What information does the Junos Pulse Access Control Service provide to Security Threat Response Manager (STRM
What information does the Junos Pulse Access Control Service provide to Security Threat
Response Manager (STRM)? (Choose two.)
which two troubleshooting tools on a MAG Series device would you use to identify the cause of an authenticatio
Without calling JTAC, which two troubleshooting tools on a MAG Series device would you use to
identify the cause of an authentication failure?
Which process should the administrator follow?
Two MAG4610s are running in an active/passive cluster configuration. The system administrator is
planning to apply a service package to the cluster.
Which process should the administrator follow?
which entry is permitted when defining the specific resources?
When configuring resource access policies in a Junos Pulse Access Control Service device, which
entry is permitted when defining the specific resources?
Which explanation would cause this behavior?
You are customizing the user interface options for the finance department in your organization.
Users in the department are able to see a session counter on the Web interface of the Junos
Pulse Access Control Service. The CFO is unable to see the session counter.
Which explanation would cause this behavior?
What must you do before changing the cluster configuration?
You are an administrator of an active/passive cluster of MAG Series devices running in mixedmode configuration (IF-MAP server and authenticating users). The active user count is quickly
approaching the maximum limit of the cluster. You have been directed to reconfigure the cluster to
an active/active cluster and add a new license to increase the total number of active users the
cluster can support.
What must you do before changing the cluster configuration?
Which protocol is used for communication between the Junos Pulse client and 802.1X-compliant switches when per
Which protocol is used for communication between the Junos Pulse client and 802.1X-compliant
switches when performing Layer 2 enforcement?
Which utility program do you use to see this configuration and where do you find it?
You have configured Junos Pulse on your Windows desktop and want to verify that the IPsec
configuration policy is being pushed down to your workstation upon network authentication and
login.
Which utility program do you use to see this configuration and where do you find it?
Which type of policies provide this level of protection?
You have a firewall enforcer protecting sensitive internal resources in a data center. The network
traversed by endpoint traffic is semi-trusted, so you need to encrypt the traffic between the
endpoints accessing the resources and the firewall enforcer.
Which type of policies provide this level of protection?
How would an end user add both a Junos Pulse Access Control Service URL and a Junos Pulse Secure Access Servic
How would an end user add both a Junos Pulse Access Control Service URL and a Junos Pulse
Secure Access Service URL to the same Junos Pulse client?