Which two actions are available in the GUI for creating location awareness rules?
Which two actions are available in the GUI for creating location awareness rules? (Choose two.)
What are three causes for this behavior?
You are the network administrator for your company. A user is complaining that they are not able
to access the network with the Junos Pulse client. You run a packet capture on the network
interface to monitor the 802.1X authentication process. You notice that after the EAPrequest/identity packet is received, and the supplicant responds with an EAP-response/identity
packet, no further communication occurs for several seconds.
What are three causes for this behavior? (Choose three.)
Which action should the administrator take to ensure that users get the correct Odyssey Access Client preconfi
An administrator has created three different Odyssey Access Client preconfiguration files and
assigned them to three different roles in the same realm.
Which action should the administrator take to ensure that users get the correct Odyssey Access
Client preconfiguration file?
Which feature should you verify the antivirus product is up to date?
You want to create a Host Checker policy that looks for a specific antivirus product that is running
on your client machines, but the predefined antivirus options do not include the antivirus product
version that you use.
Which feature should you verify the antivirus product is up to date?
What are three benefits of IF-MAP Federation?
What are three benefits of IF-MAP Federation? (Choose three.)
Which three authentication server types are supported for retrieving user attributes used in rolemapping rules
Which three authentication server types are supported for retrieving user attributes used in rolemapping rules? (Choose three.)
what provides this functionality?
You have an SRX Series Layer 2 enforcer providing 802.1X authentication for connected
endpoints. Your security policy requires that users who fail their authentication be placed in a
specific VLAN.
On the Layer 2 enforcer, at the [edit protocols dot1x authenticator interface] hierarchy for each
participating interface, what provides this functionality?
which statement is correct?
A company has completed two acquisitions over the previous year. Each of the acquired
companies was allowed to keep its own independent authentication server. The network
administrator has been asked to roll out the Junos Pulse Access Control Service to users within
the original company along with each of the two acquired organizations. The administrator
configures three authentication realms, one for each independent authentication server, and
associates them all with a single sign-in policy. All of the client endpoints are running Junos Pulse
on their Windows XP desktops.
When a user signs in to the Junos Pulse Access Control Service, which statement is correct?
Which two configurations solve this problem?
You want to customize access to the corporate network so that agentiess users are instructed to
obtain a certificate before accessing the network.
Which two configurations solve this problem? (Choose two.)
Which two role restrictions accomplish this goal?
You want to restrict access to a role based on the client machine from which the user is accessing
the network.
Which two role restrictions accomplish this goal? (Choose two.)