单项选择题
An outside vendor is eligible for the guest role and the contractor role when accessing your network, that is secured with the Junos Pulse Access Control Service.What is the default role-mapping behavior?()
A. The vendor must select a role from a list of eligible roles.
B. The vendor must select a rule from a list of eligible rules.
C. The vendor is automatically mapped to the first configured role
D. The vendor is automatically granted a merged role.
相关考题
-
多项选择题
Click the Exhibit button. A user logs in, is assigned the default role, and successfully loads the Host Enforcer policies shown in the exhibit.Which three statements are true? ()
A. The local host will respond to ICMP echo-request packets from 192.168.53.10.
B. The local host will respond to UDP port 53 requests from 192.168.1.25.
C. The local host can send any packet of any type to host 172.16.1.1.
D. The local host will accept any packet of any type from host 172.16.1.1.
E. The local host can send packets to UDP port512 on server 192.168.53.10. -
多项选择题
You administer a network containing SRX Series firewalls. New policy requires that you implement MAG Series devices to provide access control for end users. The policy requires that the SRX Series devices dynamically enforce security policy based on the source IP address of the user. The policy also requires that the users communicate with protected resources using encrypted traffic. Which two statements are true?()
A. The endpoints can use agentless access.
B. Encrypted traffic flows between the endpoint and the enforcer.
C. Encrypted traffic flows between the endpoint and the protected resource
D. The endpoints can use the Odyssey Access Client. -
多项选择题
Before replacing a MAG Series device, using the admin GUI, you export two backup files, system.cfg from "Maintenance" > "ImportfExport Configuration" and user.cfg from "Maintenance" > "Import/Export Users". When you receive the new hardware, you import all of the settings stored in the system.cfg file (including the IP address, network configuration, and device certificates), but you fail to import the user.cfg file. Which three configuration areas were updated by system.cfg?()
A. Cluster configuration settings
B. Static routes
C. SNMP settings
D. Sign-in policies
E. MAC authentication realms
