IT인증,IT자격증,IT자격증시험,IT인증시험

http://www.pass4test.net/

Juniper JN0-314덤프샘플문제

Juniper JN0-314 (Junos Pulse Access Control, Specialist (JNCIS-AC)) 시험을 패스하려면 품질좋은 시험대비 알맞춤 덤프가 있으면 훨씬 편해집니다.pass4test에서 최선을 다해 발췌한 Juniper JN0-314 (Junos Pulse Access Control, Specialist (JNCIS-AC)) 시험자료는 Juniper JN0-314 (Junos Pulse Access Control, Specialist (JNCIS-AC)) 실제시험에 대비하여 제작한 최고의 시험대비자료입니다.pass4test의 전문가들은 IT업계에 오래동안 종사하여 얻은 노하우로 시험패스에 가장 편한 시험자료를 연구하는데 많은 심혈을 기울였습니다.



NO.1 What is a type of firewall enforcer supported by the Junos Pulse Access Control Service?


A. Checkpoint firewall


B. SRX Series device


C. DP sensor


D. MX Series device


Answer: B



NO.2 You are configuring an active/passive cluster of SRX Series devices as the firewall enforcer on a


MAG Series device. Which statement is true?


A. Multiple Infranet Enforcer instances are created with a single serial number of an SRX Series


device defined in each configuration.


B. A single Infranet Enforcer instance is created with both serial numbers of the clustered SRX Series


devices defined in the configuration.


C. Multiple Infranet Enforcer instances are created with a single IP address of an SRX Series device


defined in each configuration.


D. A single Infranet Enforcer instance is created with the VIP of the clustered SRX Series device


defined in the configuration.


Answer: B



NO.3 You navigate to "UAC" > "Infranet Enforcer" > "Auth Table Mapping" in the admin GUI. You see


one policy, which is the unmodified, original default policy.


Which statement is true?


A. Dynamic auth table mapping is not enabled.


B. A successful authentication attempt will result in a new authentication table entry, which will be


delivered only to the Junos enforcer protecting the network from which the user has authenticated.


C. To create a static auth table mapping, you must delete the default policy.


D. The default policy applies only to the factory-default role User.


Answer: A



NO.4 A customer wants to create a custom Junos Pulse configuration. Which two are required?


(Choose two)


A. Connection set


B. Configuration set


C. Custom installer


D. Component set


Answer: A,D



NO.5 You have a Junos Pulse Secure Access Service acting as an IF-MAP client, configured to


federate all user roles to a Junos Pulse Access Control Service acting as an IF-MAP Federation server.


A remote user using Junos Pulse logs in to the Junos Pulse Secure Access Service; the Junos Pulse


Secure Access Service provisions a remote access session for that user.


What happens next?


A. The Junos Pulse Secure Access Service redirects the user to the Junos Pulse Secure Access Service


for authentication


B. The Junos Pulse Access Control Service provisions enforcement points to enable resource access


for that user.


C. The Junos Pulse Secure Access Service publishes user session and role information to the IFMAP


Federation server,


D. The Junos Pulse Secure Access Service provisions enforcement points to enable resource access


for that user.


Answer: C



NO.6 A customer has purchased a third-party switch to use for Layer 2 access with their Junos Pulse


Access Control Service. When configuring the switch on the Junos Pulse Access Control Service, the


customer does not find a make/model entry for it.


Which two actions should the customer take to make the switch work with the Junos Pulse Access


Control Service? (Choose two.)


A. Add the switch to the Junos Pulse Access Control Service as a standard RADIUS.


B. Add the switch to the Junos Pulse Access Control Service using the "Any" make/model.


C. Add the switch as a firewall enforcer.


D. Obtain and configure the RADIUS dictionary for the switch and use that vendor listing for the


make/model.


Answer: A,D



NO.7 Which three settings are accessible from the serial console menu on a MAG Series device?


(Choose three.)


A. The ping command


B. Factory default reset


C. Personality image


D. License imports


E. Admin login credentials


Answer: A,B,E



NO.8 A customer is trying to decide which 802.1X inner protocol to use on their network. The


customer requires that no passwords be sent across the network in plain text, that the protocol be


supported by the Windows native supplicant, and that the protocol supports password changes at


Layer 2.


Which protocol would meet the customer's needs?


A. EAP-TLS


B. EAP-MD5


C. PAP


D. EAP-MSCHAPv2


Answer: D


Posted 2014/6/20 14:09:31  |  Category: Juniper  |  Tag: JN0-314덤프샘플문제