多项选择题
A. access profile
B. IKE parameters
C. tunneled interface
D. redirect policy
单项选择题 You notice that during peak hours, some firewall enforcers contain a high number of auth table entries. As you investigate the issue, you discover that all users are getting auth table mappings to all firewalls, which is not acceptable. What should you do on the Junos Pulse Access Control Service to resolve this problem?()
单项选择题 Which parameter do you use to enable Junos Pulse Access Control Service enforcement on a policy on a ScreenOS platform?()
多项选择题 What are two steps to configure user authentication for a Junos Pulse Access Control Service?()