Which three types of policies must you configure to allow remote users transparent access to protected resourc
Which three types of policies must you configure to allow remote users transparent access to
protected resources using IF-MAP Federation between a Junos Pulse Secure Access Service and
a Junos Pulse Access Control Service? (Choose three.)
Which server URL must you configure on the IF-MAP clients communicating with this IF-MAP Federation server?
You have a MAG Series device with IP address 10.0.1.5 and hostname ad .pulse.local acting as
an IF-MAP Federation server. The subject name of the device certificate on this server is ad
.pulse.local.
Which server URL must you configure on the IF-MAP clients communicating with this IF-MAP
Federation server?
Which consideration must you take into account?
You are installing a new deployment of the Junos Pulse Access Control Service. You have an
existing RADIUS server that has a populated user file. You are considering using the RADIUS
proxy feature.
Which consideration must you take into account?
Which behavior will the user experience?
You have multiple realms configured on a MAG Series device. A user is authenticating with a nonJunos Pulse Access Control Service client. The username does not contain a realm suffix.
Which behavior will the user experience?
Which client should the customer deploy?
A customer is trying to determine which client to deploy. The customer wants to be able to perform
Layer 2 authentication as well as connect to the Junos Pulse Secure Access Service.
Which client should the customer deploy?
Which two parts of the configuration should you verify are correct?
You are configuring an LDAP authentication server, and you want to configure role-mapping rules
based on group membership. When you attempt to search for groups in the server catalog, no
groups appear.
Assuming the LDAP server is reachable and functioning properly, in the admin GUI. Which two
parts of the configuration should you verify are correct? (Choose two.)
Which three configuration areas were updated by system.cfg?
Before replacing a MAG Series device, using the admin GUI, you export two backup files,
system.cfg from “Maintenance” > “ImportfExport Configuration” and user.cfg from “Maintenance” >
“Import/Export Users”. When you receive the new hardware, you import all of the settings stored in
the system.cfg file (including the IP address, network configuration, and device certificates), but
you fail to import the user.cfg file.
Which three configuration areas were updated by system.cfg? (Choose three.)
Which two statements are true?
You administer a network containing SRX Series firewalls. New policy requires that you implement
MAG Series devices to provide access control for end users. The policy requires that the SRX
Series devices dynamically enforce security policy based on the source IP address of the user.
The policy also requires that the users communicate with protected resources using encrypted
traffic.
Which two statements are true? (Choose two.)
Which three statements are true?
What is the default role-mapping behavior?
An outside vendor is eligible for the guest role and the contractor role when accessing your
network, that is secured with the Junos Pulse Access Control Service.
What is the default role-mapping behavior?