What are three benefits of IF-MAP Federation?
What are three benefits of IF-MAP Federation? (Choose three.)
Which feature should you verify the antivirus product is up to date?
You want to create a Host Checker policy that looks for a specific antivirus product that is running
on your client machines, but the predefined antivirus options do not include the antivirus product
version that you use.
Which feature should you verify the antivirus product is up to date?
Which action should the administrator take to ensure that users get the correct Odyssey Access Client preconfi
An administrator has created three different Odyssey Access Client preconfiguration files and
assigned them to three different roles in the same realm.
Which action should the administrator take to ensure that users get the correct Odyssey Access
Client preconfiguration file?
What are three causes for this behavior?
You are the network administrator for your company. A user is complaining that they are not able
to access the network with the Junos Pulse client. You run a packet capture on the network
interface to monitor the 802.1X authentication process. You notice that after the EAPrequest/identity packet is received, and the supplicant responds with an EAP-response/identity
packet, no further communication occurs for several seconds.
What are three causes for this behavior? (Choose three.)
Which two actions are available in the GUI for creating location awareness rules?
Which two actions are available in the GUI for creating location awareness rules? (Choose two.)
How would you access the MAG Series device admin GUI with this PC?
You are the administrator in your company and you have restricted administrator access to require
a user certificate to access the admin GUI on your company’s MAG Series device. You must now
access the admin GUI from a PC that does not have your user certificate installed.
How would you access the MAG Series device admin GUI with this PC?
where is the preauthentication sign-in message configured?
On a MAG Series device, where is the preauthentication sign-in message configured?
What must you also configure?
You are configuring an IPsec routing policy that will be used with a ScreenOS firewall enforcer.
What must you also configure?
What are two ways to access the Junos Pulse Access Control Service?
What are two ways to access the Junos Pulse Access Control Service? (Choose two.)
What should you configure?
You want to ensure that users who access the company’s protected resources present a client
certificate before they are allowed to sign in.
What should you configure?