Which two prerequisites should your IT Information security team consider about the authentication protocol se
Your company has deployed the Junos Pulse Access Control Service. Your IT information security
team needs the Host Checker feature enabled and enforced for all corporate users, along with
802.1X Layer 2 authentication using the Odyssey Access Client and the Junos Pulse client.
Which two prerequisites should your IT Information security team consider about the
authentication protocol set configuration at both the endpoint and the controller side? (Choose
two.)
Which three actions are configurable for a failed host check?
Which three actions are configurable for a failed host check? (Choose three.)
What are three remediation actions that you enable for a Host Checker policy that would apply to an antivirus
What are three remediation actions that you enable for a Host Checker policy that would apply to
an antivirus rule? (Choose three.)
Which two supported remediation actions are specified in a Host Checker policy?
Which two supported remediation actions are specified in a Host Checker policy? (Choose two.)
What will be the user’s experience?
You are configuring Host Checker settings in the Junos Pulse Access Control Service UI, under
Authentication > Endpoint Security > Host Checker. The value in the “Perform check every” field is
0.
What will be the user’s experience?
which three actions are available?
When configuring remediation action for a predefined antivirus product, which three actions are
available? (Choose three.)
Which Host Checker rule would be used for this purpose?
Your company wants to allow for differentiated access on Windows laptops depending on whether
they are corporate assets or personal assets.
Which Host Checker rule would be used for this purpose?
Which type of Host Checker policy would be used?
Your company requires using either a PC using a firewall and an antivirus program, or a
Macintosh using OS X, prior to granting network access.
Which type of Host Checker policy would be used?
Which authentication server parameter should you configure for a realm where users bypass authentication, but
Which authentication server parameter should you configure for a realm where users bypass
authentication, but must pass an authentication policy to connect to a Layer 2 network?
Which authentication server should you configure?
You want to authenticate users to an Active Directory server and map them to roles based on the
department ID attribute.
Which authentication server should you configure?