|
Question 1. What are two ScreeuOS commands son can run on the overlay enforcer to troubleshoot communication with the Infranet Controller? (Choose two.) A. get event B. get controller status C. get auth table infranet D. execinfranet controller connect Answer: A, D Question 2. Your company requires that users who authenticate using the Web run an approved Web browser and have current antivirus signatures to present their credentials for authentication. If they do not have current signatures or are running an unauthorized browser; they cannot authenticate. What do yon configure on the Infranet Controller to implement your company's authentication policy? A. abrowser restriction on the users role and a Host Checker restriction on the users role B. abrowser restriction on the users realm and a Host Checker restriction on the users role C. abrowser restriction on the user's role and a Host Checker restriction on the user's realm D. abrowser restriction on the users realm and a Host Checker restriction on the user's realm Answer: D Question 3. Yon have created a Host Enforcer policy and want to verify that it has been applied In which two places would yon look to determine if the policy is being enforced? (Choose two.) A. client browser B. overlay enforcer C. Infranet Controller D. Odyssey Access Client Answer: C, D Question 4. Which two options must be defined to enable the Infranet Controller to respond to RADINS requests from an 802.1X-compliant network access device? (Choose two.) A. a sign-in policy B. a shared secret C. the IP address of the network access device D. the proper vendor-specific attributes for the network access device Answer: B, C Question 5. if Host Checker restrictions are applied at the role level and the Allow access to the role if any ONE of the select policies is passed option is selected, which statement is true? A. Host Checker must be set toRequire and enforce. B. The role will not be removed if the Host Checker stale changes. C. The endpoint will be assigned the role as long as one policy passes. D. The endpoint will be assigned the role as long as one rule in the policy passes. Answer: C Question 6. Which log contains information about service restarts, system errors, warbubgs. And requests to check server connectivity? A. Events log B. System log C. User Access log D. Admin Access log Answer: A Question 7. What are three functions of the infranet Controller? (Choose three.) A. Verifiescompliance with policies. B.Actsasa802.1 Xenforcer if needed. C. Assignsroles and resources to users. D. EnforcesLayer 3 policies dynamically. E. Maintains communication with client during session. Answer: A Question 8. What are the three main components of Juniper Networks Unified Access Control (UAC) solution? (Choose three.) A. Infra net Controller B. endpoint agent software C. RADINS accounting server D. distributed policy enforcement points E. intrusion detection and prevention device Answer: A, B, D Question 9. Which statement is true about the operation of the overlay enforcer? A. It assigns users a set of roles. B. It enforces resource access policies. C. It verifies whether anendponbtneets security Requirements. D. It configures the UAC agent to allow or deny access to resources. Answer: B Question 10. What is the function of the Host Checker? A. Runson the Infranet Controller and ensures reach ability agents. B. Communication with the overlay enforcer and restricts access to resources C. Communicates with theinfranet Controller and checksendpoint security compliance D. Runson the endpoint and checks for healthy communication with the overlay enforcer and the infranet Controller. Answer: C
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.