多项选择题
A. Move the Preferred Members role-mapping rule to the top of the list.
B. Remove the Preferred Members role from the role-mapping rule.
C. Edit the Preferred Members role-mapping rule so that the username is equal to *.
D. Edit the Preferred Members role-mapping rule so that only the select users are assigned to the role-mapping rule.
E. Edit the Preferred Members role-mapping rule and select "Stop processing rules when this rule matches".
单项选择题 Which Junos Pulse feature allows the user to log in once through a Junos Pulse Secure Access Service on the network and then access resources protected by a Junos Pulse Access Control Service without reauthentication?()
多项选择题 You are configuring an SRX210 as a firewall enforcer that will tunnel IPsec traffic from several Junos Pulse users.Which two parameters must you configure on the SRX210?()
单项选择题 You notice that during peak hours, some firewall enforcers contain a high number of auth table entries. As you investigate the issue, you discover that all users are getting auth table mappings to all firewalls, which is not acceptable. What should you do on the Junos Pulse Access Control Service to resolve this problem?()