[Free] Download New Latest (November) Juniper JN0-314 Actual Tests 11-20

Ensurepass

QUESTION 11

You have created a security policy on an SRX240 that permits traffic from any source- address, any destination-address, and any application. The policy will be a source IP policy for use with the Junos Pulse Access Control Service.

 

What must you add to complete the security policy configuration?

 

A.

The intranet-auth authentication option

B.

The redirect-portal application service

C.

The uac-policy application service

D.

The ipsec-vpn tunnel

 

Answer: C

 

 

QUESTION 12

In the admin GUI, you navigate to “System” > “Status” > “Active Users”. You see several buttons, including “Delete Session”, “Delete All Sessions”. “Refresh Roles”, and “Disable All Users”.

 

Which two statements are true? (Choose two.)

 

A.

To forcibly sign out a single user, you should select the check box next to that user’s login name, then select “Delete Session”.

B.

If you select “Delete All Sessions”, all users are forcibly signed out and are unable to

 

 

 

 

sign in again until “Enable All Users” is selected.

C.

Selecting “Disable All Users” prevents users from signing in and starting a new session, but does not forcibly sign out any users that already have an existing session.

D.

Selecting “Refresh Roles” re-evaluates authentication policies, role-mapping rules, and resource policies for all existing user sessions.

 

Answer: AD

 

 

QUESTION 13

What are two features provided by the Junos Pulse client? (Choose two.)

 

A.

802.1X

B.

video messaging

C.

IPsec

D.

VoIP

 

Answer: BD

 

 

QUESTION 14

Which three types of policies must you configure to allow remote users transparent access to protected resources using IF-MAP Federation between a Junos Pulse Secure Access Service and a Junos Pulse Access Control Service? (Choose three.)

 

A.

Session-Export policies on the Junos Pulse Secure Access Service

B.

Session-Export policies on the Junos Pulse Access Control Service

C.

Session-Import policies on the Junos Pulse Secure Access Service

D.

Session-Import policies on the Junos Pulse Access Control Service


E.

Resource access policies on the Junos Pulse Access Control Service

 

Answer: ADE

 

 

QUESTION 15

Which three authentication resources are grouped within an authentication realm? (Choose three.)

 

 

 

 

 

A.

Authentication enforcer

B.

Directory server

C.

Captive authentication

D.

Authentication policy

E.

Role-mapping rules

 

Answer: BDE

 

 

QUESTION 16

What are three elements the Junos Pulse Access Control Service uses to establish endpoint access to protected resources? (Choose three.)

 

A.

sign-in policy

B.

authentication realms

C.

role restrictions

D.

policy realms

E.

routing policy

 

Answer: ABC

 

 

QUESTION 17

Two MAG4610s are running in an active/passive cluster configuration. The system administrator is planning to apply a service package to the cluster.

 

Which process should the administrator follow?

 

A.

Perform the upgrade on the active node of the cluster. When completed, the node reboots and then pushes the service package to the passive node automatically.

B.

Perform the upgrade on the passive node of the cluster. When completed, the node reboots and then pushes the service package to the active node automatically.

C.

On the clustering status page, disable the active node. Perform the upgrade on the disabled node. When completed and the node reboots, enable the node on the clustering status page. Repeat the process on the passive node.

D.

On the clustering status page, disable the passive node. Perform the upgrade on the disabled node. When completed and the node reboots, enable the node on the clustering status page. Repeat the process on the active node.

 

 

 

 

 

Answer: A

 

 

QUESTION 18

On the Junos Pulse Access Control Service, you have created a role called Secret that you only want to provide to users who present a certificate.

 

Using the admin GUI, which two features would you configure to satisfy this requirement? (Choose two.)

 

A.

Sign-in Policy

B.

Role Mapping Rule

C.

Role Restrictions

D.

Trusted Server CA

 

Answer: BC

 

 

QUESTION 19

Click the Exhibit button.

 

clip_image002

 

A customer configures the Junos Pulse Access Control Service with a Contractor role, an Employee role, and a Remediation role. A user logs in and is assigned the Remediation role.

 

Referring to the exhibit, to which RADIUS Return Attributes Policy will the user be assigned?

 

 

 

 

 

A.

CorporateVLAN

B.

EmployeeVLAN

C.

RemediationVLAN

D.

GuestVLAN

 

Answer: D

 

 

QUESTION 20

Which three features are supported with the Junos Pulse client? (Choose three.)

 

A.

third-party RADIUS support

B.

Host Enforcer

C.

Host Checker

D.

IPsec

E.

soft tokens

 

Answer: CDE

Free VCE & PDF File for Juniper JN0-314 Actual Tests

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

This entry was posted in JN0-314 Actual Tests (November) and tagged , , , , , , . Bookmark the permalink.