[Free] Download New Latest (November) Juniper JN0-314 Actual Tests 51-60

Ensurepass

QUESTION 51

Which two considerations must you take into account when deploying a Junos Pulse Access Control Service cluster? (Choose two.)

 

A.

State synchronization occurs only through the internal network interface card (NIC)

B.

Latency of the WAN must be less than 300 ms.

C.

Authenticating endpoints must be on the same LAN segment.

D.

Cluster members must use the same hardware platform.

 

Answer: AD

 

 

 

 

 

QUESTION 52

Your IT director has decided to allow employees to use their laptops at home as well as in the office. You have deployed the Junos Pulse client to allow access to the office’s 802.1X- enabled wired network. Your company also has the Junos Pulse Secure Access Service deployed. You want the Junos Pulse client to automatically launch the appropriate access method depending on each user’s location.

 

Which three are supported to determine the user’s location? (Choose three.)

 

A.

MAC address

B.

DNS server

C.

DHCP server

D.

resolve address

E.

endpoint address

 

Answer: BDE

 

 

QUESTION 53

Which Junos Pulse Access Control Service client provides a built-in viewer to access local logs?

 

A.

Odyssey Access Client

B.

Junos Pulse

C.

Java agent

D.

Agent less access

 

Answer: A

 

 

QUESTION 54

In a Junos Pulse Access Control Service firewall enforcement configuration, what is the purpose of the source IP policy?

 

A.

to specify the destination addresses to which access is permitted

B.

to specify the source address permitted to access the resource

C.

to specify the services to which access is permitted

D.

to inform the enforcer to expect policy information from the Junos Pulse Access Control

 

 

 

 

Service

 

Answer: D

 

 

QUESTION 55

An authentication realm consists of which three authentication resources? (Choose three.)

 

A.

Authentication server

B.

Session options

C.

Authentication policy

D.

End-point security policy

E.

Role-mapping rules

 

Answer: ACE

 

 

QUESTION 56

What are two steps to configure user authentication for a Junos Pulse Access Control Service? (Choose two.)

 

A.

Configure an authentication policy as part of the user role definitions.

B.

Configure a Sign-in Policy.

C.

Configure authentication agents as part of the user role definitions.

D.

Configure an authentication policy as part of the authentication realm definition.

 

Answer: BD

 

 

QUESTION 57

You are an administrator of a large campus network. Every switch on a floor within each building of your campus has been configured for a different VLAN. During implementation of the Junos Pulse Access Control Service, you must configure a RADIUS return attribute policy to apply a role representing a group of authenticated users that frequently transport their laptops from building to building and floor to floor.

 

In the admin GUI, which policy element would you enable to accommodate these users?

 

 

 

 

 

A.

Add Session-Timeout attribute with value equal to the session lifetime

B.

Add Termination-Action attribute with value equal

C.

VLAN

D.

Open port

 

Answer: D

 

 

QUESTION 58

You are performing the initial setup of a new MAG Series device and have installed a valid CA-signed certificate on the MAG Series device. Connectivity to an existing SRX Series firewall enforcer cannot be obtained.

 

What are two explanations for this behavior? (Choose two.)

 

A.

The MAG Series device has multiple ports associated with the certificate.

B.

The MAG Series device’s serial number needs to be configured on the SRX Series device.

C.

The SRX Series device must have a certificate signed by the same authority as the MAG Series device.

D.

The MAG Series device and SRX Series device are not synchronized to an NTP server.

 

Answer: CD

 

 

QUESTION 59

A company has completed two acquisitions over the previous year. Each of the acquired companies was allowed to keep its own independent authentication server. The network administrator has been asked to roll out the Junos Pulse Access Control Service to users within the original company along with each of the two acquired organizations. The administrator configures three authentication realms, one for each independent authentication server, and associates them all with a single sign-in policy. All of the client endpoints are running Junos Pulse on their Windows XP desktops.

 

When a user signs in to the Junos Pulse Access Control Service, which statement is correct?

 

A.

The first authentication realm that was added to the sign-in policy is used by default.

B.

The user is allowed to choose the correct authentication realm from a list presented by

 

 

 

 

Junos Pulse.

C.

When Junos Pulse is initially installed on the desktop, it must be configured with the correct realm.

D.

This is not an allowed configuration; the administrator should configure separate sign-in policies for each realm.

 

Answer: B

 

 

QUESTION 60

Your corporate security policy requires that a user performing attacks must have limited network access and activities until an administrator can investigate.

 

In the admin GUI, which sensor event policy action must you configure in “Configuration” > “Sensors” > “Sensor Event Policies” > [rule name] to accomplish this?

 

A.

Ignore

B.

Replace user’s role

C.

Terminate user session

D.

Disable user account

 

Answer: B

 

Free VCE & PDF File for Juniper JN0-314 Actual Tests

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

This entry was posted in JN0-314 Actual Tests (November) and tagged , , , , , , . Bookmark the permalink.