Odyssey Settings" "Preconfigured Installer".B、Configure a wired adapter and assign the required SSID under "User Roles" "Agent" "Odyssey Settings".C、Create a script in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under "User Roles" "Agent" "Odyssey Settings" "Preconfigured Installer".D、Create a "Preconfiguration file" in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under "User Roles" "Agent" "Odyssey Settings" "Preconfigured Installer".
A customer is trying to determine which client to deploy. The customer wants to be able to perform Layer 2 authentication as well as connect to the Junos Pulse Secure Access Service.Which client should the customer deploy?()A、Windows native supplicantB、Odyssey Access ClientC、Junos PulseD、Network Connect
单选题A client host uses IPv4 to communicate with one ser ver and IPv6 to communicate with another.Which of the following IPv6 coexistence features is likely at work on the host?()ANative IPv6BPoint - to -point tunnelsCMultipoint tunnelsDNAT - PTEDual stacks
单选题You want to provide all users in your corporation with a single agent that provides access to multiple connection types conditionally. For example, you connect to the Junos Pulse Access Control Service if you are connected to the intranet, but you connect to the Junos Pulse Secure Access Service if you are on a remote network. Which agent should you use for this type of connection requirement?()AJunos Pulse should be configured with location awareness rules configured.BOdyssey Access Client should be installed with Host Checker configured to check the client's location.CJunos Pulse should be configured with all components installed.DAgentless access should be enabled so that clients can connect to any service without concern for installing an agent.
多选题Which three user authentication methods are supported by the Junos OS?()ARADIUSBCHAPClocal user databaseDTACACS+EPAP
多选题Which three features are supported with the Junos Pulse client?()Athird-party RADIUS supportBHost EnforcerCHost CheckerDIPsecEsoft tokens