多项选择题
A new software engineer has been hired. As part of the normal hiring process, the user was added to the Active Directory and placed into the Domain Users group and the SW_DEV group. The Domain Users group has access to the company's intranet website and time card system. The SW_DEV group has access to the source code library server. You have created roles that correspond to each Active Directory group. The user calls the help desk stating that they cannot access the source code library server.
Which two troubleshooting tools would you use on the Junos Pulse Access Control Service to resolve the issue?()
A. Perform a policy trace for the specific user and review the output to isolate the problem.
B. Review the Events log.
C. Review the Admin Access log to verify that the user has the correct permissions to access the SVVJDEV resource.
D. Review the User Access log to verify that the user is getting mapped to both the Domain User role and the SW_DEV role.
相关考题
-
多项选择题
You administer a network with Windows-based endpoints that have custom software images. You want to use Host Checker to require that endpoints are running the custom software image.Which two Host Checker policy rules would be used to enforce this requirement?()
A. Isolate a file name unique to the custom image and create a custom rule-type of "File" which matches on the file. Select the "Required" option under the custom rule.
B. Identify the MAC address unique to network cards installed in PCs with the custom image and create a custom rule-type of "MAC Address" which matches on the appropriate MAC address.
Select the "Required" option under the custom rule C. Identify the IP address unique to the network cards installed in PCs with the custom image and create a custom rule-type of "IP Address" which matches on the appropriate IP address. Select the "Required" option under the custom rule.
D. Isolate or create a unique Windows registry key for the custom image and create a custom rule- type of "Registry Setting" which matches on the name of the registry key. -
单项选择题
You are configuring captive portal on your SRX Series device for guest user access.When would you use the redirect-traffic all command?()
A. When you want all unauthenticated traffic to be redirected
B. When you want all clear text traffic to be redirected.
C. When you want all authenticated traffic to be redirected.
D. When you want all encrypted traffic to be redirected. -
单项选择题
You are deploying a Junos Pulse Access Control Service cluster in active/passive mode. How do you configure the IP address on the SRX Series devices?()
A. Configure a single Junos Pulse Access Control Service instance on the enforcer, specifying the VIP as the IP address the instance.
B. Configure multiple Junos Pulse Access Control Service instances on the enforcer, specifying the specific IP address each device in a separate instance.
C. Configure a single Junos Pulse Access Control Service instance on the enforcer, specifying the VIP and active node address in the instance.
D. Configure a single Junos Pulse Access Control Service instance on the enforcer, specifying the VIP and passive node address in the instance.
