[Free] Download New Latest (November) Juniper JN0-141 Actual Tests Topic 0 part 03

Ensurepass

QUESTION 21  (Topic 0)

 

Which additional configuration must be completed when setting up role restrictions using certificates?

 

A.

Set up a certificate authentication server.

B.

Configure the authentication realm to remember certificate information.

C.

Configure the authentication realm to use a certificate server for authentication.

D.

Configure a role mapping rule requiring certification information to map user to role.

 

Answer: B

 

 

QUESTION 22  (Topic 0)

 

One of your users cannot access a protected resource. When you examine the output of debug auth infranet on the overlay enforcer, you see the following output:

 

## 2008-07-10 21:01:06 : notify drop: 10.4.2.5

 

## 2008-07-10 21:01:20 : update_jps_a_b: auth_id 3, src_ip 10.4.2.5, user bob

 

## 2008-07-10 21:01:20 : : roles 1213902732.796213.0, role-names Employee , user ctx ,idle_timeout 0

 

## 2008-07-10 21:01:20 : AUTHID: 1 NOT FOUND

 

 

 

 

 

What can you deduce from this output?

 

A.

The end user has not authenticated to the Infranet Controller.

B.

The Infrnaet Controller has not relayed the resource access policy to the enforcer.

C.

The Infranet Controller has not relayed the user authentication data to the enforcer.

D.

The end user has not been assigned the role associated with the resource access policy protecting the resource.

 

Answer: C

 

 

QUESTION 23  (Topic 0)

 

Your company requires that users who authenticate using the Web run an approved Web browser and have current antivirus signatures to present their credentials for authentication. If they do not have current signatures or are running an unauthorized browser, they cannot authenticate. What do you configure on the Infranet Controller to implement your company’s authentication policy?

 

A.

a browser restriction on the us
er’s role and a Host Checker restriction on the user’s role

B.

a browser restriction on the user’s realm and a Host Checker restriction on the user’s role

C.

a browser restriction on the user’s role and a Host Checker restriction on the user’s realm

D.

a browser restriction on the user’s realm and a Host Checker restriction on the user’s realm

 

Answer: D

 

 

QUESTION 24  (Topic 0)

 

Which two options must be defined to enable the Infranet Controller to respond to RADIUS requests from an 802.1X-compliant network access device? (Choose two.)

 

A.

a sign-in policy

B.

a shared secret

C.

the IP address of the network access device

D.

the proper vendor-specific attributes for the network access device

 

Answer: BC

 

 

 

QUESTION 25  (Topic 0)

 

What are two policies used on a ScreenOS overlay enforcer? (Choose two.)

 

A.

IPsec policy

B.

source IP policy

C.

resource access policy

D.

auth table mapping policy

 

Answer: AB

 

 

QUESTION 26  (Topic 0)

 

If Host Checker restrictions are applied at the role level and the Allow access to the role if any ONE of the select policies is passed option is not selected, which two statements are true? (Choose two.)

 

A.

Each role is evaluated separately.

B.

The endpoint must pass all policies to access the role.

C.

Host Checker must be set to Require and enforce.

D.

The endpoint must pass all rules in the policy to access the role.

 

Answer: AB

 

 

QUESTION 27  (Topic 0)

 

Which settings determine the logo presented to a clientless user after authentication?

 

A.

UI options

B.

sign-in policy

C.

session options

D.

agentless options

 

Answer: A

 

 

QUESTION 28  (Topic 0)

 

 

 

 

How is a user associated with a specific resource access policy?

 

A.

The overlay enforcer maps a policy to a user based on the user’s role.

B.

The Infranet Controller maps a policy to a user based on the user’s role.

C.

The overlay enforcer maps a policy to a user based on the user’s source IP address.

D.

The Infranet Controller maps a policy to a user based on the user’s source IP address.

 

Answer: B

 

 

QUESTION 29  (Topic 0)

 

A customer wants to allow agentless access for certain roles. Which navigation path should be used to set this option?

 

A.

Users > Users Roles > [RoleName] > Agentless

B.

Users > Users Roles > [RoleName] > Agent Options

C.

Users > Users Roles > [RoleName] > General > UI Options

D.

Users > Users Roles > [RoleName] > General > Session Options

 

Answer: A

 

 

QUESTION 30  (Topic 0)

 

Which three configuration elements are required during the initial configuration of the Infranet Controller? (Choose three.)

 


A.

gateway

B.

hostname

C.

license agreement

D.

CA-signed certificate

E.

self-signed certificate

 

Answer: ACE

 

Free VCE & PDF File for Juniper JN0-141 Actual Tests

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

This entry was posted in JN0-141 Actual Tests (November) and tagged , , , , , , . Bookmark the permalink.