1.
What is a type of firewall enforcer supported by the Junos Pulse Access Control Service?
2.
You navigate to UAC> Infranet Enforcer > Auth Table Mapping in the admin GUI. You see one policy,
which is the unmodified, original default policy.
Which statement is true?
3.
You are configuring an active/passive cluster of SRX Series devices as the firewall enforcer on a MAG Series device. Which statement is true?
4.
Which three settings are accessible from the serial console menu on a MAG Series device? (Choose three.)
5.
A users Junos Pulse client uses 802.1X to access a wired network and is failing to authenticate. You run a packet capture from the users PC and notice that immediately after the client machine sends an EAPoL- start packet, an EAP-failure packet is returned. You review the RADIUS troubleshooting logs on the MAG Series device and do not see any authentication attempts from the user. Other users on the same Ethernet switch are successfully authenticating. Which device is sending the EAP-failure packet to the workstation?
6.
You want to ensure that users who access the company's protected resources present a client certificate before they are allowed to sign in. What should you configure?
7.
On a MAG Series device, where is the preauthentication sign-in message configured?
8.
You have an SRX Series Layer 2 enforcer providing 802.1X authentication for connected endpoints. Your security policy requires that users who fail their authentication be placed in a specific VLAN. On the Layer 2 enforcer, at the [edit protocols dot1x authenticator interface] hierarchy for each participating interface, what provides this functionality?
9.
A company has completed two acquisitions over the previous year. Each of the acquired companies was allowed to keep its own independent authentication server. The network administrator has been asked to roll out the Junos Pulse Access Control Service to users within the original company along with each of the two acquired organizations. The administrator configures three authentication realms, one for each independent authentication server, and associates them all with a single sign-in policy. All of the client endpoints are running Junos Pulse on their Windows XP desktops. When a user signs in to the Junos Pulse Access Control Service, which statement is correct?
10.
A customer is deploying a new Junos Pulse Access Control Service and has completed the initial boot configuration as prompted using a serial connection. The customer now wants to complete the rest of the configuration using the admin GUI. Into which port on the Junos Pulse Access Control Service should the customer plug the network cable to enable access to the admin GUI?