What are two considerations when deploying a Junos Pulse Access Control Service cluster?
What are two considerations when deploying a Junos Pulse Access Control Service cluster?
(Choose two.)
Which two statements are true about VIP addresses when deploying a Junos Pulse Access Control Service cluster?
Which two statements are true about VIP addresses when deploying a Junos Pulse Access
Control Service cluster? (Choose two.)
Which load-balancing mechanism must you specify?
You are asked to configure a Junos Pulse Access Control Service active/active cluster. You have
completed the configuration for each cluster member. You must provide requirements to the loadbalancing engineer to ensure Junos Pulse client authentication session persistence.
Which load-balancing mechanism must you specify?
What information is replicated on the cluster nodes?
You are attempting to create a Junos Pulse Access Control Service cluster. You select both the
synchronize log messages and synchronize user sessions check (tick) boxes.
What information is replicated on the cluster nodes? (Choose three.)
which filter format is required?
When configuring the Junos Pulse Access Control Service to forward logs to Juniper Networks
STRM, which filter format is required?
What are two user attributes that would be used to assign a firewall policy?
The user-role-based policies of your SRX Series device are integrated with the Junos Pulse
Access Control Service.
What are two user attributes that would be used to assign a firewall policy? (Choose two.)
Which two features are available when an SRX Series device is integrated with the Junos Pulse Access Control S
Which two features are available when an SRX Series device is integrated with the Junos Pulse
Access Control Service? (Choose two.)
Which two statements are true about the integration of EX Series switches and the Junos Pulse Access Control S
Which two statements are true about the integration of EX Series switches and the Junos Pulse
Access Control Service? (Choose two.)
What are two results when using IF-MAP session-export policies?
What are two results when using IF-MAP session-export policies? (Choose two.)
What is enabled when you configure an EX Series switch as a firewall enforcer?
What is enabled when you configure an EX Series switch as a firewall enforcer?