单项选择题
What is a Host Enforcer policy?()
A. A policy that is defined on the endpoint that permits or denies inbound or outbound traffic.
B. A policy that is sent to the endpoint that permits or denies inbound or outbound traffic.
C. A policy that is sent to the protected resource that permits or denies inbound or outbound traffic.
D. A policy that is defined on the protected resource that permits or denies inbound or outbound traffic.
相关考题
-
单项选择题
You are installing a new deployment of the Junos Pulse Access Control Service. In your environment, you have VoIP handsets that support 802.1X authentication with EAP-MD5.Which deployment constraint must you consider?()
A. EAP-MD5 is not supported by the Junos Pulse Access Control Service
B. EAP-MD5 requires passwords to be stored in an encrypted format.
C. EAP-MD5 requires passwords to be stored in a clear text format.
D. EAP-MD5 performs a real time hash of the handset's MAC address. -
单项选择题
In a Junos Pulse Access Control Service firewall enforcement configuration, what is the purpose of the source IP policy?()
A. to specify the destination addresses to which access is permitted
B. to specify the source address permitted to access the resource
C. to specify the services to which access is permitted
D. to inform the enforcer to expect policy information from the Junos Pulse Access Control Service -
多项选择题
You are performing the initial setup of a new MAG Series device and have installed a valid CA- signed certificate on the MAG Series device. Connectivity to an existing SRX Series firewall enforcer cannot be obtained.What are two explanations for this behavior?()
A. The MAG Series device has multiple ports associated with the certificate.
B. The MAG Series device's serial number needs to be configured on the SRX Series device.
C. The SRX Series device must have a certificate signed by the same authority as the MAG Series device.
D. The MAG Series device and SRX Series device are not synchronized to an NTP server.
