[Free] Download New Latest (November) Juniper JN0-570 Actual Tests Topic 1 part 02

Ensurepass

QUESTION 86  (Topic 1)

 

What are three reasons for using certificates? (Choose three.)

 

A.

server authentication

B.

user authentication

C.

profile assignment

D.

role mapping

E.

policy assignment

 

Answer: ABD

 

 

 

 

 

QUESTION 87  (Topic 1)

 

Which two configuration elements are part of a Host Checker policy? (Choose two)

 

A.

role mapping

B.

remediation settings

C.

policy rule

D.

role restriction

 

Answer: BC

 

 

QUESTION 88  (Topic 1)

 

You have configured Cache Cleaner to clear the directory C:appsCustomApp when a user logs out of the IVE. The user has manually saved the file MyCustomApp.txt to the directory. What happens when Cache Cleaner attempts to clear the directory?

 

A.

Cache Cleaner deletes all the files in the directory, including the file saved by the user.

B.

Cache Cleaner deletes all files except MyCustomApp.txt.

C.

Cache Cleaner detects the presence of a user-created file and displays an error message on the user system.

D.

Cache Cleaner detects the presence of a user-created file and posts an error message to the IVE log.

 

Answer: A

 

 

QUESTION 89  (Topic 1)

 

What must you do to use CRLs to validate user certificates?

 

A.

Configure the IP address of the CDP.

B.

Validate the Trusted Client CA.

C.

Download the certificate for the CA issuing the CRL.

D.

Configure the CA chain to the base CA.

 

Answer: C

 

 

QUESTION 90  (Topic 1)

 

 

 

 

Click the Exhibit button. Which type of log is shown in the exhibit?

 

clip_image002

 

A.

events

B.

client

C.

admin access

D.

user access

 

Answer: B

 

 

QUESTION 91  (Topic 1)

 

You need to present data for reporting, and it must include the source IP address, destination IP address, and length of the connection. What would be the correct log filter to obtain the information?

 

A.

$sourceip, $remotehost, $duration

B.

$sourceip, $remoteip, $duration

C.

%sourceip%, %destip%, %duration%

D.

%sourceip%, %remoteip%, %duration%

 

Answer: D

 

 

QUESTION 92  (Topic 1)

 

In which two instances should you use a support meeting? (Choose two.)

 

A.

when you need to assist with troubleshooting a client machine

B.

when a meeting must be created on demand

C.

when many users will be logging in to the meeting

D.

when you want to create the meeting through Microsoft Outlook

 

Answer: AB

 

 

 

 

 

QUESTION 93  (Topic 1)

 

Your company is rolling out Secure Meeting to assist the helpdesk in troubleshooting desktop issues. Which type of meeting should you enable on the SSL VPN?

 

A.

scheduled meeting

B.

technical meeting

C.

support meeting

D.

instant meeting

 

Answer: C

 

 

QUESTION 94  (Topic 1)

 

You decide to use virus signature version monitoring to ensure that all user PCs have the latest virus definitions installed. Which three settings must be configured to maintain this functionality? (Choose three.)

 

A.

download path

B.

download interval

C.

download version

D.

predefined antivirus rule name

E.

staging site authentication credentials

 

Answer: ABE

 

 

QUESTION 95  (Topic 1)

 

Which three configuration data items can you export with the XML Export function? (Choose three.)

 

A.

user role mapping rules

B.

policy tracing sessions

C.

local users accounts

D.

delegated administrator roles

E.

IDP sensors

 

Answer: ACD

 

Free VCE & PDF File for Juniper JN0-570 Actual Tests

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

This entry was posted in JN0-570 Actual Tests (November) and tagged , , , , , , . Bookmark the permalink.