A customer is trying to determine which client to deploy. The customer wants to be able to perform Layer 2 authentication as well as connect to the Junos Pulse Secure Access Service. Which client should the customer deploy?
An outside vendor is eligible for the guest role and the contractor role when accessing your network, that is secured with the Junos Pulse Access Control Service. What is the default role-mapping behavior?
Two MAG4610s are running in an active/passive cluster configuration. The system administrator is planning to apply a service package to the cluster. Which process should the administrator follow?
When configuring resource access policies in a Junos Pulse Access Control Service device, which entry is permitted when defining the specific resources?
You are customizing the user interface options for the finance department in your organization. Users in the department are able to see a session counter on the Web interface of the Junos Pulse Access Control Service. The CFO is unable to see the session counter. Which explanation would cause this behavior?
You are an administrator of an active/passive cluster of MAG Series devices running in mixed- mode configuration (IF-MAP server and authenticating users). The active user count is quickly approaching the maximum limit of the cluster. You have been directed to reconfigure the cluster to an active/active cluster and add a new license to increase the total number of active users the cluster can support. What must you do before changing the cluster configuration?
You have configured Junos Pulse on your Windows desktop and want to verify that the IPsec configuration policy is being pushed down to your workstation upon network authentication and login. Which utility program do you use to see this configuration and where do you find it?