Anda di halaman 1dari 11

Exam Title

: Juniper JN0-562 : Certified Internet Associate (JNCIA-SSL) 562 Exam

Version : R6.1

www.Prepking.com

Prepking - King of Computer Certification Important Information, Please Read Carefully


Other Prepking products A) Offline Testing engine Use the offline Testing engine product to practice the questions in an exam environment. B) Study Guide (not available for all exams) Build a foundation of knowledge which will be useful also after passing the exam. Latest Version We are constantly reviewing our products. New material is added and old material is updated. Free updates are available for 90 days after the purchase. You should check your member zone at Prepking and update 3-4 days before the scheduled exam date. Here is the procedure to get the latest version: 1.Go towww.Prepking.com 2.Click on Member zone/Log in (right side) 3. Then click My Account 4.The latest versions of all purchased products are downloadable from here. Just click the links. For most updates,it is enough just to print the new questions at the end of the new version, not the whole document. Feedback If you spot a possible improvement then please let us know. We always interested in improving product quality. Feedback should be send to feedback@Prepking.com. You should include the following: Exam number, version, page number, question number, and your login ID. Our experts will answer your mail promptly. Copyright Each PDF file contains a unique serial number associated with your particular name and contact information for security purposes. So if we find out that a particular PDF file is being distributed by you, Prepking reserves the right to take legal action against you according to the International Copyright Laws. Explanations This product does not include explanations at the moment. If you are interested in providing explanations for this exam, please contact feedback@Prepking.com.

www.Prepking.com

1. You want to configure Network Connect to allow users to connect through a tunnel, connect to hosts on the same subnet as their local adapter, and shut down any attempt to extend the network boundaries. How do you proceed? A. Enable split tunneling. B. Disable split tunneling. C. Enable split tunneling with route change monitor. D. Allow access to local subnet with route change monitor. Answer: D 2. Which three authentication servers are included with a baseline license? (Choose three.) A. NIS B. ACE C. SAML D. LDAP E. SiteMinder Answer: ABD 3. You create a set of role mapping rules. You select "Merge settings for all assigned roles." The second role mapping rule has the "Stop processing rules when this rule matches" option selected. A user logs in that matches the first three rules. What happens? A. This is not a valid combination. The system displays an error message and does not update the configuration. B. The merge settings override the stop processing option. The user matches all three roles and merging follows the standard merging criteria. C. The Stop rule prevents any more rule matching after checking the second rule. The merge option only merges the roles of the first two rules following the IVE's built-in permissive merging rules. D. The Stop rule prevents any more rule matching after checking the second rule. The user now just matches the second rule. The merge option is overridden and the user is given only the privileges defined by the second role. Answer: C 4. When using the J-SAM, where on a client machine would you look to verify that the loopback addresses are assigned correctly? A. HOSTS file B. ARP cache C. LMHOSTS file D. local route table Answer: A

www.Prepking.com

5. What is Cache Cleaner used for? A. to prevent users from signing in from insecure machines B. to remove content downloaded during the IVE session C. to remove Web content cached by the IVE on behalf of the user D. to determine which files should be cached between remote access sessions Answer: B 6. Which role-based session option would an administrator configure to allow a user to connect from different source IP addresses within the same user session? A. roaming session B. persistent session C. persistent password caching D. browser request follow-through Answer: A 7. Which two Web Resource Policy features provide you with the capability to configure the IVE to work with corporate Proxy Servers? (Choose two.) A. Web Proxy Policies B. Web Proxy Servers C. Web Cache Policies D. Web Passthrough Proxy Answer: AB 8. Which two statements about SSL VPNs are true? (Choose two.) A. SSL VPNs provide better security than IPSEC. B. SSL VPNs provide a dedicated, point to point connection. C. SSL VPNs provide high performance for individual connections. D. SSL VPNs use well-known technologies for secure individual connections. Answer: CD 9. You are using RADIUS as your authorization server. Other than username, which two attributes are available for creating role mapping rules? (Choose two.) A. Certificate B. User Attribute C. RSA Attributes D. Group Membership Answer: AB 10. Where is the IVE typically deployed in the network? A. behind the Internet firewall

