Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "JN0-141" Exam

Juniper Networks Certified Internet Associate, AC (JNCIA-AC)

 Question 1.
What are two ScreeuOS commands son can run on the overlay enforcer to troubleshoot communication with the Infranet Controller? (Choose two.)

A. get event
B. get controller status
C. get auth table infranet
D. execinfranet controller connect

Answer: A, D

Question 2.
Your company requires that users who authenticate using the Web run an approved Web browser and have current antivirus signatures to present their credentials for authentication. If they do not have current signatures or are running an unauthorized browser; they cannot authenticate. 

What do yon configure on the Infranet Controller to implement your company's authentication policy?

A. abrowser restriction on the users role and a Host Checker restriction on the users role
B. abrowser restriction on the users realm and a Host Checker restriction on the users role
C. abrowser restriction on the user's role and a Host Checker restriction on the user's realm
D. abrowser restriction on the users realm and a Host Checker restriction on the user's realm

Answer: D

Question 3.
Yon have created a Host Enforcer policy and want to verify that it has been applied In which two places would yon look to determine if the policy is being enforced? (Choose two.)

A. client browser
B. overlay enforcer
C. Infranet Controller
D. Odyssey Access Client

Answer: C, D

Question 4.
Which two options must be defined to enable the Infranet Controller to respond to RADINS requests from an 802.1X-compliant network access device? (Choose two.)

A. a sign-in policy
B. a shared secret
C. the IP address of the network access device
D. the proper vendor-specific attributes for the network access device

Answer: B, C

Question 5.
if Host Checker restrictions are applied at the role level and the Allow access to the role if any ONE of the select policies is passed option is selected, which statement is true?

A. Host Checker must be set toRequire and enforce.
B. The role will not be removed if the Host Checker stale changes.
C. The endpoint will be assigned the role as long as one policy passes.
D. The endpoint will be assigned the role as long as one rule in the policy passes.

Answer: C

Question 6.
Which log contains information about service restarts, system errors, warbubgs. And requests to check server connectivity?

A. Events log
B. System log
C. User Access log
D. Admin Access log

Answer: A

Question 7.
What are three functions of the infranet Controller? (Choose three.)

A. Verifiescompliance with policies. B.Actsasa802.1 Xenforcer if needed.
C. Assignsroles and resources to users.
D. EnforcesLayer 3 policies dynamically.
E. Maintains communication with client during session.

Answer: A

Question 8.
What are the three main components of Juniper Networks Unified Access Control (UAC) solution? (Choose three.)

A. Infra net Controller
B. endpoint agent software
C. RADINS accounting server
D. distributed policy enforcement points
E. intrusion detection and prevention device

Answer: A, B, D

Question 9.
Which statement is true about the operation of the overlay enforcer?

A. It assigns users a set of roles.
B. It enforces resource access policies.
C. It verifies whether anendponbtneets security Requirements.
D. It configures the UAC agent to allow or deny access to resources.

Answer: B

Question 10.
What is the function of the Host Checker?

A. Runson the Infranet Controller and ensures reach ability agents.
B. Communication with the overlay enforcer and restricts access to resources
C. Communicates with theinfranet Controller and checksendpoint security compliance
D. Runson the endpoint and checks for healthy communication with the overlay enforcer and the 
    infranet Controller.

Answer: C


Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.