多项选择题
An authentication realm consists of which three authentication resources?()
A. Authentication server
B. Session options
C. Authentication policy
D. End-point security policy
E. Role-mapping rules
相关考题
-
单项选择题
You are the administrator of a Junos Pulse Access Control Service implementation. You must restrict authenticated users connected from the branch offices to a few specific resources within the data center. However, when the authenticated users are connected at the corporate office, they are allowed more access to the data center resources. You have created two roles with different levels of access and are trying to determine the best way of controlling when a user is mapped to a specific role. Having the user prompted to manually select their role is possible, but you want to automate the process. Which configuration solves this problem?()
A. Implement a RADIUS request attribute policy to assist with realm selection and create different role-mapping rules for the user in each realm.
B. Implement a directory/attribute server on the realm and set up this server to determine by group membership the proper role to which a user should be mapped.
C. Reorder the role-mapping rules to allow for the more open role to be mapped first and then enable the "stop processing rules when this rule matches" function on this role.
D. Implement a Host Checker policy on the realm that determines the geographic location of the device and restricts the user based on the results of the policy. -
多项选择题
Your manager has informed you that only specific users can have access to the Preferred Members role, and that these users are restricted to the Preferred Members role. The Preferred Members role-mapping rule is currently set as the last rule in your role-mapping rules and is based on username. Currently all users are assigned to the Preferred Members role-mapping rule. Which three changes in the admin GUI will enforce your managers change request?()
A. Move the Preferred Members role-mapping rule to the top of the list.
B. Remove the Preferred Members role from the role-mapping rule.
C. Edit the Preferred Members role-mapping rule so that the username is equal to *.
D. Edit the Preferred Members role-mapping rule so that only the select users are assigned to the role-mapping rule.
E. Edit the Preferred Members role-mapping rule and select "Stop processing rules when this rule matches". -
单项选择题
Which Junos Pulse feature allows the user to log in once through a Junos Pulse Secure Access Service on the network and then access resources protected by a Junos Pulse Access Control Service without reauthentication?()
A. Roaming Session
B. Session Migration
C. Location Awareness
D. Persistent Session
