Juniper JN0-570 JNCIS-SSL Download Full Version : https://killexams.com/pass4sure/exam-detail/jn0-570
QUESTION : 135 Your company is rolling out Secure Meeting to assist the helpdesk in troubleshooting desktop issues. Which type of meeting should you enable on the SSL VPN? A. scheduled meeting B. support meeting C. instant meeting D. technical meeting QUESTION : 136 What will allow a user to automatically log in to Network Connect using the Standalone Launcher? A. -url https://1.2.3.1 -t alley -x password -l login B. -start -url https://1.2.3.1 -u alley -p l0g!n -r Artists C. -start -url https://1.2.3.1 -u alley -p l0g!n -l login D. -start -url https://1.2.3.1 -t alley -p password -l login QUESTION : 137 Which two options are available to the administrator of a secure meeting during a session?(choose two.) A. Transfer meeting control to other meeting administrators only. B. Disable the chat option only for specific participants. C. Extend the duration of the meeting. D. Disconnect individual meeting participants. Answer: C,D QUESTION : 138 Which two are valid options for using CRLs to validate a user's certificate? (Choose two.) A. Use OCSP to access the CDP. 43
B. Use the CDP specified in the CA certificate. C. Use LDAP to access the CDP. D. Use the CDP specified in the user certificate.,d QUESTION : 139 When you set a field for a Form POST Single Sign-On (SSO) policy to be user modifiable, on which page can the end user modify the field? A. advanced preferences page B. user login page C. user home page D. Web bookmarks page Answer: A QUESTION : 140 Which condition in a resource policy rule properly expresses that Cache Cleaner is disabled? A. cachecleanerstatus = None B. cachecleanerstatus = 0 C. cachecleanerstatus = Null D. cachecleanerstatus = False QUESTION : 141 What are three components of the administrative console that a delegated administrator can manage? (Choose three.) A. resource profiles B. administrative realms C. user roles D. troubleshooting E. administrative roles 44
Answer: A,C,D QUESTION : 142 Which three proxy scenarios are supported by Network Connect when split tunneling is enabled? (Choose three.) A. support for a Winsock proxy client B. explicit proxy to get to the IVE device C. explicit proxy to get to internal applications D. PAC file to get to internal applications E. automatic setting detection is configured in the client's browser,c,d QUESTION : 143 How can a user obtain an etrust SiteMinder SMSESSION cookie? A. The IVE can provide the cookie. B. The user can input the cookie manually. C. The IVE can grab the cookie from the user's browser. D. The administrator can import cookies into the IVE. Answer: A QUESTION : 144 You would like Host Checker to ensure that all hosts are running antivirus software using the latest definitions. Which feature on the IVE device allows you to monitor and verify this information? A. virus signature version monitoring B. Endpoint Security Assessment Plug-In (ESAP) C. virus definition version monitoring D. predefined antivirus rules Answer: A QUESTION : 145 Click the Exhibit button. 45
A user browses to https://partners.acmegizmo.com. Referring to the exhibit, which authentication realm will be available to the user? A. LDAP Realm B. Users and LDAP Realm C. ALL D. Users Answer: D QUESTION : 146 You have finished setting up your IVS but you seem to be having issues with your configured VLANs. Which two options should you verify when troubleshooting VLANs on the IVS? (Choose two.) A. Your virtual port must be assigned to the correct virtual system. B. Your VLAN must have enough users allocated to the virtual system. C. Your VLAN must use 802.1q tagging. D. Your VLAN must be assigned to the correct virtual system. Answer: C,D QUESTION : 147 What must be specified by the root administrator for Network Connect to be used on a virtual system? A. The number of allocated users on the virtual system must not exceed the number of Network Connect users on the system. B. The IP address pools must be specified by the root administrator before they can be specified on a virtual system. C. The virtual port must be associated to the correct VS. D. The VLAN tagging must be associated to the correct VS. 46
QUESTION : 148 Which statement is true regarding Secure Meeting? A. It requires minimal changes to security policies to ensure full functionality. B. It requires only an SSL connection to provide full visibility into the meeting. C. It can be used only by users with valid authenticated accounts. D. It works with Windows and Mac OS platforms only. QUESTION : 149 Which series of steps describes the appropriate method for upgrading an active/active cluster? A. 1) upgrade individual nodes; 2) reboot nodes; 3) enable nodes B. 1) disable nodes; 2) upgrade one device; 3) enable nodes C. 1) upgrade master; 2) reboot backup; 3) join backup again D. 1) disable nodes; 2) upgrade individual devices; 3) enable nodes Answer: D QUESTION : 150 You have two SA 4000s that you would like to run in a cluster. You have a small number of users accessing the device and you want to ensure that these users do not lose a connection in the event that one device goes down. How should you set up your cluster? A. Place each device in a different network and set your cluster to active/active. B. Place both devices in the same LAN and set your cluster to active/passive. C. Place both devices behind a front-end load balancer and set your cluster to active/passive. D. Place your devices in the same LAN, set your cluster to active/active, and ensure that you have a front-end load balancer. 47
For More exams visit https://killexams.com Kill your exam at First Attempt...Guaranteed!