[Free] Download New Latest (November) Juniper JN0-141 Actual Tests Topic 0 part 01

Ensurepass

QUESTION 1  (Topic 0)

 

What makes RADIUS unique from other authentication servers used by the Infranet Controller?

 

A.

It can be used to obtain user attribute information.

B.

It can be used to obtain group attribute information.

C.

It can be used to do both authentication and accounting.

D.

It can be used as both a authorization server and authentication server.

 

Answer: C

 

 

QUESTION 2  (Topic 0)

 

Which configuration element determines the authentication protocol set used for EAP negotiations in an 802.1X configuration?

 

A.

the sign-in policy

B.

the location group

C.

the authentication realm

D.

the network access policy

 

Answer: A

 

 

QUESTION 3  (Topic 0)

 

A user is authenticating to the Infranet Controller with username “fin-jdoe” in a realm with “Merge settings for all assigned roles” selected. Which two role mapping rulesets will result in that user being eligible for both the Employee and Finance roles? (Choose two.)

 

A.

username=”*” -> Employee Stop

username=”fin-*” -> Finance

B.

username=”fin-*” -> Finance

username=”*” -> Employee Stop

C.

username=”*” -> Employee

username=”fin-*” -> Finance Stop

D.

username=”fin-*” -> Finance Stop

username=”*” -> Employee

 

 

 

 

 

Answer: BC

 

 

QUESTION 4  (Topic 0)

 

At which point in the enforcement process does the enforcer know the destination address and services that are to be protected by an infranet-auth policy?

 

A.

as the source IP policy is configured on the enforcer

B.

as the end user authenticates to the Infranet Controller

C.

as resource policies are configured on the Infranet Controller

D.

as the Infranet Controller completes the role mapping process and sends an auth table entry to the enforcer

 

Answer: C

 

 

QUESTION 5  (Topic 0)

 

Your authentication realm is configured to use an Active Directory server for authentication and an LDAP server for directory/attribute information. Which statement is true?

 

A.

Dynamic policy evaluation cannot be used on this realm.

B.

When your LDAP server is down you cannot authenticate users.

C.

Users can be mapped to roles based on their AD group membership.

D.

Users can be assigned resource policies based on their LDAP attributes.

 

Answer: D

 

 

QUESTION 6  (Topic 0)

 

Which three devices are elements described in the 802.1X specification? (Choose three.)

 

A.

supplicant

B.

access point

C.

authenticator

D.

endpoint client

E.

authentication server

 

Answer: ACE

 

 

 

QUESTION 7  (Topic 0)

 

Which statement regarding Host Checker policies is true?

 

A.

You cannot use predefined rules for Mac and Linux platforms.

B.

You cannot combine rules for multiple platforms in a single policy.

C.

All rules in the Host Checker policy must pass for the policy to pass.

D.

You cannot use predefined rules and custom rules in a single policy.

 

Answer: A

 

 

QUESTION 8  (Topic 0)

 

On an Infranet Controller running 2.2 software, where are resource access policies configured?

 

A.

UAC > Network Access > Resource Access

B.

UAC > Infranet Enforcer > Resource Access

C.

Policies > Network Access > Resource Access

D.

Policies > Infranet Enforcer > Resource Access

 

Answer: B

 

 

QUESTION 9  (Topic 0)

 

You want to use the Infranet Controller to assign VLANs to ports on your 802.1X-compliant access device. What must be configured on the access device?

 

A.

VLAN ID numbers

B.

RSTP on the ports

C.

trunking on the ports

D.

RADIUS attributes for VLANs

 

Answer: A

 

 

QUESTION 10  (Topic 0)

 

Which three statements are true about Host Checker? (Choose three.)

 

 

 

 

 

A.

Host Checker can collect information for use with MAC authentication.

B.

Host Checker can modify a role assignment immediately if a policy fails.

C.

Host Checker can be invoked before a user is allowed to sign in to the Infranet Controller.

D.

The Host Checker Integrity Measurement Verifier (IMV) works only with Odyssey Access Client.

E.

The Host Checker Integrity Measurement Collector (IMC) can run on Windows, Mac, and Linux systems.

 

Answer: BCE

 

Free VCE & PDF File for Juniper JN0-141 Actual Tests

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

This entry was posted in JN0-141 Actual Tests (November) and tagged , , , , , , . Bookmark the permalink.