多项选择题
What are two benefits of integrating Junos Pulse Access Control Service with Security Threat Response Manager (STRM)?()
A. The ability to detect and prevent malicious traffic.
B. The ability to associate security breaches with a specific user.
C. Converged management of network and security events, network flow data, and identity information.
D. Consistent device management across administrative realms.
相关考题
-
单项选择题
You have created a security policy on an SRX240 that permits traffic from any source-address, any destination-address, and any application. The policy will be a source IP policy for use with the Junos Pulse Access Control Service. What must you add to complete the security policy configuration?()
A. The intranet-auth authentication option
B. The redirect-portal application service
C. The uac-policy application service
D. The ipsec-vpn tunnel -
多项选择题
A user logs in and is mapped to two roles. The first role has a maximum timeout value of 600 minutes and the default Juniper Networks logo on the user interface page. The second role has a maximum timeout value of 1200 minutes and a custom logo on the user interface page. Based on the merging of these two roles, which two will be applied?()
A. A custom logo on the user interface page
B. A maximum timeout value of 600 minutes
C. A maximum time out value of 1200 minutes
D. A default Juniper Networks logo on the user interface page -
单项选择题
Which Junos Pulse Access Control Service client provides a built-in viewer to access local logs?()
A. Odyssey Access Client
B. Junos Pulse
C. Java agent
D. Agent less access
