多项选择题
What are two roles of the authenticator as described in the 802.1X standard? ()
A. It proxies the authentication information between the supplicant and the authentication server.
B. It controls physical access to the network.
C. It communicates with the authentication server only.
D. It is responsible for verifying the identity of the supplicant through the use of an internal database.
相关考题
-
多项选择题
What are three elements the Junos Pulse Access Control Service uses to establish endpoint access to protected resources?()
A. sign-in policy
B. authentication realms
C. role restrictions
D. policy realms
E. routing policy -
单项选择题
You are an administrator of a large campus network. Every switch on a floor within each building of your campus has been configured for a different VLAN. During implementation of the Junos Pulse Access Control Service, you must configure a RADIUS return attribute policy to apply a role representing a group of authenticated users that frequently transport their laptops from building to building and floor to floor. In the admin GUI, which policy element would you enable to accommodate these users?()
A. Add Session-Timeout attribute with value equal to the session lifetime
B. Add Termination-Action attribute with value equal 1
C. VLAN
D. Open port -
多项选择题
A new software engineer has been hired. As part of the normal hiring process, the user was added to the Active Directory and placed into the Domain Users group and the SW_DEV group. The Domain Users group has access to the companys intranet website and time card system. The SW_DEV group has access to the source code library server. You have created roles that correspond to each Active Directory group. The user calls the help desk stating that they cannot access the source code library server. Which two troubleshooting tools would you use on the Junos Pulse Access Control Service to resolve the issue?()
A. Perform a policy trace for the specific user and review the output to isolate the problem.
B. Review the Events log.
C. Review the Admin Access log to verify that the user has the correct permissions to access the SVVJDEV resource.
D. Review the User Access log to verify that the user is getting mapped to both the Domain User role and the SW_DEV role.
