单项选择题
In a Junos Pulse Access Control Service firewall enforcement configuration, what is the purpose of the source IP policy?()
A. to specify the destination addresses to which access is permitted
B. to specify the source address permitted to access the resource
C. to specify the services to which access is permitted
D. to inform the enforcer to expect policy information from the Junos Pulse Access Control Service
相关考题
-
多项选择题
You are performing the initial setup of a new MAG Series device and have installed a valid CA- signed certificate on the MAG Series device. Connectivity to an existing SRX Series firewall enforcer cannot be obtained.What are two explanations for this behavior?()
A. The MAG Series device has multiple ports associated with the certificate.
B. The MAG Series device's serial number needs to be configured on the SRX Series device.
C. The SRX Series device must have a certificate signed by the same authority as the MAG Series device.
D. The MAG Series device and SRX Series device are not synchronized to an NTP server. -
多项选择题
You must configure access to the corporate network for employees using a client access method. Users require IPsec tunneling to protected resources and an 802.1X supplicant. Users will access the network using Windows platforms.Which two client access methods would support these requirements?()
A. Junos Pulse
B. Java Agent
C. Odyssey Access Client
D. Native 802.1X supplicant -
多项选择题
What are three default role-mapping rule values that are available for all realms?()
A. Username
B. LDAP user
C. Certificate
D. Custom expressions
E. Source y IP
