多项选择题
A. Configure a captive-portal service that redirects all traffic back to the Junos Pulse Access Control Service.
B. Configure a security policy that references the unified-access-control captive-portal service.
C. Configure a captive-portal service that redirects unauthenticated traffic back to the Junos Pulse Access Control Service.
D. Configure a security policy that references the unified-access-control intranet-controller service.
单项选择题 An outside vendor is eligible for the guest role and the contractor role when accessing your network, that is secured with the Junos Pulse Access Control Service.What is the default role-mapping behavior?()
多项选择题 Click the Exhibit button. A user logs in, is assigned the default role, and successfully loads the Host Enforcer policies shown in the exhibit.Which three statements are true? ()
多项选择题 You administer a network containing SRX Series firewalls. New policy requires that you implement MAG Series devices to provide access control for end users. The policy requires that the SRX Series devices dynamically enforce security policy based on the source IP address of the user. The policy also requires that the users communicate with protected resources using encrypted traffic. Which two statements are true?()