Which protocol is used for communication between the Junos Pulse client and 802.1X-compliant switches when per
Which protocol is used for communication between the Junos Pulse client and 802.1X-compliant
switches when performing Layer 2 enforcement?
What must you do before changing the cluster configuration?
You are an administrator of an active/passive cluster of MAG Series devices running in mixedmode configuration (IF-MAP server and authenticating users). The active user count is quickly
approaching the maximum limit of the cluster. You have been directed to reconfigure the cluster to
an active/active cluster and add a new license to increase the total number of active users the
cluster can support.
What must you do before changing the cluster configuration?
Which explanation would cause this behavior?
You are customizing the user interface options for the finance department in your organization.
Users in the department are able to see a session counter on the Web interface of the Junos
Pulse Access Control Service. The CFO is unable to see the session counter.
Which explanation would cause this behavior?
which entry is permitted when defining the specific resources?
When configuring resource access policies in a Junos Pulse Access Control Service device, which
entry is permitted when defining the specific resources?
Which process should the administrator follow?
Two MAG4610s are running in an active/passive cluster configuration. The system administrator is
planning to apply a service package to the cluster.
Which process should the administrator follow?
which two troubleshooting tools on a MAG Series device would you use to identify the cause of an authenticatio
Without calling JTAC, which two troubleshooting tools on a MAG Series device would you use to
identify the cause of an authentication failure?
What information does the Junos Pulse Access Control Service provide to Security Threat Response Manager (STRM
What information does the Junos Pulse Access Control Service provide to Security Threat
Response Manager (STRM)? (Choose two.)
Which two actions must be performed to allow the new Junos Pulse Access Control Service to load the older vers
A customer has purchased a new Junos Pulse Access Control Service and wants to install it in an
existing cluster. After initial configuration, the customer finds that the firmware version running on
the Junos Pulse Access Control Service is 4.1 r5, but the existing cluster is running firmware
version 4.1 r3.
Which two actions must be performed to allow the new Junos Pulse Access Control Service to
load the older version of firmware? (Choose two.)
Which three authentication resources are grouped within an authentication realm?
Which three authentication resources are grouped within an authentication realm? (Choose three.)
Which two steps must you take to accomplish this task?
You want to create a security policy on an SRX240 that redirects unauthenticated users back to
the Junos Pulse Access Control Service.
Which two steps must you take to accomplish this task? (Choose two.)