题目详情
当前位置:首页 > 职业培训考试
题目详情:
发布时间:2023-11-20 02:04:49

[多项选择]You receive an alarm that your Junos device is experiencing problems regarding temperature. Which two commands would you use to investigate this problem?()
A. show chassis hardware
B. show chassis temperature-thresholds
C. show chassis pic fpc-slot <value> pic-slot <value>
D. show chassis environment

更多"You receive an alarm that your Juno"的相关试题:

[单项选择]You have configured Junos Pulse on your Windows desktop and want to verify that the IPsec configuration policy is being pushed down to your workstation upon network authentication and login.Which utility program do you use to see this configuration and where do you find it?()
A. the Pulse Diagnostics Tool in the "File" > "Tools" menu option in the Pulse GUI
B. the Pulse Diagnostics Tool in the "Start" > "All Programs" > "Juniper Networks" > "Junos Pulse" menu folder next to the Junos Pulse application
C. the Pulse Diagnostics Viewer, which you access by simultaneously pressing "Ctrl" and "F2"
D. the Pulse Diagnostics Viewer in the "File" > "Tools" menu option in the Pulse GUI
[单项选择]Which JUNOS software show command allows you to view BGP attributes for a given route?()
A. show route bgp
B. show route extensive
C. show bgp attribute
D. show bgp neighbor
[多项选择]Your company has deployed the Junos Pulse Access Control Service. The system administrator notices that the Host Checker policies are not being applied and enforced. You have verified that the controllers configuration is correct.Which two conditions are causing this issue?()
A. The endpoint is using EAP-PEAP with EAP-GTC as the inner protocol,
B. The endpoint is using EAP-TTLS with EAP-JUAC as the inner protocol.
C. The endpoint is using EAP-FAST with EAP-GTC as the inner protocol,
D. The endpoint is using EAP-PEAP with EAP-JUAC as the inner protocol.
[单项选择]Your task is to provision the Junos security platform to permit transit packets from the Private zone to the External zone by using an IPsec VPN and log information at the time of session close.Which configuration meets this requirement?()
A. [edit security policies from-zone Private to-zone External] user@host# show policy allowTransit { match { source-address PrivateHosts;destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn VPN; } } log { session-init; } } }
B. [edit security policies from-zone Private to-zone External] user@host# show policy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn VPN; } } count { session-close; } } }
C. [edit security policies from-zone Private to-zone External] user@host# showpolicy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn VPN;} } log { session-close; } } }
D. [edit security policies from-zone Private to-zone External] user@host# show policy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn VPN; log; count session-close; } } } }
[多项选择]On the Junos Pulse Access Control Service, you have created a role called Secret that you only want to provide to users who present a certificate.Using the admin GUI, which two features would you configure to satisfy this requirement?()
A. Sign-in Policy
B. Role Mapping Rule
C. Role Restrictions
D. Trusted Server CA
[单项选择]You have a Junos Pulse Secure Access Service acting as an IF-MAP client, configured to federate all user roles to a Junos Pulse Access Control Service acting as an IF-MAP Federation server. A remote user using Junos Pulse logs in to the Junos Pulse Secure Access Service; the Junos Pulse Secure Access Service provisions a remote access session for that user.What happens next?()
A. The Junos Pulse Secure Access Service redirects the user to the Junos Pulse Secure Access Service for authentication
B. The Junos Pulse Access Control Service provisions enforcement points to enable resource access for that user.
C. The Junos Pulse Secure Access Service publishes user session and role information to the IF- MAP Federation server,
D. The Junos Pulse Secure Access Service provisions enforcement points to enable resource access for that user.
[单项选择]You are deploying a Junos Pulse Access Control Service cluster in active/passive mode. How do you configure the IP address on the SRX Series devices?()
A. Configure a single Junos Pulse Access Control Service instance on the enforcer, specifying the VIP as the IP address the instance.
B. Configure multiple Junos Pulse Access Control Service instances on the enforcer, specifying the specific IP address each device in a separate instance.
C. Configure a single Junos Pulse Access Control Service instance on the enforcer, specifying the VIP and active node address in the instance.
D. Configure a single Junos Pulse Access Control Service instance on the enforcer, specifying the VIP and passive node address in the instance.
[单项选择] You are the administrator of a Junos Pulse Access Control Service implementation. You must restrict authenticated users connected from the branch offices to a few specific resources within the data center. However, when the authenticated users are connected at the corporate office, they are allowed more access to the data center resources. You have created two roles with different levels of access and are trying to determine the best way of controlling when a user is mapped to a specific role. Having the user prompted to manually select their role is possible, but you want to automate the process. Which configuration solves this problem?()
A. Implement a RADIUS request attribute policy to assist with realm selection and create different role-mapping rules for the user in each realm.
B. Implement a directory/attribute server on the realm and set up this server to determine by group membership the proper role to which a user should be mapped.
C. Reorder the role-mapping rules to allow for the more open role to be mapped first and then enable the "stop processing rules when this rule matches" function on this role.
D. Implement a Host Checker policy on the realm that determines the geographic location of the device and restricts the user based on the results of the policy.
[单项选择]Which parameter do you use to enable Junos Pulse Access Control Service enforcement on a policy on a ScreenOS platform?()
A. uac-policy
B. ic-policy
C. inyranet-auth
D. uac-auth
[单项选择]You are setting up a Junos Pulse Access Control Service. You cannot obtain a device certificate from an external certificate authority.Which tool should you use to generate a device certificate?()
A. OpenSSL
B. OpenSSH
C. OpenLDAP
D. OpenRADIUS
[单项选择]You are installing a new deployment of the Junos Pulse Access Control Service. You have an existing RADIUS server that has a populated user file. You are considering using the RADIUS proxy feature.Which consideration must you take into account?()
A. Your RADIUS server database must be replicated onto another device for redundancy.
B. Inner proxy creates a tunnel between the supplicant and the external server.
C. RADIUS proxy causes the role assignment process to be skipped.
D. Outer proxy configuration passes authentication data to the external RADIUS server in clear text.
[单项选择]A user states they receive a message Boot device not found half of the time they boot their system.Which of the following is the MOST likely cause? ()
A. A dead CMOS battery
B. The OS is not installed on the hard drive
C. A faulty RAM
D. A faulty HDD connection
[单项选择]There being no cause for alarm, you ______ in such a panic yesterday.
A. need not act
B. did not need to act
C. need not have acted
D. did not need to have acted
[单项选择]There being no cause for alarm, you______in such a panic yesterday.
A. need not act
B. did not need to act
C. need not have acted
D. did not need to have acted
[单项选择]What should you do during the fire alarm
A. Make use of the lift.
B. Move along without noise.
C. Collect personal things.
D. Overtake others on the way.
[单项选择]Exp
A. 生产日期
B. 剂量
C. 有效量
D. 最小抑菌浓度
E. 满期
[单项选择]You should check your answers after you finish the paper.
[单项选择]You should check your answers when you finish the paper.

我来回答:

购买搜题卡查看答案
[会员特权] 开通VIP, 查看 全部题目答案
[会员特权] 享免全部广告特权
推荐91天
¥36.8
¥80元
31天
¥20.8
¥40元
365天
¥88.8
¥188元
请选择支付方式
  • 微信支付
  • 支付宝支付
点击支付即表示同意并接受了《购买须知》
立即支付 系统将自动为您注册账号
请使用微信扫码支付

订单号:

请不要关闭本页面,支付完成后请点击【支付完成】按钮
恭喜您,购买搜题卡成功
重要提示:请拍照或截图保存账号密码!
我要搜题网官网:https://www.woyaosouti.com
我已记住账号密码