单项选择题
When configuring resource access policies in a Junos Pulse Access Control Service device, which entry is permitted when defining the specific resources?()
A. Hostname
B. fully qualified domain name
C. IP address
D. address book entry
相关考题
-
单项选择题
Two MAG4610s are running in an active/passive cluster configuration. The system administrator is planning to apply a service package to the cluster.Which process should the administrator follow?()
A. Perform the upgrade on the active node of the cluster. When completed, the node reboots and then pushes the service package to the passive node automatically.
B. Perform the upgrade on the passive node of the cluster. When completed, the node reboots and then pushes the service package to the active node automatically.
C. On the clustering status page, disable the active node. Perform the upgrade on the disabled node. When completed and the node reboots, enable the node on the clustering status page.Repeat the process on the passive node.
D. On the clustering status page, disable the passive node. Perform the upgrade on the disabled node. When completed and the node reboots, enable the node on the clustering status page.Repeat the process on the active node. -
多项选择题
Without calling JTAC, which two troubleshooting tools on a MAG Series device would you use to identify the cause of an authentication failure?()
A. Remote Debugging
B. System Snapshot
C. User Access logs
D. Policy Tracing -
多项选择题
What information does the Junos Pulse Access Control Service provide to Security Threat Response Manager (STRM)?()
A. Session length
B. User browser information
C. Session IP address
D. User identity information
