Mio1
![]() |
![]() |
![]() |
Título del Test:![]() Mio1 Descripción: cosas mias |




Comentarios |
---|
NO HAY REGISTROS |
To successfully connect to PPS remote authentication users can: Submit a username and password that matches an active directory server. Submit a digital certificate that matches a defines certificate authority. Submit a username and password that matches PPS database. Submit a username and password that matches Radius. When defining a user role, an administrator can restrict access to a role based on the type of browser the user is utilizing to attempt access. True. False. Which setting can be changed under user role: Chose 2 options. Session options. UI options. Mapping. Server. Sign-in. Which user role configured by default: Users. Employees. Contractor. Guests. During the login process user attributes can be collected from: Ldap. Radius. Nis. AD. The following needs to be defined prior to config role-mapping: Users roles. Employees roles. Guest roles. Contractor roles. Where can you create a custom expression in the PPS platform?. Role mapping. Roles. Realm. Sign-in notification. Role based restrictions can be bases on which of the following?. Source Ip. Browser. Certificates. Host Checker. Destiny Ip. Attributes. Users. To sniff network packets to add in support this tool?. System snapshot. Tcp dump. Remote debugging. Export XML. You must deploy VPN tunneling using Network Connect to multiple Microsoft Windows devices. Due to access restrictions, the users do not have permission to install WSAM. Which component resolves this issue?. Juniper Installer Service. Host Checker. third-party integrity measurement verifier. Windows Secure Application Manager scriptable launcher. Only WELF formatted syslog are supported for customer filters. True. False. PPS support client side logging for which features?. Pulse desktop client. Mac auth. Active supplicant. Host checker. Which protocol is not supported?. EAP-FAST. MS-CHAP. EAP-MD5-Challenge. EAP-TTLS. Which of the following you can base role restriction on?. Source ip. Browser. Certificate. Host checker. All above. In order to successfully migrate user sessions between PCS and PPS via IF-MAP, the user Roles must match btw both PCS and PPS. True. False. You can see all published IF-MAP federation wide sessions from: IF-MAP client running on PCS. IF-MAP server running on PPS. Both IF-MAP client and server. IF-MAP server running on PCS. MAC addressed are detected by which protocol option?. DHCP. LLDP. SNMP. ICMP. EAP over radius between whom?. Authentificatior / auth server. Supplicant / auth server. Supplicant / authentificator. None. How many seconds does it take to notify the fall of a node in a cluster?. 1. 3. 5. 7. During generic 802.1x session, when a supplicant initiate a session , the supplicant sends which kind of messages?. EAPoL-begin. EAPoL-start. Radius-begin. Radius-start. What 4 remediation action you can configure on a host checker policy?. Custom instruction, kill process, delete file, update software. Custom instruction delete file, send reason string kill process. Delete file , send reason string update software start process. Update software , start process, delete file send reason string. When device are profiled. Time stamps exist for: Chose 2 options. First seen. Last seen. Last updated. Last polled. Configuring pulse profiler at the realm level allows what function?. Gathering user data. Gathering device attributes. Gathering switch attribute. Endpoint security. Which of the following are basic component s of 802.1x authentification: 3. Supplicant. Authentificator. Encapsulator. Auth server. Decider. Admission control events are shown under which logs? 2. User access log. Sensor logs. Events logs. Admin access log. None of above. Active session on the device discovery report are available with which selection? 2. User sessions. Remote sessions. Device sessions. On-perm sessions. PPS supports policy enforcement devices. True. False. Which company contains all the security profiles for the host checker?. OPSWOT. OPSWAT. ESAP. Host checker. When you have a switch, how are the ways to configure the vlans?. Trunk. Access. Trusted. Untrusted. Where is IF-MAP configured?. PPS. PCS. All. Roles should be configured so that each user matches?. Only none role can match. Roles based on employee type only. Role mapping is up to the user preference. Multiple hierarchical roles may match. Pulse policy secure permissive merge provides what functions?. Enable access feature takes precedence over disabled access feature. User interface options are taken from multiple roles and combined with permissive merge. Minimum session lengths have precedence over maximum session lengths. Users interface options are taken from first role when permissive merge is applied. Permissive merge allows features to be enabled bases upon