When would you use the redirect-traffic all command?
You are configuring captive portal on your SRX Series device for guest user access.
When would you use the redirect-traffic all command?
Which two Host Checker policy rules would be used to enforce this requirement?
You administer a network with Windows-based endpoints that have custom software images. You
want to use Host Checker to require that endpoints are running the custom software image.
Which two Host Checker policy rules would be used to enforce this requirement? (Choose two.)
Which two troubleshooting tools would you use on the Junos Pulse Access Control Service to resolve the issue?
A new software engineer has been hired. As part of the normal hiring process, the user was added
to the Active Directory and placed into the Domain Users group and the SW_DEV group. The
Domain Users group has access to the company’s intranet website and time card system. The
SW_DEV group has access to the source code library server. You have created roles that
correspond to each Active Directory group. The user calls the help desk stating that they cannot
access the source code library server.
Which two troubleshooting tools would you use on the Junos Pulse Access Control Service to
resolve the issue? (Choose two.)
which policy element would you enable to accommodate these users?
You are an administrator of a large campus network. Every switch on a floor within each building
of your campus has been configured for a different VLAN. During implementation of the Junos
Pulse Access Control Service, you must configure a RADIUS return attribute policy to apply a role
representing a group of authenticated users that frequently transport their laptops from building to
building and floor to floor.
In the admin GUI, which policy element would you enable to accommodate these users?
What are three elements the Junos Pulse Access Control Service uses to establish endpoint access to protected
What are three elements the Junos Pulse Access Control Service uses to establish endpoint
access to protected resources? (Choose three.)
What are two roles of the authenticator as described in the 802.1X standard?
What are two roles of the authenticator as described in the 802.1X standard? (Choose two.)
which two parameters must you configure?
You want to enforce a Host Checker policy so that only users who pass the policy receive the
Employee role. In the admin GUI, which two parameters must you configure? (Choose two.)
Which configuration method should you use to satisfy this scenario?
You have three classes of users on your network: employee, contractor, and IT administrator. You
configure the Junos Pulse Access Control Service to assign roles to each user class and require
that a specific wireless SSID be preconfigured for the Odyssey Access Client based on the role.
Which configuration method should you use to satisfy this scenario?
What are three necessary steps for enabling 802.1X access when configuring Layer 2 enforcement?
What are three necessary steps for enabling 802.1X access when configuring Layer 2
enforcement? (Choose three.)
which two features would you configure to satisfy this requirement?
On the Junos Pulse Access Control Service, you have created a role called Secret that you only
want to provide to users who present a certificate.
Using the admin GUI, which two features would you configure to satisfy this requirement? (Choose
two.)