[Free] Download New Latest (November) Juniper JN0-314 Actual Tests 61-70

Ensurepass

QUESTION 61

What are three benefits of IF-MAP Federation? (Choose three.)

 

A.

Enables seamless access for remote access users to firewall enforcer protected resources.

B.

Scales a Junos Pulse Access Control Service deployment beyond the capacity of a single cluster.

C.

Enables dynamic configuration synchronization across multiple MAG Series devices.

D.

Provides a substitute for WAN clustering among geographically separated MAG Series devices.

E.

Shares non-localized DP integration and IPsec configuration information between multiple Junos Pulse Access Control Service instances.

 

Answer: ABE

 

 

 

 

 

QUESTION 62

Which protocol is used for communication between the Junos Pulse client and 802.1X- compliant switches when performing Layer 2 enforcement?

 

A.

EAP

B.

RADIUS

C.

SSL

D.

EAP-o-HTTP

 

Answer: A

 

 

QUESTION 63

When using RADIUS as an external authentication method for 802.1X authentication for the Junos Pulse Access Control Service, what must you do to ensure that the RADIUS authentication works properly?

 

A.

Configure IP helper to forward the authentication requests from the clients to the external RADIUS server

B.

Configure the supplicant as anexternal authentication server

C.

Configure RADIUS proxy on the realm

D.

Specify the correct RADIUS port 389 on the Junos Pulse Access Control Service

 

Answer: C

< span lang="EN-US" style="font-family: ; mso-font-kerning: 0pt; mso-no-proof: yes"> 

 

QUESTION 64

A customer is deploying a new Junos Pulse Access Control Service and has completed the initial boot configuration as prompted using a serial connection. The customer now wants to complete the rest of the configuration using the admin GUI.

 

Into which port on the Junos Pulse Access Control Service should the customer plug the network cable to enable access to the admin GUI?

 

A.

the internal interface

B.

the external interface

C.

the management interface

D.

the console interface

 

 

 

 

 

Answer: A

 

 

QUESTION 65

You are receiving reports of possible unauthorized access to resources protected by a firewall enforcer running the Junos OS. You want to verity which users are currently accessing resources through the enforcer.

 

Which command should you use to verify user access on the enforcer?

 

A.

show services unified-access-control authentication-table

B.

show auth table

C.

show services unified-access-control policies

D.

show services unified-access-control captive-portal

 

Answer: A

 

 

QUESTION 66

Click the Exhibit button.

 

clip_image002

 

A user logs in, is assigned the default role, and successfully loads the Host Enforcer policies shown in the exhibit.

 

Which three statements are true? (Choose three.)

 

 

 

 

 

A.

The local host will respond t
o ICMP echo-request packets from 192.168.53.10.

B.

The local host will respond to UDP port 53 requests from 192.168.1.25.

C.

The local host can send any packet of any type to host 172.16.1.1.

D.

The local host will accept any packet of any type from host 172.16.1.1.

E.

The local host can send packets to UDP port512 on server 192.168.53.10.

 

Answer: ACD

 

 

QUESTION 67

A user’s Junos Pulse client uses 802.1X to access a wired network and is failing to authenticate. You run a packet capture from the user’s PC and notice that immediately after the client machine sends an EAPoL-start packet, an EAP-failure packet is returned. You review the RADIUS troubleshooting logs on the MAG Series device and do not see any authentication attempts from the user. Other users on the same Ethernet switch are successfully authenticating.

 

Which device is sending the EAP-failure packet to the workstation?

 

A.

The RADIUS server

B.

The EAPoL server

C.

The workstation’s network adapter

D.

The Ethernet switch

 

Answer: D

 

 

QUESTION 68

Without calling JTAC, which two troubleshooting tools on a MAG Series device would you use to identify the cause of an authentication failure?

 

A.

Remote Debugging

B.

System Snapshot

C.

User Access logs

D.

Policy Tracing

 

Answer: CD

 

 

 

 

 

QUESTION 69

You are configuring an IPsec routing policy that will be used with a ScreenOS firewall enforcer. What must you also configure?

 

A.

Source IP policies on the ScreenOS device

B.

ScreenOS IPsec policies on the Junos Pulse Access Control Service

C.

VPN NAT traversal on the ScreenOS device

D.

Source interface policies on the Junos Pulse Access Control Service

 

Answer: B

 

 

QUESTION 70

An administrator has created three different Odyssey Access Client preconfiguration files and assigned them to three different roles in the same realm.

 

Which action should the administrator take to ensure that users get the correct Odyssey Access Client preconfiguration file?

 

A.

Configure each user account in the auth server with the appropriate Odyssey Access Client preconfiguration files.

B.

Configure the role-mapping rules with the appropriate Odyssey Access Client preconfiguration files.

C.

Ensure that merge roles is selected in the role-mapping rules.

D.

Ensure that the first role a user is mapped to is the role with the appropriate Odyssey Access Client preconfiguration file.

 

Answer: D

 

Free VCE & PDF File for Juniper JN0-314 Actual Tests

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

This entry was posted in JN0-314 Actual Tests (November) and tagged , , , , , , . Bookmark the permalink.