What are two roles of the authenticator as described in the 802.1X standard?
What are two roles of the authenticator as described in the 802.1X standard? (Choose two.)
What are three elements the Junos Pulse Access Control Service uses to establish endpoint access to protected
What are three elements the Junos Pulse Access Control Service uses to establish endpoint
access to protected resources? (Choose three.)
which policy element would you enable to accommodate these users?
You are an administrator of a large campus network. Every switch on a floor within each building
of your campus has been configured for a different VLAN. During implementation of the Junos
Pulse Access Control Service, you must configure a RADIUS return attribute policy to apply a role
representing a group of authenticated users that frequently transport their laptops from building to
building and floor to floor.
In the admin GUI, which policy element would you enable to accommodate these users?
Which two troubleshooting tools would you use on the Junos Pulse Access Control Service to resolve the issue?
A new software engineer has been hired. As part of the normal hiring process, the user was added
to the Active Directory and placed into the Domain Users group and the SW_DEV group. The
Domain Users group has access to the company’s intranet website and time card system. The
SW_DEV group has access to the source code library server. You have created roles that
correspond to each Active Directory group. The user calls the help desk stating that they cannot
access the source code library server.
Which two troubleshooting tools would you use on the Junos Pulse Access Control Service to
resolve the issue? (Choose two.)
Which two Host Checker policy rules would be used to enforce this requirement?
You administer a network with Windows-based endpoints that have custom software images. You
want to use Host Checker to require that endpoints are running the custom software image.
Which two Host Checker policy rules would be used to enforce this requirement? (Choose two.)
When would you use the redirect-traffic all command?
You are configuring captive portal on your SRX Series device for guest user access.
When would you use the redirect-traffic all command?
How do you configure the IP address on the SRX Series devices?
You are deploying a Junos Pulse Access Control Service cluster in active/passive mode. How do
you configure the IP address on the SRX Series devices?
Which three features are supported with the Junos Pulse client?
Which three features are supported with the Junos Pulse client? (Choose three.)
Which two statements are true?
In the admin GUI, you navigate to “System” > “Status” > “Active Users”. You see several buttons,
including “Delete Session”, “Delete All Sessions”. “Refresh Roles”, and “Disable All Users”.
Which two statements are true? (Choose two.)