[Free] Download New Latest (November) Juniper JN0-314 Actual Tests 71-80

Ensurepass

 

QUESTION 71

You administer a network with Windows-based endpoints that have custom software images. You want to use Host Checker to require that endpoints are running the custom software image.

 

Which two Host Checker policy rules would be used to enforce this requirement? (Choose two.)

A.

Isolate a file name unique to the custom image and create a custom rule-type of “File” which matches on the file. Select the “Required” option under the custom rule.

B.

Identify the MAC address unique to network cards installed in PCs with the custom image and create a custom rule-type of “MAC Address” which matches on the appropriate MAC address. Select the “Required” option under the custom rule

C.

Identify the IP address unique to the network cards installed in PCs with the custom image and create a custom rule-type of “IP Address” which matches on the appropriate IP address. Select the “Required” option under the custom rule.

D.

Isolate or create a unique Windows registry key for the custom image and create a custom rule-type of “Registry Setting” which matches on the name of the registry key.

 

Answer: AD

 

 

QUESTION 72

You want to customize access to the corporate network so that agentiess users are instructed to obtain a certificate before accessing the network.

 

Which two configurations solve this problem? (Choose two.)

 

A.

Create a custom sign-in page with specific instructions in the “Instructions” field.

B.

Create a custom sign-in page with specific “Missing Certificate” messages in the “Custom error messages” field.

C.

Create a custom sign-in policy with specific instructions in the “Instructions” field.

D.

Create a custom sign-in notification and assign it to the “Pre-Auth Sign-in Notification” in the sign-in policy.

 

Answer: AD

 

 

QUESTION 73

Which Junos Pulse feature allows the user to log in once through a Junos Pulse Secure Access Service on the network and then access resources protected by a Junos Pulse Access Control Service without reauthentication?

 

A.

Roaming Session

B.

Session Migration

C.

Location Awareness

D.

Persistent Session

 

 

 

 

 

Answer: B

 

 

QUESTION 74

You are configuring captive portal on your SRX Series device for guest user access.

 

When would you use the redirect-traffic all command?

 

A.

When you want all unauthenticated traffic to be redirected

B.

When you want all clear text traffic to be redirected.

C.

When you want all authenticated traffic to be redirected.

D.

When you want all encrypted traffic to be redirected.

 

Answer: B

 

 

QUESTION 75

You have configured Junos Pulse on your Windows desktop and want to verify that the IPsec configuration policy is being pushed down to your workstation upon network authentication and login.

 

Which utility program do you use to see this configuration and where do you find it?

 

A.

the Pulse Diagnostics Tool in the “File” > “Tools” menu option in the Pulse GUI

B.

the Pulse Diagnostics Tool in the “Start” > “All Programs” > “Juniper Networks” > “Junos Pulse” menu folder next to the Junos Pulse application

C.

the Pulse Diagnostics Viewer, which you access by simultaneously pressing “Ctrl” and “F2”

D.

the Pulse Diagnostics Viewer in the “File” > “Tools” menu option in the Pulse GUI

 

Answer: C

 

 

QUESTION 76

When configuring resource access policies in a Junos Pulse Access Control Service device, which entry is permitted when defining the specific resources?

 

 

 

 

 

A.

Hostname

B.

fully qualified domain name

C.

IP
address

D.

address book entry

 

Answer: C

 

 

QUESTION 77

You want to restrict access to a role based on the client machine from which the user is accessing the network.

 

Which two role restrictions accomplish this goal? (Choose two.)

 

A.

user name

B.

password length

C.

certificate

D.

Host Checker

 

Answer: CD

 

 

QUESTION 78

What are two roles of the authenticator as described in the 802.1X standard? (Choose two.)

 

A.

It proxies the authentication information between the supplicant and the authentication server.

B.

It controls physical access to the network.

C.

It communicates with the authentication server only.

D.

It is responsible for verifying the identity of the supplicant through the use of an internal database.

 

Answer: AB

 

 

QUESTION 79

 

On a MAG Series device, where is the preauthentication sign-in message configured?

 

A.

On the configuration page for the sign-in notification message

B.

On the wireless user realm authentication policy

C.

On the sign-in policy of the URL being used by the wireless users

D.

On the sign-in page of the URL being used by the wireless users

 

Answer: C

 

 

QUESTION 80

What are two benefits of integrating Junos Pulse Access Control Service with Security Threat Response Manager (STRM)? (Choose two.)

 

A.

The ability to detect and prevent malicious traffic.

B.

The ability to associate security breaches with a specific user.

C.

Converged management of network and security events, network flow data, and identity information.

D.

Consistent device management across administrative realms.

 

Answer: BC

 

Free VCE & PDF File for Juniper JN0-314 Actual Tests

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

This entry was posted in JN0-314 Actual Tests (November) and tagged , , , , , , . Bookmark the permalink.