单项选择题
You are validating the configuration of your SRX Series device and see the output shown below.What does this indicate?()
A.The SRX Series device has been configured correctly, the Junos Pulse Access Control Service is reachable on the network, and the SRX Series device is waiting to receive the initial connection from the Junos Pulse Access Control Service.
B.The SRX Series device has confirmed that the Junos Pulse Access Control Service is configured and is reachable on the network, the SRX Series device is waiting to receive the connection from the Junos Pulse Access Control Service, and all that remains to be accomplished is to configure the SRX Series device.
C.The SRX Series device is configured correctly and connected to the Junos Pulse Access Control Service. All that remains to be done to complete the configuration is to configure the SRX Series device on the Junos Pulse Access Control Service.
D.Both the Junos Pulse Access Control Service and the SRX Series device are configured correctly and communicating with each other.
相关考题
-
单项选择题
When using RADIUS as an external authentication method for 802.1X authentication for the Junos Pulse Access Control Service, what must you do to ensure that the RADIUS authentication works properly?()
A. Configure IP helper to forward the authentication requests from the clients to the external RADIUS server
B. Configure the supplicant as anexternal authentication server
C. Configure RADIUS proxy on the realm
D. Specify the correct RADIUS port 389 on the Junos Pulse Access Control Service -
多项选择题
You are the network administrator for your company. A user is complaining that they are not able to access the network with the Junos Pulse client. You run a packet capture on the network interface to monitor the 802.1X authentication process. You notice that after the EAP- request/identity packet is received, and the supplicant responds with an EAP-response/identity packet, no further communication occurs for several seconds. What are three causes for this behavior?()
A. The authenticator is not licensed to support Junos Pulse.
B. The authenticator did not receive the EAP-response/identity packet.
C. The authentication server is not receiving the RADIUS packet containing the EAP-response/identity data.
D. The authenticator is sending the request over its loopback interface.
E. The authentication server is sending back a RADIUS response packet, but the authenticator is not forwarding the response back to the supplicant. -
单项选择题
Your corporate security policy requires that a user performing attacks must have limited network access and activities until an administrator can investigate.In the admin GUI, which sensor event policy action must you configure in "Configuration" > "Sensors" > "Sensor Event Policies" > [rule name] to accomplish this?()
A. Ignore
B. Replace users role
C. Terminate user session
D. Disable user account
