Which two access transport protocols are used with Junos Pulse for an Apple OS X computer? (Choose two.)
A. ESP
B. SSH
C. SSL
D. IKEv2
Which Junos Pulse Secure Access Service component controls the user login URL mapping to the appropriate backend authentication service?
A. authentication server
B. authentication realm
C. resource policy
D. sign-in policy
You want to restrict role access to only users who have the required client certificate and pass a Host Checker policy. Which two methods in the Admin UI would set this restriction? (Choose two.)
A. Enable the Host Checker and certificate role restrictions.
B. Require and enforce the Host Checker and certificate authentication policies.
C. Use a custom expression to map users to the role based on the client certificate and Host Checker policy.
D. Use Secure Virtual Workspace to restrict access to the role based on the client certificate and Host Checker policy.
Which two server instances would be used as secondary authentication servers on the Junos Pulse Secure Access Service? (Choose two.)
A. RADIUS server
B. anonymous server
C. Active Directory server
D. certificate server
A user must communicate with a server-initiated connection through the Junos Pulse Secure Access Service. Which access method must be available to the user for this to be accomplished?
A. browser-based access
B. Network Layer access
C. Application Layer access
D. core access
Which three elements are required to deploy the Service Provider Edition (SPE) virtual appliance? (Choose three.)
A. a MAG Series device acting as license server
B. user subscription licensing
C. a server that hosts the virtual appliances
D. LDAP authentication
E. Device Management Interface (DMI)
You are performing initial configuration steps on a MAG Series Junos Pulse Service Gateway using the serial cable that came with the appliance. You have connected one end of the cable to the serial port on a PC and you need to connect the other end to the appliance. There are several ports on the front of the MAG Series chassis.
Which port must you use?
A. USB port
B. serial terminal port
C. A0
D. console port
You are asked to set up Junos Pulse Secure Access Service in a high availability, active/active cluster configuration. In the Admin UI, which two cluster settings are available? (Choose two.)
A. Internal VIP
B. Member Name
C. Synchronize user-defined bookmarks
D. Synchronize log messages
A Network Connect (NC) user attempts to start a VPN tunnel and receives the error message shown below:
"The secure gateway denied the connection request from this client".
What are two reasons why this error would occur? (Choose two.)
A. There is no IP address pool defined for the user's role in the NC Connection Profile.
B. A firewall is blocking access between the client and Secure Access Gateway.
C. The DHCP server configured to assign IP Addresses in the NC Connection Profile is not responding.
D. A DNS profile has not been configured in the NC Connection Profile.
You are asked to configure enterprise Web services access.
In the Admin UI, which two Web role actions apply? (Choose two.)
A. Add bookmarks.
B. Allow automount shares.
C. Auto-launch Secure Application Manager.
D. Mask host names while browsing.