单项选择题
Your IT manager has requested that you start providing weekly reports of CPU utilization on all network devices.Which monitoring function should be enabled on the MAG Series device?()
A. Admin logging
B. SNMP logging
C. Syslog server logging
D. Event logging
相关考题
-
多项选择题
On the Junos Pulse Access Control Service, you have created a role called Secret that you only want to provide to users who present a certificate.Using the admin GUI, which two features would you configure to satisfy this requirement?()
A. Sign-in Policy
B. Role Mapping Rule
C. Role Restrictions
D. Trusted Server CA -
多项选择题
What are three necessary steps for enabling 802.1X access when configuring Layer 2 enforcement?()
A. Configure a location group
B. Createan authentication protocol set
C. Configure the RADIUS AV pair list
D. Configure RADIUS clients
E. Configure role and role-mapping rules -
多项选择题
You have three classes of users on your network: employee, contractor, and IT administrator. You configure the Junos Pulse Access Control Service to assign roles to each user class and require that a specific wireless SSID be preconfigured for the Odyssey Access Client based on the role. Which configuration method should you use to satisfy this scenario?()
A. Create a "Settings Update file" in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under "User Roles" > "Agent" > "Odyssey Settings" > "Preconfigured Installer".
B. Configure a wired adapter and assign the required SSID under "User Roles" > "Agent" > "Odyssey Settings".
C. Create a script in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under "User Roles" > "Agent" > "Odyssey Settings" > "Preconfigured Installer".
D. Create a "Preconfiguration file" in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under "User Roles" > "Agent" > "Odyssey Settings" > "Preconfigured Installer".
