单项选择题
A.Configure roles based on departments and assign access based on source IP address.
B.Configure roles based on the user's manager and assign access based on the user's MAC address
C.Configure roles based on group memberships and assign a specific VLAN to the role.
D.Configure roles based on RADIUS request attribute and assign a specific VLAN to the role.
多项选择题 Which two considerations must you take into account when deploying a Junos Pulse Access Control Service cluster?()
多项选择题 Your IT director has decided to allow employees to use their laptops at home as well as in the office. You have deployed the Junos Pulse client to allow access to the offices 802.1X-enabled wired network. Your company also has the Junos Pulse Secure Access Service deployed. You want the Junos Pulse client to automatically launch the appropriate access method depending on each users location. Which three are supported to determine the users location?()
单项选择题 You have created a Host Checker policy that contains multiple rules. You want to inform end users which rule specifically has failed.In the admin GUI, which configuration setting would you enable?()