单项选择题
You are receiving reports of possible unauthorized access to resources protected by a firewall enforcer running the Junos OS. You want to verity which users are currently accessing resources through the enforcer.Which command should you use to verify user access on the enforcer?()
A. show services unified-access-control authentication-table
B. show auth table
C. show services unified-access-control policies
D. show services unified-access-control captive-portal
相关考题
-
多项选择题
What are two valid configurations for user-driven remediation when a Windows-based endpoint fails a Host Checker policy?()
A. Kill a running process on the endpoint, based on executable name and MD5 checksum.
B. Delete a file on the endpoint's file system.
C. Download and run a remediation executable from the local software distribution server.
D. Alter registry entries to prevent future execution of an executable, based on executable name and full path. -
单项选择题
A user signs into the Junos Pulse Access Control Service on a wired network. The user then migrates to a wireless network, receives a new IP address, and notices that the session is disconnected.In the admin GUI, what must be configured for the user to stay connected when migrating from a wired to a wireless network?()
A. Persistent session
B. Dynamic evaluation
C. Roaming session
D. Browser request follow-through -
多项选择题
A user is successfully authenticating to the network but is unable to access protected resources behind a ScreenOS enforcer. You log in to the ScreenOS enforcer and issue the command get auth table infranet and you do not see the user listed.Which two event log settings on the Junos Pulse Access Control Service must you enable to troubleshootthis issue?()
A. Connection Requests
B. System Errors
C. Enforcer Events
D. Enforcer Command Trace
