多项选择题
A. Kill a running process on the endpoint, based on executable name and MD5 checksum.
B. Delete a file on the endpoint's file system.
C. Download and run a remediation executable from the local software distribution server.
D. Alter registry entries to prevent future execution of an executable, based on executable name and full path.
单项选择题 A user signs into the Junos Pulse Access Control Service on a wired network. The user then migrates to a wireless network, receives a new IP address, and notices that the session is disconnected.In the admin GUI, what must be configured for the user to stay connected when migrating from a wired to a wireless network?()
多项选择题 A user is successfully authenticating to the network but is unable to access protected resources behind a ScreenOS enforcer. You log in to the ScreenOS enforcer and issue the command get auth table infranet and you do not see the user listed.Which two event log settings on the Junos Pulse Access Control Service must you enable to troubleshootthis issue?()
单项选择题 A customer is deploying a new Junos Pulse Access Control Service and has completed the initial boot configuration as prompted using a serial connection. The customer now wants to complete the rest of the configuration using the admin GUI.Into which port on the Junos Pulse Access Control Service should the customer plug the network cable to enable access to the admin GUI?()