Which two Host Checker policy rules would be used to enforce this requirement?
You administer a network with Windows-based endpoints that have custom software images. You
want to use Host Checker to require that endpoints are running the custom software image.
Which two Host Checker policy rules would be used to enforce this requirement? (Choose two.)
When would you use the redirect-traffic all command?
You are configuring captive portal on your SRX Series device for guest user access.
When would you use the redirect-traffic all command?
How do you configure the IP address on the SRX Series devices?
You are deploying a Junos Pulse Access Control Service cluster in active/passive mode. How do
you configure the IP address on the SRX Series devices?
Which three features are supported with the Junos Pulse client?
Which three features are supported with the Junos Pulse client? (Choose three.)
Which two statements are true?
In the admin GUI, you navigate to “System” > “Status” > “Active Users”. You see several buttons,
including “Delete Session”, “Delete All Sessions”. “Refresh Roles”, and “Disable All Users”.
Which two statements are true? (Choose two.)
What does this indicate?
what must you do to ensure that the RADIUS authentication works properly?
When using RADIUS as an external authentication method for 802.1X authentication for the Junos
Pulse Access Control Service, what must you do to ensure that the RADIUS authentication works
properly?
which sensor event policy action must you configure in…?
Your corporate security policy requires that a user performing attacks must have limited network
access and activities until an administrator can investigate.
In the admin GUI, which sensor event policy action must you configure in “Configuration” >
“Sensors” > “Sensor Event Policies” > [rule name] to accomplish this?
What are three causes for this behavior?
You are the network administrator for your company. A user is complaining that they are not able
to access the network with the Junos Pulse client. You run a packet capture on the network
interface to monitor the 802.1X authentication process. You notice that after the EAPrequest/identity packet is received, and the supplicant responds with an EAP-response/identity
packet, no further communication occurs for several seconds.
What are three causes for this behavior? (Choose three.)
Which feature addresses this requirement?
End users want to map a network drive on their PCs when they are connected to the Junos Pulse
Access Control Service. The mapped drive must be removed when users disconnect their session.
Which feature addresses this requirement?