What is the default role-mapping behavior?
An outside vendor is eligible for the guest role and the contractor role when accessing your
network, that is secured with the Junos Pulse Access Control Service.
What is the default role-mapping behavior?
Which two statements about static NAT are true?
Which two statements about static NAT are true? (Choose two.)
Which three statements are true?
Which two statements are true?
You administer a network containing SRX Series firewalls. New policy requires that you implement
MAG Series devices to provide access control for end users. The policy requires that the SRX
Series devices dynamically enforce security policy based on the source IP address of the user.
The policy also requires that the users communicate with protected resources using encrypted
traffic.
Which two statements are true? (Choose two.)
Which three configuration areas were updated by system.cfg?
Before replacing a MAG Series device, using the admin GUI, you export two backup files,
system.cfg from “Maintenance” > “ImportfExport Configuration” and user.cfg from “Maintenance” >
“Import/Export Users”. When you receive the new hardware, you import all of the settings stored in
the system.cfg file (including the IP address, network configuration, and device certificates), but
you fail to import the user.cfg file.
Which three configuration areas were updated by system.cfg? (Choose three.)
Which two parts of the configuration should you verify are correct?
You are configuring an LDAP authentication server, and you want to configure role-mapping rules
based on group membership. When you attempt to search for groups in the server catalog, no
groups appear.
Assuming the LDAP server is reachable and functioning properly, in the admin GUI. Which two
parts of the configuration should you verify are correct? (Choose two.)
Which client should the customer deploy?
A customer is trying to determine which client to deploy. The customer wants to be able to perform
Layer 2 authentication as well as connect to the Junos Pulse Secure Access Service.
Which client should the customer deploy?
Which behavior will the user experience?
You have multiple realms configured on a MAG Series device. A user is authenticating with a nonJunos Pulse Access Control Service client. The username does not contain a realm suffix.
Which behavior will the user experience?
Which consideration must you take into account?
You are installing a new deployment of the Junos Pulse Access Control Service. You have an
existing RADIUS server that has a populated user file. You are considering using the RADIUS
proxy feature.
Which consideration must you take into account?
Which statement is true about zone interface assignment?
Which statement is true about zone interface assignment?