多选题A customer has purchased a new Junos Pulse Access Control Service and wants to install it in an existing cluster.After initial configuration, the customer finds that the firmware version running on the Junos Pulse Access Control Service is 4.1 r5, but the existing cluster is running firmware version 4.1 r3. Which two actions must be performed to allow the new Junos Pulse Access Control Service to load the older version of firmware?()AInstall a valid license on the new Junos Pulse Access Control Service.BWhen loading the older firmware, delete all the existing data on the Junos Pulse Access Control Service.CAdd the new Junos Pulse Access Control Service to the existing cluster.DDownload the 4.1 r3 version firmware from the Juniper support website.

多选题
A customer has purchased a new Junos Pulse Access Control Service and wants to install it in an existing cluster.After initial configuration, the customer finds that the firmware version running on the Junos Pulse Access Control Service is 4.1 r5, but the existing cluster is running firmware version 4.1 r3. Which two actions must be performed to allow the new Junos Pulse Access Control Service to load the older version of firmware?()
A

Install a valid license on the new Junos Pulse Access Control Service.

B

When loading the older firmware, delete all the existing data on the Junos Pulse Access Control Service.

C

Add the new Junos Pulse Access Control Service to the existing cluster.

D

Download the 4.1 r3 version firmware from the Juniper support website.


参考解析

解析: 暂无解析

相关考题:

多选题In the Junos Pulse Access Control Service, which three actions are only available in the admin GUI? ()ATake a System SnapshotBConfigure LicensingCReview the EventsDSet the date and timeEUpgrade or downgrade the firmware

单选题You are the administrator of a Junos Pulse Access Control Service implementation. You must restrict authenticated users connected from the branch offices to a few specific resources within the data center. However, when the authenticated users are connected at the corporate office, they are allowed more access to the data center resources. You have created two roles with different levels of access and are trying to determine the best way of controlling when a user is mapped to a specific role. Having the user prompted to manually select their role is possible, but you want to automate the process. Which configuration solves this problem?()AImplement a RADIUS request attribute policy to assist with realm selection and create different role-mapping rules for the user in each realm.BImplement a directory/attribute server on the realm and set up this server to determine by group membership the proper role to which a user should be mapped.CReorder the role-mapping rules to allow for the more open role to be mapped first and then enable the stop processing rules when this rule matches function on this role.DImplement a Host Checker policy on the realm that determines the geographic location of the device and restricts the user based on the results of the policy.

单选题An administrator has created three different Odyssey Access Client preconfiguration files and assigned them to three different roles in the same realm.Which action should the administrator take to ensure that users get the correct Odyssey Access Client preconfiguration file?()AConfigure each user account in the auth server with the appropriate Odyssey Access Client preconfiguration files.BConfigure the role-mapping rules with the appropriate Odyssey Access Client preconfiguration files.CEnsure that merge roles is selected in the role-mapping rules.DEnsure that the first role a user is mapped to is the role with the appropriate Odyssey Access Client preconfiguration file.

多选题What are two use cases enabled by IF-MAP Federation?()AUsers authenticated to one Junos Pulse Access Control Service can transparently access resources protected by another Junos Pulse Access Control Service.BUsers authenticated to a Junos Pulse Access Control Service can transparently access resources protected by a Junos Pulse Secure Access Service.CRemote access users authenticated to a Junos Pulse Secure Access Service can transparently access resources protected by a Junos Pulse Access Control Service.DRemote access users authenticated to one Junos Pulse Secure Access Service can transparently access resources protected by another Junos Pulse Secure Access Service.

单选题A users Junos Pulse client uses 802.1X to access a wired network and is failing to authenticate. You run a packet capture from the users PC and notice that immediately after the client machine sends an EAPoL-start packet, an EAP-failure packet is returned. You review the RADIUS troubleshooting logs on the MAG Series device and do not see any authentication attempts from the user. Other users on the same Ethernet switch are successfully authenticating. Which device is sending the EAP-failure packet to the workstation?()AThe RADIUS serverBThe EAPoL serverCThe workstation's network adapterDThe Ethernet switch

单选题Which Junos Pulse Access Control Service client provides a built-in viewer to access local logs?()AOdyssey Access ClientBJunos PulseCJava agentDAgent less access

多选题Your IT director has decided to allow employees to use their laptops at home as well as in the office. You have deployed the Junos Pulse client to allow access to the offices 802.1X-enabled wired network. Your company also has the Junos Pulse Secure Access Service deployed. You want the Junos Pulse client to automatically launch the appropriate access method depending on each users location. Which three are supported to determine the users location?()AMAC addressBDNS serverCDHCP serverDresolve addressEendpoint address

单选题Your IT manager has requested that you start providing weekly reports of CPU utilization on all network devices.Which monitoring function should be enabled on the MAG Series device?()AAdmin loggingBSNMP loggingCSyslog server loggingDEvent logging

单选题Which Junos Pulse feature allows the user to log in once through a Junos Pulse Secure Access Service on the network and then access resources protected by a Junos Pulse Access Control Service without reauthentication?()ARoaming SessionBSession MigrationCLocation AwarenessDPersistent Session