Which Junos Pulse feature allows the user to log in once through a Junos Pulse Secure Access Service on the ne
Which Junos Pulse feature allows the user to log in once through a Junos Pulse Secure Access
Service on the network and then access resources protected by a Junos Pulse Access Control
Service without reauthentication?
Which three changes in the admin GUI will enforce your manager’s change request?
Your manager has informed you that only specific users can have access to the Preferred
Members role, and that these users are restricted to the Preferred Members role. The Preferred
Members role-mapping rule is currently set as the last rule in your role-mapping rules and is based
on username. Currently all users are assigned to the Preferred Members role-mapping rule.
Which three changes in the admin GUI will enforce your manager’s change request? (Choose
three.)
Which two parameters must you configure on the SRX210?
You are configuring an SRX210 as a firewall enforcer that will tunnel IPsec traffic from several
Junos Pulse users. Which two parameters must you configure on the SRX210? (Choose two.)
What should you do on the Junos Pulse Access Control Service to resolve this problem?
You notice that during peak hours, some firewall enforcers contain a high number of auth table
entries. As you investigate the issue, you discover that all users are getting auth table mappings to
all firewalls, which is not acceptable.
What should you do on the Junos Pulse Access Control Service to resolve this problem?
Which parameter do you use to enable Junos Pulse Access Control Service enforcement on a policy on a ScreenOS
Which parameter do you use to enable Junos Pulse Access Control Service enforcement on a
policy on a ScreenOS platform?
What are two steps to configure user authentication for a Junos Pulse Access Control Service?
What are two steps to configure user authentication for a Junos Pulse Access Control Service?
(Choose two.)
which three actions are only available in the admin GUI?
In the Junos Pulse Access Control Service, which three actions are only available in the admin
GUI? (Choose three.)
what do you configure to validate certificate attributes?
Using an LDAP authentication server, what do you configure to validate certificate attributes?
What are two use cases enabled by IF-MAP Federation?
What are two use cases enabled by IF-MAP Federation? (Choose two.)
which statement supports a fault-tolerant configuration?
When configuring a single SRX210 as a firewall enforcer to a MAG4610 active/passive cluster,
which statement supports a fault-tolerant configuration?