Which feature should you verify the antivirus product is up to date?
You want to create a Host Checker policy that looks for a specific antivirus product that is running
on your client machines, but the predefined antivirus options do not include the antivirus product
version that you use.
Which feature should you verify the antivirus product is up to date?
What are three benefits of IF-MAP Federation?
What are three benefits of IF-MAP Federation? (Choose three.)
Which three authentication server types are supported for retrieving user attributes used in rolemapping rules
Which three authentication server types are supported for retrieving user attributes used in rolemapping rules? (Choose three.)
what provides this functionality?
You have an SRX Series Layer 2 enforcer providing 802.1X authentication for connected
endpoints. Your security policy requires that users who fail their authentication be placed in a
specific VLAN.
On the Layer 2 enforcer, at the [edit protocols dot1x authenticator interface] hierarchy for each
participating interface, what provides this functionality?
which statement is correct?
A company has completed two acquisitions over the previous year. Each of the acquired
companies was allowed to keep its own independent authentication server. The network
administrator has been asked to roll out the Junos Pulse Access Control Service to users within
the original company along with each of the two acquired organizations. The administrator
configures three authentication realms, one for each independent authentication server, and
associates them all with a single sign-in policy. All of the client endpoints are running Junos Pulse
on their Windows XP desktops.
When a user signs in to the Junos Pulse Access Control Service, which statement is correct?
Which two configurations solve this problem?
You want to customize access to the corporate network so that agentiess users are instructed to
obtain a certificate before accessing the network.
Which two configurations solve this problem? (Choose two.)
Which two role restrictions accomplish this goal?
You want to restrict access to a role based on the client machine from which the user is accessing
the network.
Which two role restrictions accomplish this goal? (Choose two.)
which port on the Junos Pulse Access Control Service should the customer plug the network cable to enable acce
A customer is deploying a new Junos Pulse Access Control Service and has completed the initial
boot configuration as prompted using a serial connection. The customer now wants to complete
the rest of the configuration using the admin GUI.
Into which port on the Junos Pulse Access Control Service should the customer plug the network
cable to enable access to the admin GUI?
Which two event log settings on the Junos Pulse Access Control Service must you enable to troubleshootthis iss
A user is successfully authenticating to the network but is unable to access protected resources
behind a ScreenOS enforcer. You log in to the ScreenOS enforcer and issue the command get
auth table infranet and you do not see the user listed.
Which two event log settings on the Junos Pulse Access Control Service must you enable to
troubleshootthis issue? (Choose two.)
what must be configured for the user to stay connected when migrating from a wired to a wireless network?
A user signs into the Junos Pulse Access Control Service on a wired network. The user then
migrates to a wireless network, receives a new IP address, and notices that the session is
disconnected.
In the admin GUI, what must be configured for the user to stay connected when migrating from a
wired to a wireless network?