多选题You have a firewall enforcer protecting resources in a data center. A user is experiencing difficulty connecting to a protected resource.Which two elements must exist so the user can access the resource?()AResource access policy on the MAG Series deviceBIPsec routing policy on the MAG Series deviceCGeneral traffic policy blocking access through the firewall enforcerDAuth table entry on the firewall enforcer

多选题
You have a firewall enforcer protecting resources in a data center. A user is experiencing difficulty connecting to a protected resource.Which two elements must exist so the user can access the resource?()
A

Resource access policy on the MAG Series device

B

IPsec routing policy on the MAG Series device

C

General traffic policy blocking access through the firewall enforcer

D

Auth table entry on the firewall enforcer


参考解析

解析: 暂无解析

相关考题:

单选题Your corporate security policy requires that a user performing attacks must have limited network access and activities until an administrator can investigate.In the admin GUI, which sensor event policy action must you configure in "Configuration" "Sensors" "Sensor Event Policies" [rule name] to accomplish this?()AIgnoreBReplace users roleCTerminate user sessionDDisable user account

单选题You are setting up a Junos Pulse Access Control Service. You cannot obtain a device certificate from an external certificate authority.Which tool should you use to generate a device certificate?()AOpenSSLBOpenSSHCOpenLDAPDOpenRADIUS

多选题Which two actions are available in the GUI for creating location awareness rules?()AWINS serverBDNS serverCIP reachabilityDResolve address

多选题You are configuring an LDAP authentication server, and you want to configure role-mapping rules based on group membership. When you attempt to search for groups in the server catalog, no groups appear.Assuming the LDAP server is reachable and functioning properly, in the admin GUI. Which two parts of the configuration should you verify are correct?()AFinding user entriesBAuthentication requiredCLDAP Server TypeDDetermining group membership

单选题Which protocol is used for communication between the Junos Pulse client and 802.1X-compliant switches when performing Layer 2 enforcement?()AEAPBRADIUSCSSLDEAP-o-HTTP

多选题Which two considerations must you take into account when deploying a Junos Pulse Access Control Service cluster?()AState synchronization occurs only through the internal network interface card (NIC)BLatency of the WAN must be less than 300 ms.CAuthenticating endpoints must be on the same LAN segment.DCluster members must use the same hardware platfor

多选题A customer has purchased a third-party switch to use for Layer 2 access with their Junos Pulse Access Controe Service. When configuring the switch on the Junos Pulse Access Control Service, the customer does not find a make/model entry for it . Which two actions should the customer take to make the switch work with the Junos Pulse Access Control Service?()AAdd the switch to the Junos Pulse Access Control Service as a standard RADIUS.BAdd the switch to the Junos Pulse Access Control Service using the Any make/model.CAdd the switch as a firewall enforcer.DObtain and configure the RADIUS dictionary for the switch and use that vendor listing for the make/model.