which sensor event policy action must you configure…?
Your corporate security policy requires that a user performing attacks must have limited network access and activities until an administrator can investigate.
In the admin GUI, which sensor event policy action must you configure in “Configuration” > “Sensors” > “Sensor Event Policies” > [rule name] to accomplish this?
What are three causes for this behavior? (Choose three
You are the network administrator for your company. A user is complaining that they are not able to access the network with the Junos Pulse client. You run a packet capture on the network interface to monitor the 802.1X authentication process. You notice that after the EAP- request/identity packet is received, and the supplicant responds with an EAP-response/identity packet, no further communication occurs for several seconds.
What are three causes for this behavior? (Choose three.)
Which feature addresses this requirement?
End users want to map a network drive on their PCs when they are connected to the Junos Pulse Access Control Service. The mapped drive must be removed when users disconnect their session.
Which feature addresses this requirement?
To avoid conflicting configurations, which two interfaces must you use to configure the firewall enforcer? (Ch
You have a firewall enforcer receiving resource access policies from a Junos Pulse Access Control Service. You are using Network and Security Manager (NSM) for configuration management on that firewall. The firewall can also be configured using its built-in command-line interface (CLI) or Web-based user interface (WebUI).
To avoid conflicting configurations, which two interfaces must you use to configure the firewall enforcer? (Choose two.)
What are two benefits of integrating Junos Pulse Access Control Service with Security Threat Response Manager
What are two benefits of integrating Junos Pulse Access Control Service with Security Threat Response Manager (STRM)? (Choose two.)
What must you add to complete the security policy configuration?
You have created a security policy on an SRX240 that permits traffic from any source-address, any destination-address, and any application. The policy will be a source IP policy for use with the Junos Pulse Access Control Service.
What must you add to complete the security policy configuration?
Based on the merging of these two roles, which two will be applied? (Choose two
A user logs in and is mapped to two roles. The first role has a maximum timeout value of 600 minutes and the default Juniper Networks logo on the user interface page. The second role has a maximum timeout value of 1200 minutes and a custom logo on the user interface page.
Based on the merging of these two roles, which two will be applied? (Choose two.)
Which Junos Pulse Access Control Service client provides a built-in viewer to access local logs?
Which Junos Pulse Access Control Service client provides a built-in viewer to access local logs?
Which statement is true?
You are installing a MAG Series device for access control using an SRX Series device as the firewall enforcer. The MAG Series device resides in the same security zone as users. However, the users reside in different subnets and use the SRX Series device as an IP gateway.
Which statement is true?
At which point in the authentication process does the Junos Pulse Access Control Service determine whether the
At which point in the authentication process does the Junos Pulse Access Control Service determine whether the endpoint complies with a realm’s authentication policy?