Which two statements are true about 802.1X authentication?
Which two statements are true about 802.1X authentication? (Choose two.)
which two actions are acceptable?
To assign RADIUS attributes based on user roles, which two actions are acceptable? (Choose
two.)
Which type of server is used for authentication in a MAC address realm?
Which type of server is used for authentication in a MAC address realm?
What are two steps the administrator should take to resolve this problem?
An administrator enables a user-based firewall and then, using one of the company’s computers,
verifies that the firewall is working as expected. The next day, an employee calls to say that
content that was accessible before the administrator made the changes can no longer be
accessed.
What are two steps the administrator should take to resolve this problem? (Choose two.)
Which configuration would accomplish your objective?
You are attempting to configure source IP enforcement from the TRUST zone to the DATABASE
zone on an SRX Series device. You would like to create a policy allowing the administrators to
reach the database servers.
Which configuration would accomplish your objective?
Which two statements are true about the user-based firewall using SRX Series devices?
Which two statements are true about the user-based firewall using SRX Series devices? (Choose
two.)
Which two components are required for firewall enforcement?
Which two components are required for firewall enforcement? (Choose two.)
What would you do to resolve this issue?
Your network contains a mixture of low capacity enforcer devices and high capacity enforcer
devices. Some users are complaining they are unable to reach protected resources behind lower
capacity enforcer devices. You have determined the issue is caused by limitations in the number
of concurrent auth table entries.
What would you do to resolve this issue?
What are two components of an SRX Series device auth table entry?
What are two components of an SRX Series device auth table entry? (Choose two.)
Which statement is true about IPsec enforcement using a Junos device as the enforcer?
Which statement is true about IPsec enforcement using a Junos device as the enforcer?