JN0-355 Q&As Junos Pulse Secure Access, Specialist (JNCIS-SA) Pass Juniper JN0-355 Exam with 100% Guarantee Free Download Real Questions & Answers PDF and VCE file from: 100% Passing Guarantee 100% Money Back Assurance Following Questions and Answers are all new published by Juniper Official Exam Center Latest JN0-355 Dumps JN0-355 Practice Test JN0-355 Braindumps 1 / 10
QUESTION 1 Which Junos Pulse Secure Access Service component controls the user login URL mapping to the appropriate backend authentication service? A. authentication server B. authentication realm C. resource policy D. sign-in policy Correct Answer: D QUESTION 2 Users sign in to the Junos Pulse Secure Access Service using LDAP authentication. Users must also access Outlook Web Access using the same LDAP credentials. You would like to make this authentication process automatic so that users do not need to submit the same credentials twice. In the Admin UI, which two will address this concern? (Choose two.) A. Kerberos B. Anonymous access C. Windows Terminal Services D. Remote form POST Correct Answer: AD QUESTION 3 Which two statements about certificate-based authentication are true? (Choose two.) A. Certificate-based user authentication requires OCSP with CRL as a backup. B. Certificate-based user authentication requires CRL. C. Certificate-based authentication might require user input during the login process. D. Certificate attributes can be used to assign users to roles. Correct Answer: CD Latest JN0-355 Dumps JN0-355 Practice Test JN0-355 Braindumps 2 / 10
QUESTION 4 Your customer requires some users to be mapped to a specific role. The Active Directory (AD) administrator frequently changes users from one AD group to another. Which role mapping rule type should you use? A. the user\\'s group membership returned by the realm\\'s authentication server B. the result of a host check rule for machine certificate C. the authentication realm accessed D. the user\\'s username and NetBIOS name Correct Answer: A QUESTION 5 -- Exhibit - Root::user1(patch management)[web Users] - Start Policy [WEBURL/REWRITING] evaluation for resource http://www.juniper.net:80/ Root::user1(patch management)[web Users] - Applying Policy [Initial Rewrite Policy]... Root::user1(patch management)[web Users] - Action [Rewrite Content (auto-detect content type)] is returned Root::user1(patch management)[web Users] - Policy [Initial Rewrite Policy] applies to resource Root::user1(patch management)[web Users] - Passthrough proxy policies are not applicable for http://www.juniper.net Root::user1(patch management)[web Users] - Start Policy [WEBURL/ACCESS] evaluation for resource http://www.juniper.net:80/ Root::user1(patch management)[web Users] - Applying Policy [Web]... Root::user1(patch management)[web Users] - Evaluating Policy Rule 1... Root::user1(patch management)[web Users] - Resource filter [http://www.juniper.com:80/*] does not match Root::user1(patch management)[web Users] - No Policy Rule applies to resource Root::user1(patch management)[web Users] - Applying Policy [Initial Open Policy]... Latest JN0-355 Dumps JN0-355 Practice Test JN0-355 Braindumps 3 / 10
Root::user1(patch management)[web Users] - User roles [Web Users] do not match with configured roles [Exclusive:Web Users] Root::user1(patch management)[web Users] - No Policy applies to resource Root::user1(patch management)[web Users] - Start Auto Allow evaluation on WEBURL for resource http://www.juniper.net:80/ Root::user1(patch management)[web Users] - No Auto Allow resources configured -- Exhibit -A user should be able to access a Web resource but instead is receiving an error that access to the site is blocked. Referring to the exhibit, which policy must be modified to allow access to the resource? A. initial rewrite policy B. pass-through proxy policy C. initial open policy D. selective rewrite policy Correct Answer: C QUESTION 6 What are two operational capabilities of the Secure Application Manager client? (Choose two.) A. Automatically launches the client upon user browser initiated login. B. Controls access policy to network subnets and servers. C. Forces Java JRE update on SAM client installation. D. Restricts use of machine COM ports. Correct Answer: AB QUESTION 7 You must deploy VPN tunneling using Network Connect to multiple Microsoft Windows devices. Due to access restrictions, the users do not have permission to install WSAM. Which component resolves this issue? A. Juniper Installer Service Latest JN0-355 Dumps JN0-355 Practice Test JN0-355 Braindumps 4 / 10
B. Host Checker C. third-party integrity measurement verifier D. Windows Secure Application Manager scriptable launcher Correct Answer: A QUESTION 8 You want to use ESP for your VPN Tunneling transport mechanism. Which port must you have open on your firewall to the Junos Pulse Secure Access Service in a default configuration? A. UDP 500 B. TCP 500 C. UDP 4500 D. TCP 4500 Correct Answer: C QUESTION 9 What are three valid syntax configurations when configuring VPN Tunneling Access Control Resources? (Choose three.) A. 10.1.1.0/24 B. http://10.1.1.0/24 C. tcp://*:80,443 D. icmp://*:80,443 E. udp://10.1.1.0/24 Correct Answer: ACE QUESTION 10 In the Admin UI, which two connection types are in a Junos Pulse connection set? (Choose two.) A. SSL VPN or UAC (L3) Latest JN0-355 Dumps JN0-355 Practice Test JN0-355 Braindumps 5 / 10
