站内搜索
JN0-314 问题列表
问题 多选题In the Junos Pulse Access Control Service, which three actions are only available in the admin GUI? ()ATake a System SnapshotBConfigure LicensingCReview the EventsDSet the date and timeEUpgrade or downgrade the firmware

问题 多选题You have a firewall enforcer protecting resources in a data center. A user is experiencing difficulty connecting to a protected resource.Which two elements must exist so the user can access the resource?()AResource access policy on the MAG Series deviceBIPsec routing policy on the MAG Series deviceCGeneral traffic policy blocking access through the firewall enforcerDAuth table entry on the firewall enforcer

问题 多选题You are the network administrator for your company. A user is complaining that they are not able to access the network with the Junos Pulse client. You run a packet capture on the network interface to monitor the 802.1X authentication process. You notice that after the EAP- request/identity packet is received, and the supplicant responds with an EAP-response/identity packet, no further communication occurs for several seconds. What are three causes for this behavior?()AThe authenticator is not licensed to support Junos Pulse.BThe authenticator did not receive the EAP-response/identity packet.CThe authentication server is not receiving the RADIUS packet containing the EAP-response/identity data.DThe authenticator is sending the request over its loopback interface.EThe authentication server is sending back a RADIUS response packet, but the authenticator is not forwarding the response back to the supplicant.

问题 多选题Which three authentication resources are grouped within an authentication realm?()AAuthentication enforcerBDirectory serverCCaptive authenticationDAuthentication policyERole-mapping rules

问题 多选题You are configuring an SRX210 as a firewall enforcer that will tunnel IPsec traffic from several Junos Pulse users.Which two parameters must you configure on the SRX210?()Aaccess profileBIKE parametersCtunneled interfaceDredirect policy

问题 多选题Which three types of policies must you configure to allow remote users transparent access to protected resources using IF-MAP Federation between a Junos Pulse Secure Access Service and a Junos Pulse Access Control Service?()ASession-Export policies on the Junos Pulse Secure Access ServiceBSession-Export policies on the Junos Pulse Access Control ServiceCSession-Import policies on the Junos Pulse Secure Access ServiceDSession-Import policies on the Junos Pulse Access Control ServiceEResource access policies on the Junos Pulse Access Control Service

问题 单选题Your IT manager has requested that you start providing weekly reports of CPU utilization on all network devices.Which monitoring function should be enabled on the MAG Series device?()A Admin loggingB SNMP loggingC Syslog server loggingD Event logging

问题 单选题When configuring a single SRX210 as a firewall enforcer to a MAG4610 active/passive cluster, which statement supports a fault-tolerant configuration?()A The cluster VIP is defined on the MAG4610 cluster, and the VIP of the cluster is defined as an instance on the SRX Series device.B The cluster VIP is not defined on the MAG4610 cluster, and the IP address of both the active and passive nodes of the cluster are defined as separate instances on the SRX Series device.C The cluster VIP is defined on the MAG4610 cluster, and the IP address of the active node is defined as an instance on the SRX Series device.D The cluster VIP is not defined on the MAG4610 cluster, and the IP address of the passive node is defined as an instance on the SRX Series device.

问题 多选题Before replacing a MAG Series device, using the admin GUI, you export two backup files, system.cfg from "Maintenance" "ImportfExport Configuration" and user.cfg from "Maintenance" "Import/Export Users". When you receive the new hardware, you import all of the settings stored in the system.cfg file (including the IP address, network configuration, and device certificates), but you fail to import the user.cfg file. Which three configuration areas were updated by system.cfg?()ACluster configuration settingsBStatic routesCSNMP settingsDSign-in policiesEMAC authentication realms

问题 单选题Your security policy requires that users authenticating to the Junos Pulse Access Control Service are connecting from a domain member endpoint on the internal corporate network.Which set of role access restrictions must you configure to enforce this security policy?()A Source IP and browserB Source IP and certificateC Certificate and Host CheckerD Host Checker and source IP

问题 多选题What are three necessary steps for enabling 802.1X access when configuring Layer 2 enforcement?()AConfigure a location groupBCreatean authentication protocol setCConfigure the RADIUS AV pair listDConfigure RADIUS clientsEConfigure role and role-mapping rules

问题 单选题You navigate to "UAC" "Infranet Enforcer" "Auth Table Mapping" in the admin GUI. You see one policy, which is the unmodified, original default policy.Which statement is true?()A Dynamic auth table mapping is not enabled.B A successful authentication attempt will result in a new authentication table entry, which will be delivered only to the Junos enforcer protecting the network from which the user has authenticated.C To create a static auth table mapping, you must delete the default policy.D The default policy applies only to the factory-default role User.

问题 单选题You are installing a new deployment of the Junos Pulse Access Control Service. In your environment, you have VoIP handsets that support 802.1X authentication with EAP-MD5.Which deployment constraint must you consider?()A EAP-MD5 is not supported by the Junos Pulse Access Control ServiceB EAP-MD5 requires passwords to be stored in an encrypted format.C EAP-MD5 requires passwords to be stored in a clear text format.D EAP-MD5 performs a real time hash of the handset's MAC address.

问题 多选题You are configuring an LDAP authentication server, and you want to configure role-mapping rules based on group membership. When you attempt to search for groups in the server catalog, no groups appear.Assuming the LDAP server is reachable and functioning properly, in the admin GUI. Which two parts of the configuration should you verify are correct?()AFinding user entriesBAuthentication requiredCLDAP Server TypeDDetermining group membership

问题 单选题How would an end user add both a Junos Pulse Access Control Service URL and a Junos Pulse Secure Access Service URL to the same Junos Pulse client?()A By adding two separate connections in the connections dialog boxB By adding two separate intranet Controllers under the configuration hierarchyC By adding one intranet Controller and one SA under the configuration hierarchyD By adding two URLs under a connection in the connections dialog box