first match. HC policies can be enforced at the realm level or a role level, but can only be enabled for evaluation at. Role. Auth server. Sign-in policy. Sign-in page. Realm. Pulse client supports by default?. EAP-TTLS outer, EAP-JUAC inner. EAP-PEAP outer, EAP-MS-CHAPv2 inner. EAP-PEAP outer, EAP-GTC inner. EAP-TTLS outer, EAP-MS-CHAPv2 inner. All above. When a switch does not support 802.1X, the following should be used for port based enforcement. SNMP. 802.1n. ARP. MAC auth. In 802.1x the authentificator is typically. Switch. AP. Router. Client. IFmap can be used in what protocols reply to integrate with PCS cloud secure for SSO access to applications?. SSL. IFMAPv2. SAML. Non of above. PPS has which tools available to help troubleshoot. TCPDump. Telnet. Ping. Traceroute. Packet Walk. robin. prueba. Cloud secure supported platforms. IOS. Andorid. Windows. MAC. Chrome OS. Cloud secure supported idp integration. Microsoft adfs. OKTA. Ping identity. Siteminder. Cloud Secure integrates with : Misrosoft Intune. AirWatch. MobileIron. Pulse Workspace. How much virtual clustering supported?. Active/Pasive. Active/Active. How many members in active-standby cluster. 1. 2. 3. 4. How many members in active-active cluster. 1. 2. 3. 4. CPE on Virtual appliances. PSA3000-V. PSA5000-V. PSA7000-V. which is supported on Virtual platformed (private cloud): ESX. Hyper-V. KVM. Virtual box. Which is supported on private cloud: Azure. AWS. Google Cloud Platform. ESX. when configuring LDAP, which information?. Server name. Ip address. Admin DN. Psw. Base DN. To enable identity aware connections for Fortinet. What device is requested?. FortiAuthentificator. FortiAnalyser. FortiProxy. FortiGuard. What is a type of firewall enforcer supported. Palo Alto. Check Point. Fortinet. Juniper Networks SRX series. All. Where certificate is saved?. CA. Certificate warehouse. Certificate store. Authentication false: radius answer with: Radius reject. Radius accept. Radius request. Radius challengue. Maximum log size. 500 Mb. 200 Mb. 100 Mb. 400 Mb. Default log size. 500 Mb. 200 Mb. 100 Mb. 400 Mb. Which two characteristics apply to policy Secure Demonstration and training edition (DTE) virtual appliances?. Fully featured. Can have licenses added to it. Only for 30 days. Can upgrade the software. Which two characteristics apply to policy Secure Demonstration and training edition (DTE) virtual appliances?. only 5 users. you can't add licenses. can you upgrade. only for lab. SSL modes?. JITC Mode. NDcPP. FIPS. NDcPP prerequisites. External DNS Server should be able to resolve the hostnames used in the testing. External Syslog server is up and running. External CRL is up and running. If you plan to integrate with Pulse One, Pulse One server is up and running. NDcPP or JITC mode supported ?. True. False. To install Pulse on a 32-bit (x86)Windows endpoint using a configuration file: msiexec /i PulseSecure.x86.msi CONFIGFILE=c:\temp\myconfiguration.pulsepreconfig /qb. msiexec /i PulseSecure.x64.msi CONFIGFILE=c:\temp\myconfiguration.pulsepreconfig /qb. msiexec /i PulseSecure.x86.msi CONFIGFILE=c:\temp\myconfiguration.pulsepreconfig. msiexec /i PulseSecure.x64.msi CONFIGFILE=c:\temp\myconfiguration.pulsepreconfig. To install Pulse on a 64-bit (x64)Windows endpoint using a configuration file: msiexec /i PulseSecure.x86.msi CONFIGFILE=c:\temp\myconfiguration.pulsepreconfig /qb. msiexec /i PulseSecure.x64.msi CONFIGFILE=c:\temp\myconfiguration.pulsepreconfig /qb. msiexec /i PulseSecure.x86.msi CONFIGFILE=c:\temp\myconfiguration.pulsepreconfig. msiexec /i PulseSecure.x64.msi CONFIGFILE=c:\temp\myconfiguration.pulsepreconfig. What layer of the OSI model does IPsec use?. Layer 3. Layer 7. Layer 2. Layer 8. What layer of the OSI model does SSL use?. Layer 2. Layer 3. Layer 7. Layer 8. If you have a 500-user active/active cluster pair and you add two more cluster members, how many users can you support now?. 500. 1000. 750. 250. If you use round-robin DNS as your load-balancing method for an active/active cluster pair, what happens if one of the cluster members fails?. Round-robin DNS has no way of detecting whether an IP address is responding. Round-robin DNS has way of detecting whether an IP address is responding. What functions does the admission control template parses the events perform?. The events based on the variables such as source IP, source user, rule name, and severity. Logos of events on admission control equipment. How many different version of ESAP plug-in can you have uploaded to PPS at once?. only one can be uploaded and active. only two can be uploaded and active. only one can be active. only two can be active. IF-MAP can be used in what protocols reply to integrate with PCS cloud secure for SSO access to applications?. SSL. IFMAP-v2. SAML. None of above. Do you need a license to run if-map server?. True. False. Do you need a license to run if-map client?. True. False. Can you see all user sessions on if-map client?. True. False. Do you need integration with pulse one to run MDM?. True. False. At minimum, to enable guest access, the following must be added to Pulse Policy secure: Install guest licensing. Add the WLC as a Radius client. Upload the guest certificates. Run the guest integration wizard. How many devices can joined in a cluster?. Active/Passive. Active/Active. Which MDM solutions are supported by PPS ? 