Which two statements are true? (Choose two
You administer a network containing SRX Series firewalls. New policy requires that you implement MAG Series devices to provide access control for end users. The policy requires that the SRX Series devices dynamically enforce security policy based on the source IP address of the user. The policy also requires that the users communicate with protected resources using encrypted traffic.
Which two statements are true? (Choose two.)
cfg? (Choose three
Before replacing a MAG Series device, using the admin GUI, you export two backup files, system.cfg from “Maintenance” > “ImportfExport Configuration” and user.cfg from “Maintenance” > “Import/Export Users”. When you receive the new hardware, you import all of the settings stored in the system.cfg file (including the IP address, network configuration, and device certificates), but you fail to import the user.cfg file.
Which three configuration areas were updated by system.cfg? (Choose three.)
Which two parts of the configuration should you verify are correct? (Choose two
You are configuring an LDAP authentication server, and you want to configure role-mapping rules based on group membership. When you attempt to search for groups in the server catalog, no groups appear.
Assuming the LDAP server is reachable and functioning properly, in the admin GUI. Which two parts of the configuration should you verify are correct? (Choose two.)
Which client should the customer deploy?
A customer is trying to determine which client to deploy. The customer wants to be able to perform Layer 2 authentication as well as connect to the Junos Pulse Secure Access Service.
Which client should the customer deploy?
Which behavior will the user experience?
You have multiple realms configured on a MAG Series device. A user is authenticating with a non- Junos Pulse Access Control Service client. The username does not contain a realm suffix.
Which behavior will the user experience?
Which consideration must you take into account?
You are installing a new deployment of the Junos Pulse Access Control Service. You have an existing RADIUS server that has a populated user file. You are considering using the RADIUS proxy feature.
Which consideration must you take into account?
Which server URL must you configure on the IF-MAP clients communicating with this IF-MAP Federation server?
You have a MAG Series device with IP address 10.0.1.5 and hostname ad .pulse.local acting as an IF-MAP Federation server. The subject name of the device certificate on this server is ad .pulse.local.
Which server URL must you configure on the IF-MAP clients communicating with this IF-MAP Federation server?
Which three types of policies must you configure to allow remote users transparent access to protected resourc
Which three types of policies must you configure to allow remote users transparent access to protected resources using IF-MAP Federation between a Junos Pulse Secure Access Service and a Junos Pulse Access Control Service? (Choose three.)
What are two features provided by the Junos Pulse client? (Choose two
What are two features provided by the Junos Pulse client? (Choose two.)
In a Junos Pulse Access Control Service active/active clustered environment, which statement is true about VIP
In a Junos Pulse Access Control Service active/active clustered environment, which statement is true about VIPs?