单项选择题
A customer is deploying a new Junos Pulse Access Control Service and has completed the initial boot configuration as prompted using a serial connection. The customer now wants to complete the rest of the configuration using the admin GUI.Into which port on the Junos Pulse Access Control Service should the customer plug the network cable to enable access to the admin GUI?()
A. the internal interface
B. the external interface
C. the management interface
D. the console interface
相关考题
-
多项选择题
You want to restrict access to a role based on the client machine from which the user is accessing the network.Which two role restrictions accomplish this goal? ()
A. user name
B. password length
C. certificate
D. Host Checker -
多项选择题
You want to customize access to the corporate network so that agentiess users are instructed to obtain a certificatebefore accessing the network.Which two configurations solve this problem? ()
A. Create a custom sign-in page with specific instructions in the "Instructions" field.
B. Create a custom sign-in page with specific "Missing Certificate" messages in the "Custom error messages" field.
C. Create a custom sign-in policy with specific instructions in the "Instructions" field.
D. Create a custom sign-in notification and assign it to the "Pre-Auth Sign-in Notification" in the sign-in policy. -
单项选择题
A company has completed two acquisitions over the previous year. Each of the acquired companies was allowed to keep its own independent authentication server. The network administrator has been asked to roll out the Junos Pulse Access Control Service to users within the original company along with each of the two acquired organizations.The administrator configures three authentication realms, one for each independent authentication server, and associates them all with a single sign-in policy. All of the client endpoints are running Junos Pulse on their Windows XP desktops. When a user signs in to the Junos Pulse Access Control Service, which statement is correct?()
A. The first authentication realm that was added to the sign-in policy is used by default.
B. The user is allowed to choose the correct authentication realm from a list presented by Junos Pulse.
C. When Junos Pulse is initially installed on the desktop, it must be configured with the correct realm.
D. This is not an allowed configuration; the administrator should configure separate sign-in policies for each realm.
