Which element cannot be configured when creating Web Resource Profiles?
Which element cannot be configured when creating Web Resource Profiles? A. Specify web access control policy. B. Specify a realm to assign the profile. C. Specify authentication policies. D. Specify a Base URL. E. Assign roles to the bookmark. Reference: https://docs.pulsesecure.net/WebHelp/Content/PCS/PCS_AdminGuide_8.2/Defining%20Web%20Resource%20Profile.htm
Which two elements do detailed resource policy rules contain?
Which two elements do detailed resource policy rules contain? (Choose two.) A. role B. resources C. rule name D. action Reference: https://docs.pulsesecure.net/WebHelp/Content/PCS/PCS_AdminGuide_8.2/Resource%20Policies.htm
Which statement accurately describes resource profiles?
Which statement accurately describes resource profiles? A. Resource profiles are a collection of resources and ACLs. B. Resource profiles are a collection of resources and their descriptions. C. Resource profiles are where the resources, roles, and ACLs are in one location. D. Resource profiles are where ACLs are set up for resources. Reference: https://docs.pulsesecure.net/WebHelp/PCS/8.3R1/Content/PCS/PCS_AdminGuide_8.3/Resource_Profiles.htm
What PCS Element determines the access methods and services to be used and sets the appearance of the start pa
What PCS Element determines the access methods and services to be used and sets the appearance of the start page for agentless access? A. User Realm B. User Role C. Resource Policy D. Sign-in Policy Reference: https://www-prev.pulsesecure.net/download/techpubs/current/1467/pulse-policy-secure/pps/9.0rx/ps-pps-ic-9.0r3-admin-guide.pdf (96)
When configuring a realm to require multiple sign-in credentials, which three are valid secondary authenticati
When configuring a realm to require multiple sign-in credentials, which three are valid secondary authentication methods? (Choose three.) A. Active Directory B. Client certificate C. RADIUS D. LDAP E. Netegrity
Role-based restrictions can be based on which of the following?
Role-based restrictions can be based on which of the following? A. Source IP B. Browser C. Certificates D. Host Checker E. All of the above.
The following needs to be defined prior to configuring role-mapping
The following needs to be defined prior to configuring role-mapping: A. Sign-in Policies B. Authentication Servers C. Sign-in Notification D. User Roles Reference: https://docs.pulsesecure.net/WebHelp/PPS/9.0R2/Content/PPS_Admin_Guide/Configuring_Role_Mapping.htm
During the login process user attributes can be collected from where?
During the login process user attributes can be collected from where? A. LDAP B. SNMP C. LLDP D. CDP E. PROFILER
Which settings can be changed under User Role?
Which settings can be changed under User Role? (Choose two.) A. Sessions Options B. UI Options C. Authentication Server D. Policy Server Reference: https://docs.pulsesecure.net/WebHelp/PDC/9.0R1/Content/PDC_AdminGuide_9.0R1/Configuring_a_Role_for_Pulse.htm
True or False: When defining a User Role an administrator can restrict access to a role based on the type of b
True or False: When defining a User Role an administrator can restrict access to a role based on the type of browser the user is utilizing to attempt access. A. true B. false Reference: https://docs.pulsesecure.net/WebHelp/PDC/9.1R5/pdc-admin-guide/ConfigPCS/ConfigPCS.htm