单项选择题
You notice that during peak hours, some firewall enforcers contain a high number of auth table entries. As you investigate the issue, you discover that all users are getting auth table mappings to all firewalls, which is not acceptable.
What should you do on the Junos Pulse Access Control Service to resolve this problem?()
A. Delete the default auth table mapping policy
B. Create auth table mapping policies that route users to specific resources
C. Create Resource Access policies that permit access to specific resources
D. Create Source Interface policies that route users to specific resources
相关考题
-
单项选择题
Which parameter do you use to enable Junos Pulse Access Control Service enforcement on a policy on a ScreenOS platform?()
A. uac-policy
B. ic-policy
C. inyranet-auth
D. uac-auth -
多项选择题
What are two steps to configure user authentication for a Junos Pulse Access Control Service?()
A. Configure an authentication policy as part of the user role definitions.
B. Configure a Sign-in Policy.
C. Configure authentication agents as part of the user role definitions
D. Configure an authentication policy as part of the authentication realm definition. -
多项选择题
In the Junos Pulse Access Control Service, which three actions are only available in the admin GUI? ()
A. Take a "System Snapshot"
B. Configure "Licensing"
C. Review the "Events"
D. Set the date and time
E. Upgrade or downgrade the firmware
