[Free] Download New Latest (November) Juniper JN0-562 Actual Tests Topic 1 part 03

Ensurepass

QUESTION 81  (Topic 1)

 

You are using LDAP as your authorization server. Which two options are available for creating role mapping rules? (Choose two.)

 

A.

User Attribute

B.

Group Membership

C.

User connection time

D.

CA Certificate Attributes

 

Answer: AB

 

 

QUESTION 82  (Topic 1)

 

Which three statements are true about the Host Checker feature? (Choose three.)

 

A.

Host Checker can be used to monitor user activity.

B.

Host Checker can be used to check the age of a file on a client system.

C.

Host Checker can be invoked before a user is allowed to sign in to the IVE.

D.

Host Checker can be used to check the presence of a particular process on a client system.

E.

Host Checker can verify the client certificate being offered by the client system via a Certificate Revocation List (CRL) check.

 

Answer: BCD

 

 

QUESTION 83  (Topic 1)

 

You create a set of role mapping rules. You select “Merge settings for all assigned roles.” The first role mapping rule has the “Stop processing rules when this rule matches” option selected. A user logs in that matches the first three rules. What happens?

 

A.

This is not a valid combination. The system displays an error message and does not update the configuration.

 

 

 

 

B.

The merge settings override the stop processing option. The user matches all three roles and merging follows the standard merging criteria.

C.

The Stop rule prevents any more rule matching after checking the first rule. The user matches only the first rule and permissive merging does not occur since there is only one matching role.

D.

The merge settings still merge all three roles, but the first role now overrides the standard merging criteria and uses its own values for all conflicting values found in subsequent roles.

 

Answer: C

 

 

QUESTION 84  (Topic 1)

 

When using Core Access, what does the IVE do with all cookies generated on internal servers?

 

A.

It ignores all cookies generated on internal servers.

B.

It forwards all cookies to the Web browser to be stored for later use.

C.

It traps all cookies, caches them and replaces them with a transient cookie.

D.

It replaces all cookies with an encrypted cookie that is permanently stored by the browser.

 

Answer: C

 

 

QUESTION 85  (Topic 1)

 

Which two statements about a server certificate are true? (Choose two.)

 

A.

A server certificate is required for HTTP to function.

B.

A server certificate is a digital document vouches for the identity of the server.

C.

A server certificate contains information about the server itself and the organization that owns the server.

D.

A server certificate is an electronic “drivers license” that establishes client credentials when doing business or other transactions on the Web.

 

Answer: BC

 

 

QUESTION 86  (Topic 1)

 

 

 

 

You want to set up W-SAM for a role, but you can only access the J-SAM configuration screen. Which statement correctly describes what is happening?

 

A.

The configurations for J-SAM and W-SAM applications are identical.

B.

The system only supports one type of SAM support per role at a time.

C.

You are running under the Baseline License and you do not have access to the SAM Configuration screen.

D.

You cannot configure W-SAM access here. You must go to Resource Policies to access the W-SAM Application Configuration screen.

 

Answer: B

 

 

QUESTION 87  (Topic 1)

 

When authenticating using an AD/NT server on the IVE, what does the <USER> variable define?

 

A.

username

B.

domain and password

C.

domain and username

D.

username and password

 

Answer: C

 

 

QUESTION 88  (Topic 1)

 

What are two features of J-SAM? (Choose two.)

 

A.

Map network drives using NetBios.

B.

Encapsulate static TCP port client and server traffic.

C.

Encapsulate dynamic UDP port client and server traffic.

D.

Support for only Windows, Linux, and Solaris platforms.

 

Answer: AB

 

 

QUESTION 89  (Topic 1)

 

Which resource example should you use to define resource access using Network Connect?

 

 

 

 

 

A.

server/user

B.

tcp://host:443

C.

\servershare

D.

tcp://host:137/user

 

Answer: B

 

 

QUESTION 90  (Topic 1)

 

Which three statements about IPSec VPNs are true? (Choose three.)

 

A.

IPSec VPNs are clientless.

B.

IPSec VPNs are standards-based.

C.

IPSec VPNs have been superseded with SSL VPNs.

D.

IPSec VPNs provide a dedicated, always-on connection.

E.

IPSec encryption, data integrity, and authentication methods are well known.

 

Answer: BDE

 

Free VCE & PDF File for Juniper JN0-562 Actual Tests

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

This entry was posted in JN0-562 Actual Tests (November) and tagged , , , , , , . Bookmark the permalink.