B. Netscreen Firewall C. UAC (802.1X) D. ipass Mobile Connect Correct Answer: AC QUESTION 11 You must plan the deployment of Junos Pulse to hundreds of end users on various client platforms including Windows laptops, smartphones running Google Android, and ipad users. What are three delivery methods that you would use to complete this task? (Choose three.) A. Users can connect to the Secure Access Gateway Web portal and install Junos Pulse from the start page. B. You can distribute a default installer to endpoints, install it, and let users create their own connections. C. You can configure a Host Checker policy to detect if Junos Pulse is installed and deliver the installation to the endpoint during pre-authentication. D. Smartphone users can download the Junos Pulse installer from the mobile application section of the Web portal start page. E. You can create an.msi installer that contains connection settings and services along with the Junos Pulse installer and deliver this to endpoints using a software distribution process. Correct Answer: ABE QUESTION 12 What is the function of the smart caching setting within a Web caching policy? A. to send the cache control compress header to the client B. to remove the cache control headers from the origin server C. to not modify the cache control header from the origin server D. to send the appropriate cache control header based on Web content. Correct Answer: D QUESTION 13 Users access the Junos Pulse Secure Access Service from home using a specific connection. Latest JN0-355 Dumps JN0-355 Practice Test JN0-355 Braindumps 6 / 10
When the same users access secured resources in the office, they must connect to the Junos Pulse Access Control Service using a different connection. You want to make the user connection automatic when they launch Junos Pulse. Which Junos Pulse feature should you configure? A. Connection Awareness B. Location Awareness C. Location Services D. Connection Services Correct Answer: B QUESTION 14 Users report that they cannot download a PowerPoint presentation when accessing a Web site using basic Web access. Which resource policy in the Admin UI will resolve this issue? A. Selective Rewrite Policy B. Web Caching Policy C. Web Proxy Policy D. Single Sign-On Policy Correct Answer: B QUESTION 15 You are asked to set up Junos Pulse Secure Access Service in a high availability, active/active cluster configuration. In the Admin UI, which two cluster settings are available? (Choose two.) A. Internal VIP B. Member Name C. Synchronize user-defined bookmarks D. Synchronize log messages Correct Answer: BD Latest JN0-355 Dumps JN0-355 Practice Test JN0-355 Braindumps 7 / 10
QUESTION 16 How are user role-mapping rules processed by the Junos Pulse Secure Access Service gateway? A. All rules are processed in a top-down fashion for the best match. If no match is found, the user is not allowed to sign in to the realm. B. All rules are processed in a top-down fashion for the best match. If no match is found, the user is assigned to the default role. C. All rules are processed in a top-down fashion for all eligible matches. If no match is found, the user is not allowed to sign into the realm. D. All rules are processed in a top-down fashion for all eligible matches. If no match is found, the user is assigned to the default role. Correct Answer: C QUESTION 17 You are connected with a VPN tunnel on a wired interface and notice that your VPN session drops when you enable your wireless interface. What would cause this drop to occur? A. split tunneling B. route monitor C. split monitor D. route precedence Correct Answer: B QUESTION 18 -- Exhibit -(logintime.dayofweek = (Mon to Fri) AND logintime = (8:00AM to 5:00PM) AND hostcheckerpolicy = "Antivirus check" AND groups = \\'Employees\\') OR groups = \\'Executives\\' -- Exhibit -A detailed rule exists that prevents access to a Web page based on the custom expression shown in the exhibit. You want to ensure that Alice can access the resource any day of the week during any time period. What is required for Alice? A. Alice must be assigned the Employees group. B. Alice must be assigned the Executives group. Latest JN0-355 Dumps JN0-355 Practice Test JN0-355 Braindumps 8 / 10
C. Alice must pass the Host Checker policy. D. Alice must sign in using Junos Pulse. Correct Answer: B QUESTION 19 You are asked to add another gateway to an existing three-unit SA cluster. Which two actions should you perform? (Choose two.) A. Add a new cluster member, IP addresses, and default gateways under the existing cluster definition. B. Upgrade the new cluster member to match the same software release of the cluster. C. Set the existing cluster to active/passive state. D. Configure cluster name, cluster password, and existing member address on the new cluster member. Correct Answer: AD QUESTION 20 What are two characteristics of active/active clustering? (Choose two.) A. clustering of up to four nodes B. load balancing C. cluster synchronization using the external port D. failover using a virtual IP (VIP) address Correct Answer: AB Latest JN0-355 Dumps JN0-355 Practice Test JN0-355 Braindumps Latest JN0-355 Dumps JN0-355 Practice Test JN0-355 Braindumps 9 / 10
Powered by TCPDF (www.tcpdf.org) To Read the Whole Q&As, please purchase the Complete Version from Our website. Try our product! 100% Guaranteed Success 100% Money Back Guarantee 365 Days Free Update Instant Download After Purchase 24x7 Customer Support Average 99.9% Success Rate More than 800,000 Satisfied Customers Worldwide Multi-Platform capabilities - Windows, Mac, Android, iphone, ipod, ipad, Kindle We provide exam PDF and VCE of Cisco, Microsoft, IBM, CompTIA, Oracle and other IT Certifications. You can view Vendor list of All Certification Exams offered: https://www.certbus.com/allproducts Need Help Please provide as much detail as possible so we can best assist you. To update a previously submitted ticket: Any charges made through this site will appear as Global Simulators Limited. All trademarks are the property of their respective owners. Copyright certbus, All Rights Reserved. Latest JN0-355 Dumps JN0-355 Practice Test JN0-355 Braindumps 10 / 10