[Free] Download New Latest (November) Juniper JN0-570 Actual Tests Topic 1 part 04

Ensurepass

QUESTION 106  (Topic 1)

 

You want to configure Network Connect on a newly created user role so that traffic destined for the 10.10.10.0/24 network goes to the Network Connect tunnel while the local routes are preserved on the client. Which three configuration steps are necessary? (Choose three.)

 

A.

Choose “Allow access to the local subnet” on the role.

B.

Choose “Enable split-tunneling with allowed access to the local subnet” on the role.

C.

Choose “Enable split-tunneling” on the role.

D.

Add a split tunneling policy to the Network Connect resource policy with 10.10.10.0/24 as the resource.

E.

Restrict access to the 10.10.10.0/24 network by changing the default access control policy.

 

Answer: BDE

 

 

QUESTION 107  (Topic 1)

 

Click the Exhibit button.

 

A user browses to https://partners.acmegizmo.com.

 

Referring to the exhibit, which authentication realm will be available to the user?

 

clip_image002

 

A.

Users

B.

LDAP Realm

C.

ALL

D.

Users and LDAP Realm

 

 

 

 

 

Answer: A

 

 

QUESTION 108  (Topic 1)

 

After configuring certificate-based user authentication, you receive a “certificate missing” error when trying to sign in to the IVE device. What is a possible cause of this problem?

 

A.

You did not upload to the IVE device the user certificate with which you are attempting to authenticate.

B.

The user certificate you are using to authenticate has been revoked.

C.

The CA used to create the user certificate has not been uploaded to the IVE device.

D.

The certificate of the IVE device was created by a CA for which you do not have the CA certificate installed on your PC.

 

Answer: C

 

 

QUESTION 109  (Topic 1)

 

You have correctly enabled meeting email notifications by defining the appropriate SMTP options on the IVE device’s Secure Meeting configuration page. However, when new meetings are created, invitees do not receive the emails. What might be causing this problem?

 

A.

The time is not synchronized between the IVE device and the SMTP server.

B.

You have not specified the IVE device’s fully qualified hostname on the Network configuration page.

C.

You have chosen to “Hide attendee names” when specifying meeting options.

D.

You have invited attendees with email addresses in a domain that is not registered on the Secure Meeting configuration page.

 

Answer: B

 

 

QUESTION 110  (Topic 1)

 

Which two types of meetings can you enable at the role level? (Choose two.)

 

A.

technical meeting

B.

scheduled meeting

C.

troubleshooting meeting

 

 

 

 

D.

support meeting

 

Answer: BD

 

 

QUESTION 111  (Topic 1)

 

What are two advantages of using an IVS? (Choose two.)

 

A.

All VS admins can troubleshoot the virtual system using tools such as TCP dump and traceroute.

B.

All VS admins can be virtually separated using virtual IP addresses and VLAN tagging.

C.

All VS admin can create their own roles and realms that are separate from the other virtual systems.

D.

All VS admin can upgrade their virtual system without affecting the other virtual systems on the device.

 

Answer: BC

 

 

QUESTION 112  (Topic 1)

 

Which two are possible ways to replicate or export the log from an existing IVE system? (Choose two.)

 

A.

Join a cluster.

B.

Save the log from the Admin UI.

C.

Archive the log data using FTP or SCP.

D.

Push the config and log to another IVE node.

 

Answer: BC

 

 

QUESTION 113  (Topic 1)

 

Which two options must be configured when using session start scripts, session end scripts, or both in a Windows environment? (Choose two.)

 

A.

script location

B.

script permissions

C.

skip if GINA enabled

D.

prioritize script if GINA enabled

 

 

 

 

 

Answer: AC

 

 

QUESTION 114  (Topic 1)

 

You would like to know which users presented during a past Secure Meetin
g session. In which two places would you look for this information? (Choose two.)

 

A.

on the Active Users panel

B.

in the event log

C.

in the user access log

D.

in an attendee’s client-side log

 

Answer: CD

 

 

QUESTION 115  (Topic 1)

 

Which two proxy scenarios are supported by Network Connect when split tunneling is disabled? (Choose two.)

 

A.

support for a Winsock proxy client.

B.

explicit proxy to get to the IVE.

C.

Hybrid: Proxy to get to the IVE and proxy to get to internal applications.

D.

PAC file to get to internal applications.

 

Answer: BD

 

Free VCE & PDF File for Juniper JN0-570 Actual Tests

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

This entry was posted in JN0-570 Actual Tests (November) and tagged , , , , , , . Bookmark the permalink.