[Free] Download New Latest (November) Juniper JN0-562 Actual Tests Topic 0 part 02

Ensurepass

QUESTION 11  (Topic 0)

 

Which tool will allow you to verify the user’s access without the user being present?

 

A.

Run a policy trace from the GUI, select role mapping and all policy options.

B.

Run policy simulation from the GUI, select role mapping and all policy options.

C.

Run a policy trace from the serial console, select role mapping and all policy options.

D.

Run a policy simulation from the console, select role mapping and all policy options.

 

Answer: B

 

 

QUESTION 12  (Topic 0)

 

You are using RADIUS as your authorization server. Other than username, which two attributes are available for creating role mapping rules? (Choose two.)

 

A.

Certificate

B.

User Attribute

C.

RSA Attributes

D.

Group Membership

 

Answer: AB

 

 

QUESTION 13  (Topic 0)

 

You want to configure Network Connect to allow users to connect through a tunnel, connect to hosts on the same subnet as their local adapter, and shut down any attempt to extend the network boundaries. How do you proceed?

 

A.

Enable split tunneling.

B.

Disable split tunneling.

C.

Enable split tunneling with route change monitor.

D.

Allow access to local subnet with route change monitor.

 

Answer: D

 

 

 

 

 

QUESTION 14  (Topic 0)

 

Which role-based session option would an administrator configure to allow a user to connect from different source IP addresses within the same user session?

 

A.

roaming session

B.

persistent session

C.

persistent password caching

D.

browser request follow-through

 

Answer: A

 

 

QUESTION 15  (Topic 0)

 

Which three are required when defining Sign-in Policies? (Choose three.)

 

 

Answer: ABE

 

 

QUESTION 16  (Topic 0)

 

What are two reasons to use W-SAM instead of J-SAM for a customer? (Choose two.)

 

A.

sign-in URL

B.

sign-in page

C.

authorization server

D.

authentication server

E.

authentication realm

A.

W-SAM has a smaller client.

B.

W-SAM is not dependent on one operating system.

C.

W-SAM provides multiple configuration options to capture application traffic.

D.

W-SAM can be used when you don’t know the ports that an application uses.

 

Answer: CD

 

 

QUESTION 17  (Topic 0)

 

 

 

 

Assuming there are no default Web resource policies, you create a Web bookmark for the URL http://*acme.net/* without selecting any other options. You then select the Save Changes button. Which statement is true?

 

A.

You are not able to access any of the servers in acme.net nor any subdirectories.

B.

You receive an error because you have not configured enough information to have the IVE accept the data.

C.

You are able to access all servers and sub-folders within any domain that contains the word cme.?You are able to access all servers and sub-folders within any domain that contains the word ?cme.

D.

You are only able to access those http servers with the domain name of acme.net, all sub-domains, and sub-directories of those Web sites.

 

Answer: A

 

 

QUESTION 18  (Topic 0)

 

Which three authentication servers are included with a baseline license? (Choose three.)

 

A.

NIS

B.

ACE

C.

SAML

D.

LDAP

E.

SiteMinder

 

Answer: ABD

 

 

QUESTION 19  (Topic 0)

 

Which filter properly searches an AD/NT server directory using LDAP for the user login name and compares it to the user’s IVE login name?

 

A.

cn=<GROUPNAME>

B.

cn=<samaccountname>

C.

samaccountname=<NAME>

D.

samaccountname=<USERNAME>

 

Answer: D

 

 

QUESTION 20  (Topic 0)

 

 

 

 

Resource Profiles support creating policies for which two technologies? (Choose two.)

 

A.

secure meeting

B.

network connect

C.

terminal services

D.

Web applications

 

Answer: CD

 

Free VCE & PDF File for Juniper JN0-562 Actual Tests

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

This entry was posted in JN0-562 Actual Tests (November) and tagged , , , , , , . Bookmark the permalink.