网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
Which three authentication server types are supported for retrieving user attributes used in role- mapping rules?()
A

LDAP

B

S/Key

C

TACACS+

D

RADIUS

E

SiteMinder


参考答案

参考解析
解析: 暂无解析
更多 “多选题Which three authentication server types are supported for retrieving user attributes used in role- mapping rules?()ALDAPBS/KeyCTACACS+DRADIUSESiteMinder” 相关考题
考题 单选题What is the function of Host Checker?()A To allow clientless access to the networkB To restrict access to protected resources on the networkC To scan an endpointfor compliance with security policiesD To push a firewall policy to the endpoint's local firewall application

考题 多选题A customer wants to create a custom Junos Pulse configuration. Which two are required?()AConnection setBConfiguration setCCustom installerDComponent set

考题 单选题You want to provide all users in your corporation with a single agent that provides access to multiple connection types conditionally. For example, you connect to the Junos Pulse Access Control Service if you are connected to the intranet, but you connect to the Junos Pulse Secure Access Service if you are on a remote network. Which agent should you use for this type of connection requirement?()A Junos Pulse should be configured with location awareness rules configured.B Odyssey Access Client should be installed with Host Checker configured to check the client's location.C Junos Pulse should be configured with all components installed.D Agentless access should be enabled so that clients can connect to any service without concern for installing an agent.

考题 多选题Which three authentication resources are grouped within an authentication realm?()AAuthentication enforcerBDirectory serverCCaptive authenticationDAuthentication policyERole-mapping rules

考题 多选题A new software engineer has been hired. As part of the normal hiring process, the user was added to the Active Directory and placed into the Domain Users group and the SW_DEV group. The Domain Users group has access to the company's intranet website and time card system. The SW_DEV group has access to the source code library server. You have created roles that correspond to each Active Directory group. The user calls the help desk stating that they cannot access the source code library server. Which two troubleshooting tools would you use on the Junos Pulse Access Control Service to resolve the issue?()APerform a policy trace for the specific user and review the output to isolate the problem.BReview the Events log.CReview the Admin Access log to verify that the user has the correct permissions to access the SVVJDEV resource.DReview the User Access log to verify that the user is getting mapped to both the Domain User role and the SW_DEV role.

考题 单选题Using an LDAP authentication server, what do you configure to validate certificate attributes?()A Use the is exactly or contains operators.B Create a user filter matching thedn of the certificate.C Verify that the certificate is issued by a publicly trusted cs.D Match the certificate type and value with an attribute from theldap server.

考题 多选题What are two benefits of integrating Junos Pulse Access Control Service with Security Threat Response Manager (STRM)?()AThe ability to detect and prevent malicious traffic.BThe ability to associate security breaches with a specific user.CConverged management of network and security events, network flow data, and identity information.DConsistent device management across administrative realms.

考题 单选题Two MAG4610s are running in an active/passive cluster configuration. The system administrator is planning to apply a service package to the cluster.Which process should the administrator follow?()A Perform the upgrade on the active node of the cluster. When completed, the node reboots and then pushes the service package to the passive node automatically.B Perform the upgrade on the passive node of the cluster. When completed, the node reboots and then pushes the service package to the active node automatically.C On the clustering status page, disable the active node. Perform the upgrade on the disabled node. When completed and the node reboots, enable the node on the clustering status page.Repeat the process on the passive node.D On the clustering status page, disable the passive node. Perform the upgrade on the disabled node. When completed and the node reboots, enable the node on the clustering status page.Repeat the process on the active node.

考题 多选题You have a firewall enforcer receiving resource access policies from a Junos Pulse Access Control Service. You are using Network and Security Manager (NSM) for configuration management on that firewall. The firewall can also be configured using its built-in command-line interface (CLI) or Web-based user interface (WebUI). To avoid conflicting configurations, which two interfaces must you use to configure the firewall enforcer?()ACLIBWebUICNSMDJunos Pulse Access Control Service