What are three elements the Junos Pulse Access Control Service uses to establish endpoint access to protected
What are three elements the Junos Pulse Access Control Service uses to establish endpoint access to protected resources? (Choose three.)
In the admin GUI, which policy element would you enable to accommodate these users?
You are an administrator of a large campus network. Every switch on a floor within each building of your campus has been configured for a different VLAN. During implementation of the Junos Pulse Access Control Service, you must configure a RADIUS return attribute policy to apply a role representing a group of authenticated users that frequently transport their laptops from building to building and floor to floor.
In the admin GUI, which policy element would you enable to accommodate these users?
Which two troubleshooting tools would you use on the Junos Pulse Access Control Service to resolve the issue?
A new software engineer has been hired. As part of the normal hiring process, the user was added to the Active Directory and placed into the Domain Users group and the SW_DEV group. The Domain Users group has access to the company’s intranet website and time card system. The SW_DEV group has access to the source code library server. You have created roles that correspond to each Active Directory group. The user calls the help desk stating that they cannot access the source code library server.
Which two troubleshooting tools would you use on the Junos Pulse Access Control Service to resolve the issue? (Choose two.)
Which two Host Checker policy rules would be used to enforce this requirement? (Choose two
You administer a network with Windows-based endpoints that have custom software images. You want to use Host Checker to require that endpoints are running the custom software image.
Which two Host Checker policy rules would be used to enforce this requirement? (Choose two.)
When would you use the redirect-traffic all command?
You are configuring captive portal on your SRX Series device for guest user access.
When would you use the redirect-traffic all command?
How do you configure the IP address on the SRX Series devices?
You are deploying a Junos Pulse Access Control Service cluster in active/passive mode. How do you configure the IP address on the SRX Series devices?
Which three features are supported with the Junos Pulse client? (Choose three
Which three features are supported with the Junos Pulse client? (Choose three.)
Which two statements are true? (Choose two
In the admin GUI, you navigate to “System” > “Status” > “Active Users”. You see several buttons, including “Delete Session”, “Delete All Sessions”. “Refresh Roles”, and “Disable All Users”.
Which two statements are true? (Choose two.)
What does this indicate?
1X authentication for the Junos Pulse Access Control Service, what must you do to ensure that the RADIUS authe
When using RADIUS as an external authentication method for 802.1X authentication for the Junos Pulse Access Control Service, what must you do to ensure that the RADIUS authentication works properly?