Set up a certificate authentication server.
Configure the authentication realm to remember certificate information.
Configure the authentication realm to use a certificate server for authentication.
Configure a role mapping rule requiring certification information to map user to role.
第1题:
A. Modify sign-in policy.
B. Configure role mapping.
C. Assign authentication server.
D. Configure authentication policy.
第2题:
Which additional configuration step is necessary in order to connect to an access point that has SSID broadcasting disabled?()
第3题:
A. Configure an authentication policy as part of the user role definitions.
B. Configure a Sign-in Policy.
C. Configure authentication agents as part of the user role definitions
D. Configure an authentication policy as part of the authentication realm definition.
第4题:
You want to enforce a Host Checker policy so that only users who pass the policy receive the Employee role. In the admin GUI, which two parameters must you configure?()
第5题:
Using an LDAP authentication server, what do you configure to validate certificate attributes?()
第6题:
A. Set up a certificate authentication server.
B. Configure the authentication realm to remember certificate information.
C. Configure the authentication realm to use a certificate server for authentication.
D. Configure a role mapping rule requiring certification information to map user to role.
第7题:
What are two steps to configure user authentication for a Junos Pulse Access Control Service?()
第8题:
A. Configure IP helper to forward the authentication requests from the clients to the external RADIUS server
B. Configure the supplicant as anexternal authentication server
C. Configure RADIUS proxy on the realm
D. Specify the correct RADIUS port 389 on the Junos Pulse Access Control Service
第9题:
When using RADIUS as an external authentication method for 802.1X authentication for the Junos Pulse Access Control Service, what must you do to ensure that the RADIUS authentication works properly?()
第10题:
Your security policy requires that users authenticating to the Junos Pulse Access Control Service are connecting from a domain member endpoint on the internal corporate network.Which set of role access restrictions must you configure to enforce this security policy?()