JN Junos Pulse Secure Access, Specialist (JNCIS-SA)



Similar documents
PassTest. Bessere Qualität, bessere Dienstleistungen!

Certificate technology on Junos Pulse Secure Access

Requirements on terminals and network Telia Secure Remote User, TSRU (version 7.1 R4)

VMWARE VIEW WITH JUNIPER NETWORKS SA SERIES SSL VPN APPLIANCES

Certificate technology on Pulse Secure Access

Clientless SSL VPN Users

How To Configure SSL VPN in Cyberoam

Accessing TP SSL VPN

Requirements on terminals and network Telia Secure Remote User, TSRU (version 7.3 R6)

How To Configure L2TP VPN Connection for MAC OS X client

Juniper Networks Secure Access Release Notes

This chapter describes how to set up and manage VPN service in Mac OS X Server.

Java Secure Application Manager

What s New in Juniper s SSL VPN Version 6.0

What s New in Juniper Networks Secure Access (SA) SSL VPN Version 6.4

How To Configure Apple ipad for Cyberoam L2TP

How to Set Up SSL VPN for Off Campus Access to UC eresources

Juniper SSL VPN Notes Page 1

To Configure Network Connect, We need to follow the steps below:

Connecting an Android to a FortiGate with SSL VPN

DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services

Brocade Certified Layer 4-7 Professional Version: Demo. Page <<1/8>>

Pass Through Proxy. How-to. Overview:..1 Why PTP?...1

Siteminder Integration Guide

Release Notes. Release Purpose... 1 Platform Compatibility... 1 Upgrading Information... 1 Browser Support... 2 Known Issues... 3 Resolved Issues...

Secure, Mobile Access to Corporate , Applications, and Intranet Resources

Junos Pulse Release 3.0R1.1

SSL VPN Technology White Paper

Junos Pulse. Windows In-Box Junos Pulse Client Quick Start Guide. Published: Copyright 2013, Juniper Networks, Inc.

What s New in Juniper s IVE Platform Version 5.2. Highlights of this Release. What s New in IVE v5.2

M2M Series Routers. Port Forwarding / DMZ Setup

External Authentication with CiscoSecure ACS. Authenticating Users Using. SecurAccess Server. by SecurEnvoy

Virtual Data Centre. User Guide

PRODUCT CATEGORY BROCHURE. Juniper Networks SA Series

Network Connect Performance Logs on MAC OS

Interwise Connect. Working with Reverse Proxy Version 7.x

Introducing the FirePass and Microsoft Exchange Server configuration

Technical White Paper

Pulse Secure Client for Chrome OS

vcloud Director User's Guide

Junos Pulse. Administration Guide. Release 3.0. Published: Copyright 2012, Juniper Networks, Inc.

Citrix Access on SonicWALL SSL VPN

PULSE. Pulse for Windows Phone Quick Start Guide. Release Published Date

Managing Identities and Admin Access

DEPLOYMENT GUIDE Version 1.1. Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5

Network Connect & Junos Pulse Performance Logs on Windows

A Guide to New Features in Propalms OneGate 4.0

Exam : 1Y Citrix Access Gateway 8.0 Enterprise Edition: Administration. Title : Version : DEMO

Pulse Secure Client. Administration Guide. Product Release 5.1. Document Revision 1.0 Published:

What is the Barracuda SSL VPN Server Agent?

IBM Security Access Manager for Enterprise Single Sign-On V8.2 Implementation Exam.

Chapter 7 Managing Users, Authentication, and Certificates

F-Secure Messaging Security Gateway. Deployment Guide

Clientless SSL VPN End User Set-up

Release Notes. SonicOS is the initial release for the Dell SonicWALL NSA 2600 network security appliance.

Accessing Restricted University Online Resources Using Network Connect. on the Secure Remote Access Service

Workspot Configuration Guide for the Cisco Adaptive Security Appliance

Chapter 6 Virtual Private Networking Using SSL Connections

CREATING AN IKE IPSEC TUNNEL BETWEEN AN INTERNET SECURITY ROUTER AND A WINDOWS 2000/XP PC

Authentication Node Configuration. WatchGuard XTM

Symantec On-Demand Protection 2.6 Juniper IVE SSL VPN 5.2 Integration Guide

Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication

Network Connect Installation and Usage Guide

SSL VPN A look at UCD through the tunnel

Release Notes. Contents. Release Purpose. Platform Compatibility. Windows XP and Internet Explorer 8 Update

Secure remote access to your applications and data. Secure Application Access

Quick Connect. Overview. Client Instructions. LabTech

Workflow Guide. Establish Site-to-Site VPN Connection using Digital Certificates. For Customers with Sophos Firewall Document Date: November 2015

Get Success in Passing Your Certification Exam at first attempt!

