End users want to map a network drive on their PCs when they are connected to the Junos Pulse Access Control Service. The mapped drive must be removed when users disconnect their session. Which feature addresses this requirement?
Your corporate security policy requires that a user performing attacks must have limited network access and activities until an administrator can investigate.
In the admin GUI, which sensor event policy action must you configure in Configuration > Sensors >
Sensor Event Policies> [rule name] to accomplish this?
When using RADIUS as an external authentication method for 802.1X authentication for the Junos Pulse Access Control Service, what must you do to ensure that the RADIUS authentication works properly?
Your IT manager has requested that you start providing weekly reports of CPU utilization on all network devices. Which monitoring function should be enabled on the MAG Series device?
You are installing a new deployment of the Junos Pulse Access Control Service. In your environment, you have VoIP handsets that support 802.1X authentication with EAP-MD5. Which deployment constraint must you consider?
You want to provide all users in your corporation with a single agent that provides access to multiple connection types conditionally. For example, you connect to the Junos Pulse Access Control Service if you are connected to the intranet, but you connect to the Junos Pulse Secure Access Service if you are on a remote network. Which agent should you use for this type of connection requirement?
You have created a Host Checker policy that contains multiple rules. You want to inform end users which rule specifically has failed. In the admin GUI, which configuration setting would you enable?