多项选择题
On the Junos Pulse Access Control Service, you have created a role called Secret that you only want to provide to users who present a certificate.Using the admin GUI, which two features would you configure to satisfy this requirement?()
A. Sign-in Policy
B. Role Mapping Rule
C. Role Restrictions
D. Trusted Server CA
相关考题
-
多项选择题
What are three necessary steps for enabling 802.1X access when configuring Layer 2 enforcement?()
A. Configure a location group
B. Createan authentication protocol set
C. Configure the RADIUS AV pair list
D. Configure RADIUS clients
E. Configure role and role-mapping rules -
多项选择题
You have three classes of users on your network: employee, contractor, and IT administrator. You configure the Junos Pulse Access Control Service to assign roles to each user class and require that a specific wireless SSID be preconfigured for the Odyssey Access Client based on the role. Which configuration method should you use to satisfy this scenario?()
A. Create a "Settings Update file" in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under "User Roles" > "Agent" > "Odyssey Settings" > "Preconfigured Installer".
B. Configure a wired adapter and assign the required SSID under "User Roles" > "Agent" > "Odyssey Settings".
C. Create a script in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under "User Roles" > "Agent" > "Odyssey Settings" > "Preconfigured Installer".
D. Create a "Preconfiguration file" in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under "User Roles" > "Agent" > "Odyssey Settings" > "Preconfigured Installer". -
多项选择题
You want to enforce a Host Checker policy so that only users who pass the policy receive the Employee role. In the admin GUI, which two parameters must you configure?()
A. Select "Require and Enforce" for the Host Checker Policy in the realm authentication policy.
B. Select "Evaluate Policies" for the Host Checker policy in the realm authentication policy.
C. Configure the Host Checker policy as a role restriction for the Employee role.
D. Configure the Host Checker policy as a resource access policy for the Employee role.