NSi Mobile Installation Guide. Version 6.2

Protecting Juniper SA using Certificate-Based Authentication. Quick Start Guide

JUNOS PULSE APPCONNECT

Course Syllabus. Fundamentals of Windows Server 2008 Network and Applications Infrastructure. Key Data. Audience. Prerequisites. At Course Completion

Release Notes. Release Purpose... 1 Platform Compatibility... 1 Upgrading Information... 1 Browser Support... 1 Known Issues... 2 Resolved Issues...

How to configure Client side certificate authentication for authorization-only access / Active Sync URL s

DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication

Preparing for GO!Enterprise MDM On-Demand Service

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

ipad or iphone with Junos Pulse and Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy

How To Industrial Networking

BlackBerry Enterprise Service 10. Version: Configuration Guide

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Pulse Secure Universal App for Windows

Novell Access Manager SSL Virtual Private Network

Configuration Guide BES12. Version 12.3

Cisco ASA 5500-X Series ASA 5512-X, ASA 5515-X, ASA 5525-X, ASA 5545-X, and ASA 5555-X

Administration Guide. BlackBerry Enterprise Service 12. Version 12.0

Deploying F5 with Microsoft Active Directory Federation Services

Securing your Juniper SSL VPN with two-factor authentication.

Quick Installation Guide

SSL VPN Server Guide Access Manager 3.1 SP5 January 2013

Junos Pulse Access Control Service

Defender EAP Agent Installation and Configuration Guide

Chapter 10 Troubleshooting

Release Notes. Contents. Release Purpose. Platform Compatibility. Windows XP and Internet Explorer 8 Update

Dell SonicWALL SRA 7.5 Citrix Access

App Orchestration 2.0

Introduction to Mobile Access Gateway Installation

Configuration Guide BES12. Version 12.1

Transcription:

JN0-355 - Junos Pulse Secure Access, Specialist (JNCIS-SA)

1.Which two statements are correct regarding the MAG6611 Junos Pulse Gateway in an active/active cluster configuration? (Choose two.) A. Virtual IP (VIP) is available. B. It supports up to two devices. C. It supports up to four devices. D. External load balancing is preferred. Answer: C,D 2.What is the function of the smart caching setting within a Web caching policy? A. to send the cache control compress header to the client B. to remove the cache control headers from the origin server C. to not modify the cache control header from the origin server D. to send the appropriate cache control header based on Web content. Answer: D http://www.juniper.net/techpubs/software/ive/admin/j-sa-sslvpn- 7.2-adminguide.pdf (page 513, see smart caching) 3.You have configured RADIUS authentication on the Junos Pulse Secure Access Service. Users report that their authentication is rejected. The RADIUS administrator reports that the RADIUS server requires a specific attribute that identifies the Junos Pulse Secure Access Service on the RADIUS server. In the Admin UI, which configuration parameter will address this issue? A. Name B. NAS-Identifier C. RADIUS Server D. Shared Secret Answer: B

http://www.juniper.net/techpubs/software/ive/admin/j-sa-sslvpn- 7.2-adminguide.pdf (page 181, See defining a secure access service RADIUS server instance) 4.What are three benefits that resource profiles provide over resource policies? (Choose three.) A. Resource profiles provide automatic mapping of users to roles. B. Resource profiles provide a simplified process for creating bookmarks and resource policies. C. One profile can be assigned to multiple roles. D. Resource options can be customized for each profile. E. Resource profiles provide a simplified process for configuring applications such as VPN tunneling. Answer: B,C,D 5.You must deploy VPN tunneling using Network Connect to multiple Microsoft Windows devices. Due to access restrictions, the users do not have permission to install WSAM. Which component resolves this issue? A. Juniper Installer Service B. Host Checker C. third-party integrity measurement verifier D. Windows Secure Application Manager scriptable launcher Answer: A https://www.juniper.net/techpubs/en_us/sa/topics/reference/general/secure-accesscsc-required-rights.ht ml (first bullet on the page) 6.You want to use ESP for your VPN Tunneling transport mechanism. Which port must be open on your firewall to the Junos Pulse Secure Access Service in a default configuration?

A. UDP 500 B. TCP 500 C. UDP 4500 D. TCP 4500 Answer: C http://forums.juniper.net/t5/ssl-vpn/connection-delay-issue-with-junos-pulse-30r1-1/td-p/142534 (search for UDP 4500) 7.Users report that they cannot download a PowerPoint presentation when accessing a Web site using basic Web access. Which resource policy in the Admin UI will resolve this issue? A. Selective Rewrite Policy B. Web Caching Policy C. Web Proxy Policy D. Single Sign-On Policy Answer: B 8.Which two access transport protocols are used with Junos Pulse for an Apple OS X computer? (Choose two.) A. ESP B. SSH C. SSL D. UAC 4.2 Answer: A,D http://www.juniper.net/techpubs/software/ive/releasenotes/j-sa-sslvpn-

