站内搜索
JN0-314 问题列表
问题
多选题You want to provide 802.1X access for Windows clients using Junos Pulse as the agent. Which two considerations must you take into account()AJunos Pulse out erauth entication uses EAP-PEAP.BJunos Pulse ou terauth entication uses EAP-TTLS.CJunos Pulse innerauth entication uses EAP-MSCHAP-V2.DTheend point must use thenative Microsoft 802.1X supplicant.
问题
单选题A company has completed two acquisitions over the previous year. Each of the acquired companies was allowed to keep its own independent authentication server. The network administrator has been asked to roll out the Junos Pulse Access Control Service to users within the original company along with each of the two acquired organizations.The administrator configures three authentication realms, one for each independent authentication server, and associates them all with a single sign-in policy. All of the client endpoints are running Junos Pulse on their Windows XP desktops. When a user signs in to the Junos Pulse Access Control Service, which statement is correct?()A
The first authentication realm that was added to the sign-in policy is used by default.B
The user is allowed to choose the correct authentication realm from a list presented by Junos Pulse.C
When Junos Pulse is initially installed on the desktop, it must be configured with the correct realm.D
This is not an allowed configuration; the administrator should configure separate sign-in policies for each realm.
问题
单选题Which Junos Pulse Access Control Service client provides a built-in viewer to access local logs?()A
Odyssey Access ClientB
Junos PulseC
Java agentD
Agent less access
问题
单选题A user calls the help desk and explains that they just purchased a Macintosh computer. When they log into the network, the Odyssey Access Client is not automatically downloaded as it was when the user used their Windows PC.How do you resolve this issue?()A
Download the Macintosh installer from the Junos Pulse Access Control Service and manually install the Odyssey Access Client.B
Provide the user with the sign-in URL you set up for Macintosh users; this will push the Odyssey Access Client to the user's machine.C
Assist the user to configure the Macintosh native supplicant and provide the AppleScnptto expose the EAP-JUAC inner authentication protocol.D
Configure the user's role to install the Java agent, which is a requirement to allow the Junos Pulse Access Control Service to deploy the Odyssey Access Client.
问题
单选题What is a type of firewall enforcer supported by the Junos Pulse Access Control Service?()A
Checkpoint firewallB
SRX Series deviceC
DP sensorD
MX Series device
问题
多选题What are two benefits of integrating Junos Pulse Access Control Service with Security Threat Response Manager (STRM)?()AThe ability to detect and prevent malicious traffic.BThe ability to associate security breaches with a specific user.CConverged management of network and security events, network flow data, and identity information.DConsistent device management across administrative realms.
问题
单选题Which parameter do you use to enable Junos Pulse Access Control Service enforcement on a policy on a ScreenOS platform?()A
uac-policyB
ic-policyC
inyranet-authD
uac-auth
问题
单选题In a Junos Pulse Access Control Service active/active clustered environment, which statement is true about VIPs?()A
VIP is not required when using only agentless access for all endpoint platforms.B
VIP is not required when using Junos Pulse or Odyssey Access Client for all endpoint platforms.C
VIP is not required when using Junos Pulse and agentless access for all endpoint platforms.D
VIP is not required when using Odyssey Access Client and agentless access for all endpoint platforms.
问题
多选题You want to restrict access to a role based on the client machine from which the user is accessing the network.Which two role restrictions accomplish this goal? ()Auser nameBpassword lengthCcertificateDHost Checker
问题
多选题You administer a network with Windows-based endpoints that have custom software images. You want to use Host Checker to require that endpoints are running the custom software image.Which two Host Checker policy rules would be used to enforce this requirement?()AIsolate a file name unique to the custom image and create a custom rule-type of File which matches on the file. Select the Required option under the custom rule.BIdentify the MAC address unique to network cards installed in PCs with the custom image and create a custom rule-type of MAC Address which matches on the appropriate MAC address.CSelect the Required option under the custom rule Identify the IP address unique to the network cards installed in PCs with the custom image and create a custom rule-type of IP Address which matches on the appropriate IP address. Select the Required option under the custom rule.DIsolate or create a unique Windows registry key for the custom image and create a custom rule- type of Registry Setting which matches on the name of the registry key.
问题
多选题What are two benefits of integrating Junos Pulse Access Control Service with Security Threat Response Manager (STRM)?()AThe ability to detect and prevent malicious traffic.BThe ability to associate security breaches with a specific user.CConverged management of network and security events, network flow data, and identity information.DConsistent device management across administrative realms.
问题
单选题What is the function of Host Checker?()A
To allow clientless access to the networkB
To restrict access to protected resources on the networkC
To scan an endpointfor compliance with security policiesD
To push a firewall policy to the endpoint's local firewall application
问题
多选题A user logs in and is mapped to two roles. The first role has a maximum timeout value of 600 minutes and the default Juniper Networks logo on the user interface page. The second role has a maximum timeout value of 1200 minutes and a custom logo on the user interface page. Based on the merging of these two roles, which two will be applied?()AA custom logo on the user interface pageBA maximum timeout value of 600 minutesCA maximum time out value of 1200 minutesDA default Juniper Networks logo on the user interface page
问题
单选题End users want to map a network drive on their PCs when they are connected to the Junos Pulse Access Control Service. The mapped drive must be removed when users disconnect their session.Which feature addresses this requirement?()A
agent session scriptsB
preconfiguration installerC
Junos Pulse component setD
agent actions
问题
多选题Which three features are supported with the Junos Pulse client?()Athird-party RADIUS supportBHost EnforcerCHost CheckerDIPsecEsoft tokens