[Free] Download New Latest (November) Juniper JN0-355 Actual Tests 71-80

Ensurepass

QUESTION 71

A customer wants to implement X.509 certificate authentication on their users. They want to extract the username from each certificate for accounting and single sign-on purposes. The correct username syntax lies within the common name portion of the certificate’s subject field.

 

Which username template should you use on the certificate authentication server’s configuration?

 

A.

<certDN.CN>

B.

<certDN.SN>

C.

<certAttr.altName.CN>

D.

<certAttr.altName.SN>

 

Answer: A

 

 

QUESTION 72

The Junos Pulse client connects to which two Juniper Networks services? (Choose two.)

 

A.

Junos Pulse Secure Access Service

B.

Junos Pulse Access Control Service

C.

Unified Threat Management

D.

Intrusion Detection Prevention

 

Answer: CD

 

 

QUESTION 73

What are two operational capabilities of the Secure Application Manager client? (Choose two.)

 

 

 

 

 

A.

Automatically launches the client upon user browser initiated login.

B.

Controls access policy to network subnets and servers.

C.

Forces Java JRE update on SAM client installation.

D.

Restricts use of machine COM ports.

 

Answer: AB

 

 

QUESTION 74

You are asked to perform an automatic two-unit cluster upgrade.

 

Which action must you perform?

 

A.

Remove the backup node from the cluster prior to upgrading the code.

B.

Upgrade both cluster nodes to the new software release.

C.

Delete all active user sessions.

D.

Use Central Manager to perform the cluster upgrade.

 

Answer: D

 

 

QUESTION 75

You have configured a Web Resource Profile to allow access to your company’s Intranet site and assigned the Web role to the profile. A bookmark to the site was configured and will be displayed on the user’s start page. You also enabled the Web URL browse bar. You did not modify any of the default auto-allow policies.

 

What will users in the Web role be able to access?

 

A.

Users will not be able to access any Web sites.

B.

Users will have access to any Web site in the domain.

C.

Users will only have access to the bookmark on the start page.

D.

Users will need the administrator to create additional bookmarks to access other sites.

 

Answer: B

 

 

QUESTION 76

 

What are three benefits of choosing Junos Pulse for VPN tunneling? (Choose three.)

 

A.

Endpoint security is integrated with Junos Pulse.

B.

ESP transport methods are available for Windows, Macintosh, and Linux platforms.

C.

WSAM integration is available for Microsoft Windows platforms.

D.

Support is available for a variety of mobile devices.

E.

SSL transport methods are available for Linux platforms.

 

Answer: ACD

 

 

QUESTION 77

Which two statements describe the Content Intermediation Engine (CIE)? (Choose two.)

 

A.

The CIE is responsible for the redirect function.

B.

The CIE is responsible for processing incoming requests and outgoing content.

C.

The CIE rewrites Web content.

D.

The CIE rewrites application content using Junos Pulse.

 

Answer: BC

 

 

QUESTION 78

You want to sign in to the Admin UI from the external interface but cannot bring up the Web page. The only configuration that has been accomplished are the network settings.

 

What must be configured for you to bring up the Admin UI?

 

A.

The IP address of your workstation must be added to the allow list.

B.

A new URL must be created for the Web page to be accessed on the external interface.

C.

The external interface must be enabled for admin access.

D.

You must create a new authentication server for this admin login page.

 

Answer: C

 

 

QUESTION 79

 

Which two server instances would be used as secondary authentication servers on the Junos Pulse Secure Access Service? (Choose two.)

 

A.

RADIUS server

B.

anonymous server

C.

Active Directory server

D.

certificate server

 

Answer: AC

 

 

QUESTION 80

You have just created a Host Checker policy that limits role access to only users who sign in with company-issued computers. All users who do not pass the policy will be remediated to a different role with fewer features.

 

Which two steps in the Admin UI must you configure to enforce the policy? (Choose two.)

 

A.

For the Host Checker Authentication Policy, choose “Require and Enforce”.

B.

For the Host Checker Authentication Policy, choose “Evaluate Policies”.

C.

For the Host Checker Role Restriction, allow all users.

D.

For the Host Checker Role Restriction, allow only users who meet the selected Host Checker policy.

 

Answer: BD

 

Free VCE & PDF File for Juniper JN0-355 Actual Tests

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

This entry was posted in JN0-355 Actual Tests (November) and tagged , , , , , , . Bookmark the permalink.