3. Airwatch. MobileIron. Pulse workspase. Microsoft intune. ICE license enable full box capacity when needed?. True. False. Which system log type contains information about active sync proxy events?. Event. Client Logs. User Access. When a node takes over the cluster VIP, it notifies other networking devices that now peers the vip by sending. A gratuitous ARP message. Hello. A message with a IP. Notification. Which network interface is used for clustering. External. Internal. Management. Host checker statement of health rules allow for which?. Antiviruse enabled. Antispyware enabled. Firewall Enabled. Automatic Updating Enabled. All. Which is not valid connection type when configuring a syslog server. SSL. UDP. TCP. TLS. When user fails to authenticate what severity log message is created. Minor. Critical. Info. Major. To sniff network packets to add in troubleshooting use this tool. System snapshot. Tcp dump. Remote debugging. Export XML. Virtual appliances support the following license type: Subscription. Perpetual. PSA-V is officially supported in which cloud infrastructures?. AWS. Azure. Esxi. Hyper v. PSA-V is officially supported in which virtual infrastructures?. Kvm. Esxi. Hyper v. Proxmox. Virtual box. Which of this Pulse hardware appliances supports 4 member cluster. PSA7000. PSA5000. PSA3000. PSA300. Which of the following are not required in act/act cluster?. A vip configured on the pps. All nodes having ip addr in the same subnet. All nodes having ip addr in the different subnet. It contains a balancer. Virtual appliance clustering is supported with. Exact model virtual appliances. virtual and physical. PSA-V supports active/active cluster deployment ?. True. False. Which steps must you complete to configure a cluster?. Create cluster. Modify cluster propreties. Join cluster. Add member. Add IP Vip. Which Host checker feature uses a software module running on the PPS device to validate an endpoint compliance?. Endpoint security Assessment Plug-in ESAP. Realms. Module OPSWAT. Module OPSWOT. Which endpoint checks are possible with desktop pulse client host checker?. Processes. Ports. Files. Attributes. IP. Pulse Secure Desktop client requires admin rights to install and update. True. False. PPS offers endpoint health check validation. True. False. What is the remediation actions that you can configure on a host checker policy?. Delete files, kill process, Custom instructions, Send Reason Strings. Delete files, kill process, upload and Send Reason Strings. Upload, delete files, kill process, Custom instructions, Send Reason Strings. Host Checker policies are supported on which endpoint operating system?. Windows. Android. Mac. IOS. All. Is it possible to store host checking evaluation result and if so, for how many length. It is possible to store the result for a maximum of 30 days. It is possible to store the result for a maximum of 60 days. Never. Pulse Secure supports google cloud deployment?. True. False. Pulse client provides support for which multi-factor authentication (MFA) vendor?. Duo security. Microsoft. RSA. Google. All above. Which user role configured by default. User. Employee. Contractor. During the login process user attributes can be collected from: LDAP. AD. Radius. Role based restrictions can be bases on which of the following?. Source Ip. Browser. Certificates. Host Checker. All. Which condition in a resource policy rule property expresses that cache cleaner is disabled?. CachecleanerStatus=0. CachecleanerStatus=1. Sign-in policies define the login URL and what other element?. Sign-in Notifications. Sign-in Policies. Sign-in Pages. Which statement is true about sign-in URLs?. You can define multiple URLs each with different authentication realms but all of the URLs must be extensions of the path (*/). You can define multiple URLs each with different authentication roles but all of the URLs must be extensions of the path (*/). Basic rule-level customization for landing pages include. Backround color. Logo. Image. Which character do you use to escape characters in an attribute name?. {} curly braces. (). "". Host checker functionality runs as a separate process while using Pulse client. True. False. IF-MAP recognizes two metadata types that are similar to roles on the Pulse Policy Secure and SA: IF-MAP roles. IF-MAP capabilities. IF-MAP realm. IF-MAP policy. |