网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
Which three authentication resources are grouped within an authentication realm?()
A

Authentication enforcer

B

Directory server

C

Captive authentication

D

Authentication policy

E

Role-mapping rules


参考答案

参考解析
解析: 暂无解析
更多 “多选题Which three authentication resources are grouped within an authentication realm?()AAuthentication enforcerBDirectory serverCCaptive authenticationDAuthentication policyERole-mapping rules” 相关考题
考题 多选题Your manager has informed you that only specific users can have access to the Preferred Members role, and that these users are restricted to the Preferred Members role. The Preferred Members role-mapping rule is currently set as the last rule in your role-mapping rules and is based on username. Currently all users are assigned to the Preferred Members role-mapping rule. Which three changes in the admin GUI will enforce your managers change request?()AMove the Preferred Members role-mapping rule to the top of the list.BRemove the Preferred Members role from the role-mapping rule.CEdit the Preferred Members role-mapping rule so that the username is equal to *.DEdit the Preferred Members role-mapping rule so that only the select users are assigned to the role-mapping rule.EEdit the Preferred Members role-mapping rule and select Stop processing rules when this rule matches.

考题 单选题You are the administrator of a Junos Pulse Access Control Service implementation. You must restrict authenticated users connected from the branch offices to a few specific resources within the data center. However, when the authenticated users are connected at the corporate office, they are allowed more access to the data center resources. You have created two roles with different levels of access and are trying to determine the best way of controlling when a user is mapped to a specific role. Having the user prompted to manually select their role is possible, but you want to automate the process. Which configuration solves this problem?()A Implement a RADIUS request attribute policy to assist with realm selection and create different role-mapping rules for the user in each realm.B Implement a directory/attribute server on the realm and set up this server to determine by group membership the proper role to which a user should be mapped.C Reorder the role-mapping rules to allow for the more open role to be mapped first and then enable the stop processing rules when this rule matches function on this role.D Implement a Host Checker policy on the realm that determines the geographic location of the device and restricts the user based on the results of the policy.

考题 多选题You are the network administrator for your company. A user is complaining that they are not able to access the network with the Junos Pulse client. You run a packet capture on the network interface to monitor the 802.1X authentication process. You notice that after the EAP- request/identity packet is received, and the supplicant responds with an EAP-response/identity packet, no further communication occurs for several seconds. What are three causes for this behavior? ()AThe authenticator is not licensed to support Junos Pulse.BThe authenticator did not receive the EAP-response/identity packet.CThe authentication server is not receiving the RADIUS packet containing the EAP-response/identity data.DThe authenticator is sending the request over its loopback interface.EThe authentication server is sending back a RADIUS response packet, but the authenticator is not forwarding the response back to the supplicant.

考题 单选题Your corporate security policy requires that a user performing attacks must have limited network access and activities until an administrator can investigate.In the admin GUI, which sensor event policy action must you configure in "Configuration" "Sensors" "Sensor Event Policies" [rule name] to accomplish this?()A IgnoreB Replace users roleC Terminate user sessionD Disable user account

考题 单选题Which protocol is used for communication between the Junos Pulse client and 802.1X-compliant switches when performing Layer 2 enforcement?()A EAPB RADIUSC SSLD EAP-o-HTTP

考题 单选题A customer is trying to determine which client to deploy. The customer wants to be able to perform Layer 2 authentication as well as connect to the Junos Pulse Secure Access Service.Which client should the customer deploy?()A Windows native supplicantB Odyssey Access ClientC Junos PulseD Network Connect

考题 多选题What are three default role-mapping rule values that are available for all realms?()AUsernameBLDAP userCCertificateDCustom expressionsESource y IP

考题 多选题You are configuring an SRX210 as a firewall enforcer that will tunnel IPsec traffic from several Junos Pulse users.Which two parameters must you configure on the SRX210?()Aaccess profileBIKE parametersCtunneled interfaceDredirect policy