单项选择题
Which protocol is used for communication between the Junos Pulse client and 802.1X-compliant switches when performing Layer 2 enforcement?()
A. EAP
B. RADIUS
C. SSL
D. EAP-o-HTTP
相关考题
-
单项选择题
You are an administrator of an active/passive cluster of MAG Series devices running in mixed- mode configuration (IF-MAP server and authenticating users). The active user count is quickly approaching the maximum limit of the cluster. You have been directed to reconfigure the cluster to an active/active cluster and add a new license to increase the total number of active users the cluster can support. What must you do before changing the cluster configuration?()
A. Apply the new license to the passive node of the cluster.
B. Configure an external load balancer to hold the V IP.
C. Disable the active node in the cluster.
D. Remove the IF-MAP server configuration. -
单项选择题
You are customizing the user interface options for the finance department in your organization. Users in the department are able to see a session counter on the Web interface of the Junos Pulse Access Control Service. The CFO is unable to see the session counter.Which explanation would cause this behavior?()
A. The CFO is mapped to the finance role, but the session counter was enabled prior to the role mapping.
B. The CFO is mapped to the finance role, but the session counter was enabled after the role mapping.
C. The CFO is mapped to the executive and finance roles, but the CFO was mapped to the executive role first, which does not have the session counter enabled.
D. The CFO is mapped to the executive and finance roles, but the CFO was mapped to the executive role last, which does not have the session counter enabled. -
单项选择题
When configuring resource access policies in a Junos Pulse Access Control Service device, which entry is permitted when defining the specific resources?()
A. Hostname
B. fully qualified domain name
C. IP address
D. address book entry
