多项选择题X 纠错
A. Create a "Settings Update file" in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under "User Roles" > "Agent" > "Odyssey Settings" > "Preconfigured Installer".
B. Configure a wired adapter and assign the required SSID under "User Roles" > "Agent" > "Odyssey Settings".
C. Create a script in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under "User Roles" > "Agent" > "Odyssey Settings" > "Preconfigured Installer".
D. Create a "Preconfiguration file" in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under "User Roles" > "Agent" > "Odyssey Settings" > "Preconfigured Installer".
你可能喜欢
多项选择题
A. Select "Require and Enforce" for the Host Checker Policy in the realm authentication policy.
B. Select "Evaluate Policies" for the Host Checker policy in the realm authentication policy.
C. Configure the Host Checker policy as a role restriction for the Employee role.
D. Configure the Host Checker policy as a resource access policy for the Employee role.
多项选择题
A. It proxies the authentication information between the supplicant and the authentication server.
B. It controls physical access to the network.
C. It communicates with the authentication server only.
D. It is responsible for verifying the identity of the supplicant through the use of an internal database.
多项选择题
A. sign-in policy
B. authentication realms
C. role restrictions
D. policy realms
E. routing policy
单项选择题
A. Add Session-Timeout attribute with value equal to the session lifetime
B. Add Termination-Action attribute with value equal 1
C. VLAN
D. Open port
多项选择题
A. Perform a policy trace for the specific user and review the output to isolate the problem.
B. Review the Events log.
C. Review the Admin Access log to verify that the user has the correct permissions to access the SVVJDEV resource.
D. Review the User Access log to verify that the user is getting mapped to both the Domain User role and the SW_DEV role.
多项选择题
A. Isolate a file name unique to the custom image and create a custom rule-type of "File" which matches on the file. Select the "Required" option under the custom rule.
B. Identify the MAC address unique to network cards installed in PCs with the custom image and create a custom rule-type of "MAC Address" which matches on the appropriate MAC address.
Select the "Required" option under the custom rule C. Identify the IP address unique to the network cards installed in PCs with the custom image and create a custom rule-type of "IP Address" which matches on the appropriate IP address. Select the "Required" option under the custom rule.
D. Isolate or create a unique Windows registry key for the custom image and create a custom rule- type of "Registry Setting" which matches on the name of the registry key.
单项选择题
A. When you want all unauthenticated traffic to be redirected
B. When you want all clear text traffic to be redirected.
C. When you want all authenticated traffic to be redirected.
D. When you want all encrypted traffic to be redirected.
单项选择题
A. Configure a single Junos Pulse Access Control Service instance on the enforcer, specifying the VIP as the IP address the instance.
B. Configure multiple Junos Pulse Access Control Service instances on the enforcer, specifying the specific IP address each device in a separate instance.
C. Configure a single Junos Pulse Access Control Service instance on the enforcer, specifying the VIP and active node address in the instance.
D. Configure a single Junos Pulse Access Control Service instance on the enforcer, specifying the VIP and passive node address in the instance.
多项选择题
A. third-party RADIUS support
B. Host Enforcer
C. Host Checker
D. IPsec
E. soft tokens
多项选择题
A. To forcibly sign out a single user, you should select the check box next to that user's login name, then select "Delete Session".
B. If you select "Delete All Sessions", all users are forcibly signed out and are unable to sign in again until "Enable All Users" is selected.
C. Selecting "Disable All Users" prevents users from signing in and starting a new session, but does not forcibly sign out any users that already have an existing session.
D. Selecting "Refresh Roles" re-evaluates authentication policies, role-mapping rules, and resource policies for all existing user sessions.