单项选择题
You have a firewall enforcer protecting sensitive internal resources in a data center. The network traversed by endpoint traffic is semi-trusted, so you need to encrypt the traffic between the endpoints accessing the resources and the firewall enforcer.Which type of policies provide this level of protection?()
A. resource access policies
B. Host Enforcer policies
C. source IP enforcement policies
D. IPsec enforcement policies
相关考题
-
单项选择题
You have configured Junos Pulse on your Windows desktop and want to verify that the IPsec configuration policy is being pushed down to your workstation upon network authentication and login.Which utility program do you use to see this configuration and where do you find it?()
A. the Pulse Diagnostics Tool in the "File" > "Tools" menu option in the Pulse GUI
B. the Pulse Diagnostics Tool in the "Start" > "All Programs" > "Juniper Networks" > "Junos Pulse" menu folder next to the Junos Pulse application
C. the Pulse Diagnostics Viewer, which you access by simultaneously pressing "Ctrl" and "F2"
D. the Pulse Diagnostics Viewer in the "File" > "Tools" menu option in the Pulse GUI -
单项选择题
Which protocol is used for communication between the Junos Pulse client and 802.1X-compliant switches when performing Layer 2 enforcement?()
A. EAP
B. RADIUS
C. SSL
D. EAP-o-HTTP -
单项选择题
You are an administrator of an active/passive cluster of MAG Series devices running in mixed- mode configuration (IF-MAP server and authenticating users). The active user count is quickly approaching the maximum limit of the cluster. You have been directed to reconfigure the cluster to an active/active cluster and add a new license to increase the total number of active users the cluster can support. What must you do before changing the cluster configuration?()
A. Apply the new license to the passive node of the cluster.
B. Configure an external load balancer to hold the V IP.
C. Disable the active node in the cluster.
D. Remove the IF-MAP server configuration.
