Which two considerations must you take into account when deploying a Junos Pulse Access Control Service cluste
Which two considerations must you take into account when deploying a Junos Pulse Access
Control Service cluster? (Choose two.)
How can the administrator accomplish this goal?
A system administrator wants to configure 802.1X on an Ethernet switch to enable access to
specific parts of the network based on group memberships.
How can the administrator accomplish this goal?
which statement supports a fault-tolerant configuration?
When configuring a single SRX210 as a firewall enforcer to a MAG4610 active/passive cluster,
which statement supports a fault-tolerant configuration?
What are two use cases enabled by IF-MAP Federation?
What are two use cases enabled by IF-MAP Federation? (Choose two.)
what do you configure to validate certificate attributes?
Using an LDAP authentication server, what do you configure to validate certificate attributes?
which three actions are only available in the admin GUI?
In the Junos Pulse Access Control Service, which three actions are only available in the admin
GUI? (Choose three.)
What are two steps to configure user authentication for a Junos Pulse Access Control Service?
What are two steps to configure user authentication for a Junos Pulse Access Control Service?
(Choose two.)
Which parameter do you use to enable Junos Pulse Access Control Service enforcement on a policy on a ScreenOS
Which parameter do you use to enable Junos Pulse Access Control Service enforcement on a
policy on a ScreenOS platform?
What should you do on the Junos Pulse Access Control Service to resolve this problem?
You notice that during peak hours, some firewall enforcers contain a high number of auth table
entries. As you investigate the issue, you discover that all users are getting auth table mappings to
all firewalls, which is not acceptable.
What should you do on the Junos Pulse Access Control Service to resolve this problem?
Which two parameters must you configure on the SRX210?
You are configuring an SRX210 as a firewall enforcer that will tunnel IPsec traffic from several
Junos Pulse users. Which two parameters must you configure on the SRX210? (Choose two.)