7.2R1 whatsnew.pdf (page 1. see new junks pulse 3.0 features for Microsoft Windows and Apple Mac OS) 9.What would be used to configure the management port on the MAG4610 Junos Pulse Gateway? A. USB port B. custom scripts C. serial console D. Admin UI Answer: D 10.What are three ways a Junos Pulse connection is initiated to a Junos Pulse Secure Access Service? (Choose three.) A. The connection is initiated when the Web browser requires that a VPN tunnel be established. B. The connection is initiated after the user signs in to the PC. C. The user manually initiates a connection. D. The connection is initiated after the PC starts. E. The connection is initiated only if application acceleration is enabled. Answer: B,C,D http://www.juniper.net/techpubs/software/pulse/guides/j-pulse-windows-inbox-clientqsg.pdf 11.You are asked to define role settings for Windows file bookmarks with a certain set of access policies. In the Admin UI, which two Windows file restrictions apply? (Choose two.) A. network file share browsing B. persistent password caching C. read-write access D. source IP address role restriction Answer: A,C

12.Which action must you perform to use CRLs to validate user certificates? A. Configure an OCSP responder. B. Validate a trusted server CA. C. Import as a trusted client the root certificate of the CA issuing the CRL. D. Configure a CA chain. Answer: C http://www.juniper.net/techpubs/en_us/sa/topics/reference/general/secure-accesscertificates-certificate-r evocation-about.html 13.Users sign in to the Junos Pulse Secure Access Service using LDAP authentication. Users must also access Outlook Web Access using the same LDAP credentials. You would like to make this authentication process automatic so that users do not need to submit the same credentials twice. In the Admin UI, which two will address this concern? (Choose two.) A. Kerberos B. Anonymous access C. Windows Terminal Services D. Remote form POST Answer: A,D 14.What are two operational capabilities of the Secure Application Manager client? (Choose two.) A. Automatically launches the client upon user browser initiated login. B. Controls access policy to network subnets and servers. C. Forces Java JRE update on SAM client installation. D. Restricts use of machine COM ports. Answer: B,C

http://www.juniper.net/techpubs/en_us/junos-pulse 3.0/topics/concepts/access-controlconnect-sa-role-co nfiguring.html 15.When adding a new cluster member, the cluster node state is indicated by a yellow radio button icon in the Admin UI. Which cluster node state is correct? A. The node is enabled, not accepting user requests. B. The node is transitioning. C. The node is enabled, unreachable. D. The node is disabled. Answer: B http://www.juniper.net/techpubs/en_us/sa 7.3/information-products/pathway-pages/saseries/sa-service-cl ustering.pdf (page 10, status column, second bullet) 16.What are two properties of an active/passive cluster configuration? (Choose two.) A. Cluster VIP B. LAN cluster C. high availability D. WAN cluster Answer: A,C http://www.juniper.net/techpubs/en_us/sa 7.3/information-products/pathway-pages/saseries/sa-service-cl ustering.pdf (page 31)

17.You are connected with a VPN tunnel on a wired interface and notice that your VPN session drops when you enable your wireless interface. What would cause this drop to occur? A. split tunneling B. route monitor C. split monitor D. route precedence Answer: B https://www.juniper.net/techpubs/en_us/sa/information-products/pathway-pages/saseries/sa-service-jun os-pulse-client.pdf (page 30, see route monitor) 18.Which Junos Pulse Secure Access Service component controls the user login URL mapping to the appropriate backend authentication service? A. authentication server B. authentication realm C. resource policy D. sign-in policy Answer: D 19.A user is mapped to two roles. The first role assigned has a maximum session length of 240 minutes. The second role assigned has a maximum session length of 480 minutes. Which maximum session length in minutes will the user receive? A. 60 B. 240 C. 480

D. 720 Answer: C 20.Which statement accurately describes Host Checker? A. Host Checker is a clientless process that removes residual data, such as temporary files or application caches, left on a user s machine after a Pulse Secure Access session. B. Host Checker is a client-side agent that removes residual data, such as temporary files or application caches, left on a user s machine after a Pulse Secure Access session. C. Host Checker is a clientless process that performs endpoint health and security checks for hosts that attempt to connect to the Pulse Secure Access Service. D. Host Checker is a client-side agent that performs endpoint health and security checks for hosts that attempt to connect to the Pulse Secure Access Service. Answer: D http://www.juniper.net/techpubs/software/ive/guides/howtos/how_to_host_checker_trouble_sho oting.pdf

Powered by TCPDF (www.tcpdf.org) JN0-355 Practice Exam Questions Demo Thank You for Trying Our Product * 100% Pass or Money Back All our products come with a 90-day Money Back Guarantee. * One year free update You can enjoy free update one year. 24x7 online support. * Trusted by Millions We currently serve more than 30,000,000 customers. * Shop Securely All transactions are protected by VeriSign! 100% Pass Your JN0-355 Exam with Our Prep Materials Via below: