CMS专题

单选题You are installing a new deployment of the Junos Pulse Access Control Service. You have an existing RADIUS server that has a populated user file. You are considering using the RADIUS proxy feature.Which consideration must you take into account?()A Your

题目
单选题
You are installing a new deployment of the Junos Pulse Access Control Service. You have an existing RADIUS server that has a populated user file. You are considering using the RADIUS proxy feature.Which consideration must you take into account?()
A

Your RADIUS server database must be replicated onto another device for redundancy.

B

Inner proxy creates a tunnel between the supplicant and the external server.

C

RADIUS proxy causes the role assignment process to be skipped.

D

Outer proxy configuration passes authentication data to the external RADIUS server in clear text.

如果没有搜索结果,请直接 联系老师 获取答案。
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

You want to provide 802.1X access for Windows clients using Junos Pulse as the agent. Which two considerations must you take into account()

A.Junos Pulse out erauth entication uses EAP-PEAP.

B.Junos Pulse ou terauth entication uses EAP-TTLS.

C.Junos Pulse innerauth entication uses EAP-MSCHAP-V2.

D.Theend point must use thenative Microsoft 802.1X supplicant.


参考答案:B, D

第2题:

You have configured Junos Pulse on your Windows desktop and want to verify that the IPsec configuration policy is being pushed down to your workstation upon network authentication and login.Which utility program do you use to see this configuration and where do you find it?()

  • A、the Pulse Diagnostics Tool in the "File" > "Tools" menu option in the Pulse GUI
  • B、the Pulse Diagnostics Tool in the "Start" > "All Programs" > "Juniper Networks" > "Junos Pulse" menu folder next to the Junos Pulse application
  • C、the Pulse Diagnostics Viewer, which you access by simultaneously pressing "Ctrl" and "F2"
  • D、the Pulse Diagnostics Viewer in the "File" > "Tools" menu option in the Pulse GUI

正确答案:C

第3题:

Which Junos Pulse feature allows the user to log in once through a Junos Pulse Secure Access Service on the network and then access resources protected by a Junos Pulse Access Control Service without reauthentication?()

A. Roaming Session

B. Session Migration

C. Location Awareness

D. Persistent Session


参考答案:B

第4题:

You want to provide all users in your corporation with a single agent that provides access to multiple connection types conditionally. For example, you connect to the Junos Pulse Access Control Service if you are connected to the intranet, but you connect to the Junos Pulse Secure Access Service if you are on a remote network. Which agent should you use for this type of connection requirement?()

  • A、Junos Pulse should be configured with location awareness rules configured.
  • B、Odyssey Access Client should be installed with Host Checker configured to check the client's location.
  • C、Junos Pulse should be configured with all components installed.
  • D、Agentless access should be enabled so that clients can connect to any service without concern for installing an agent.

正确答案:A

第5题:

A customer is deploying a new Junos Pulse Access Control Service and has completed the initial boot configuration as prompted using a serial connection. The customer now wants to complete the rest of the configuration using the admin GUI.Into which port on the Junos Pulse Access Control Service should the customer plug the network cable to enable access to the admin GUI?()

  • A、the internal interface
  • B、the external interface
  • C、the management interface
  • D、the console interface

正确答案:A

第6题:

Which three types of policies must you configure to allow remote users transparent access to protected resources using IF-MAP Federation between a Junos Pulse Secure Access Service and a Junos Pulse Access Control Service?()

A. Session-Export policies on the Junos Pulse Secure Access Service

B. Session-Export policies on the Junos Pulse Access Control Service

C. Session-Import policies on the Junos Pulse Secure Access Service

D. Session-Import policies on the Junos Pulse Access Control Service

E. Resource access policies on the Junos Pulse Access Control Service


参考答案:A, D, E

第7题:

You are installing a new deployment of the Junos Pulse Access Control Service. In your environment, you have VoIP handsets that support 802.1X authentication with EAP-MD5.Which deployment constraint must you consider?()

  • A、EAP-MD5 is not supported by the Junos Pulse Access Control Service
  • B、EAP-MD5 requires passwords to be stored in an encrypted format.
  • C、EAP-MD5 requires passwords to be stored in a clear text format.
  • D、EAP-MD5 performs a real time hash of the handset's MAC address.

正确答案:C

第8题:

Your IT director has decided to allow employees to use their laptops at home as well as in the office. You have deployed the Junos Pulse client to allow access to the offices 802.1X-enabled wired network. Your company also has the Junos Pulse Secure Access Service deployed. You want the Junos Pulse client to automatically launch the appropriate access method depending on each users location.Which three are supported to determine the users location?()

A. MAC address

B. DNS server

C. DHCP server

D. resolve address

E. endpoint address


参考答案:B, D, E

第9题:

Which Junos Pulse feature allows the user to log in once through a Junos Pulse Secure Access Service on the network and then access resources protected by a Junos Pulse Access Control Service without reauthentication?()

  • A、Roaming Session
  • B、Session Migration
  • C、Location Awareness
  • D、Persistent Session

正确答案:B

第10题:

You want to provide 802.1X access for Windows clients using Junos Pulse as the agent. Which two considerations must you take into account()

  • A、Junos Pulse out erauth entication uses EAP-PEAP.
  • B、Junos Pulse ou terauth entication uses EAP-TTLS.
  • C、Junos Pulse innerauth entication uses EAP-MSCHAP-V2.
  • D、Theend point must use thenative Microsoft 802.1X supplicant.

正确答案:B,D

更多相关问题