Your security policy requires that users authenticating to the Junos Pulse Access Control Service are connecting from a domain member endpoint on the internal corporate network.
Which set of role access restrictions must you configure to enforce this security policy?
An authentication realm consists of which three authentication resources? (Choose three.)
You are the administrator of a Junos Pulse Access Control Service implementation. You must restrict authenticated users connected from the branch offices to a few specific resources within the data center. However, when the authenticated users are connected at the corporate office, they are allowed more access to the data center resources. You have created two roles with different levels of access and are trying to determine the best way of controlling when a user is mapped to a specific role. Having the user prompted to manually select their role is possible, but you want to automate the process.
Which configuration solves this problem?
Which Junos Pulse feature allows the user to log in once through a Junos Pulse Secure Access Service on the network and then access resources protected by a Junos Pulse Access Control Service without reauthentication?
Your manager has informed you that only specific users can have access to the Preferred Members role, and that these users are restricted to the Preferred Members role. The Preferred Members role-mapping rule is currently set as the last rule in your role-mapping rules and is based on username. Currently all users are assigned to the Preferred Members role-mapping rule.
Which three changes in the admin GUI will enforce your manager’s change request? (Choose three.)
You are configuring an SRX210 as a firewall enforcer that will tunnel IPsec traffic from several Junos Pulse users. Which two parameters must you configure on the SRX210? (Choose two.)
You notice that during peak hours, some firewall enforcers contain a high number of auth table entries. As you investigate the issue, you discover that all users are getting auth table mappings to all firewalls, which is not acceptable.
What should you do on the Junos Pulse Access Control Service to resolve this problem?
Which parameter do you use to enable Junos Pulse Access Control Service enforcement on a policy on a ScreenOS platform?
What are two steps to configure user authentication for a Junos Pulse Access Control Service? (Choose two.)
In the Junos Pulse Access Control Service, which three actions are only available in the admin GUI? (Choose three.)