单项选择题
A. By adding two separate connections in the connections dialog box
B. By adding two separate intranet Controllers under the configuration hierarchy
C. By adding one intranet Controller and one SA under the configuration hierarchy
D. By adding two URLs under a connection in the connections dialog box
单项选择题 You have a firewall enforcer protecting sensitive internal resources in a data center. The network traversed by endpoint traffic is semi-trusted, so you need to encrypt the traffic between the endpoints accessing the resources and the firewall enforcer.Which type of policies provide this level of protection?()
单项选择题 You have configured Junos Pulse on your Windows desktop and want to verify that the IPsec configuration policy is being pushed down to your workstation upon network authentication and login.Which utility program do you use to see this configuration and where do you find it?()
单项选择题 Which protocol is used for communication between the Junos Pulse client and 802.1X-compliant switches when performing Layer 2 enforcement?()