www.Prepking.com

B. internally with all clients directly cabled to the IVE C. both interfaces on the outside of the Internet firewall D. parallel to the Internet firewall with one interface on the outside and one on the inside Answer: A 11. What are two reasons for using Network Connect? (Choose two.) A. When the ability to disable split tunneling is required. B. When the client will need to redirect traffic based on process name. C. When the client will use applications with server-initiated connections. D. When the client will not have administrator privileges on their machines. Answer: AC 12. What is the minimum information that must be configured by an administrator to create a resource policy? (Choose two.) A. resource B. username C. policy name D. session timeout Answer: AC 13. What are two possible reasons for W-SAM not starting on the client? (Choose two.) A. Java is disabled in the Sign-in policy. B. ActiveX autoinstall is disabled in the role. C. A popup blocker is installed on the client machine. D. The user does not have administrator privileges on the machine. Answer: CD 14. Which User Role session option provides you with the capability to cache basic authentication information so users are not challenged repeatedly for the same credentials? A. roaming session B. persistent session C. persistent password caching D. browser request follow-through Answer: C 15. What does a sign-in policy map users to when browsing a specified URL? A. A list of possible user roles. B. Specific resources as stated in resource policies. C. The URL presents one or more authentication realms to the user for authentication. D. The login is passed to an authentication server for verification, and an authorization server for user

www.Prepking.com

attribute information. Answer: C 16. Which resource example should you use to define resource access to a UNIX file share? A. server/user B. \\server\share C. tcp://host:443 D. tcp://host:137/users Answer: A 17. Which statement accurately describes Resource Profiles? A. Resource Profiles are a collection of resources and ACLs. B. Resource Profiles are where ACLs are setup for resources. C. Resource Profiles are a collection of resources and their discriptions. D. Resource Profiles are where the resource, role, and ACL are in one location. Answer: D 18. Resource Profiles support creating policies for which two technologies? (Choose two.) A. secure meeting B. network connect C. terminal services D. Web applications Answer: CD 19. Which two Terminal Services clients can be delivered automatically from the IVE to users? (Choose two.) A. Citrix ICA B. Tera Term C. SecureCRT D. Windows Terminal Service Answer: AD 20. What are two benefits of using SSL? (Choose two.) A. SSL is supported in all Web browsers. B. SSL usually requires no client-side configuration. C. The SSL client is smaller than most IPSec clients, with half the options to configure than that of an IPSec client. D. SSL outperforms IPSec on every level because it operates at the network layer rather than the application layer. Answer: AB

www.Prepking.com

21. What Access Method provides dual-mode transport (IPSec or SSL)? A. Core Access B. Network Layer Access C. Application Layer Access D. Presentation Layer Access Answer: B 22. Which two statements about a server certificate are true? (Choose two.) A. A server certificate is required for HTTP to function. B. A server certificate is a digital document vouches for the identity of the server. C. A server certificate contains information about the server itself and the organization that owns the server. D. A server certificate is an electronic "drivers license" that establishes client credentials when doing business or other transactions on the Web. Answer: BC 23. Which combination of Authentication Servers and Authorization Servers is valid? A. Authentication Server: LDAP Authorization Server: NT B. Authentication Server: NT Authorization Server: RADIUS C. Authentication Server: RADIUS Authorization Server: LDAP D. Authentication Server: Local Authorization Server: RADIUS Answer: C 24. What is the purpose of the administrator username and password on an AD/NT server? A. Allows the IVE to query the AD/NT for group names for role-mapping purposes. B. Allows users to change their username and password on the AD/NT server using the IVE. C. Allows the IVE to query the AD/NT for available users from a list for role-mapping purposes. D. Allows the IVE to connect to the AD/NT domain and submit credentials on behalf of the users. Answer: A 25. When using W-SAM, which two statements are true about client privileges? (Choose two.) A. The user needs administrator privileges to download the ActiveX control. B. The user needs administrator privileges to download W-SAM using the Java delivery mechanism. C. The user needs administrator privileges to interface with the client LSP and manipulate traffic. D. The user needs administrator privileges automatically install Secure Application Manager on the client. Answer: AD

www.Prepking.com

26. You are using LDAP as an authentication server. You select User Attribute from your "Rule based on" dropdown box. Which statement is true? A. You cannot match to User Attribute when using LDAP as an authentication server. B. Before you can select User Attributes for comparison purposes, you must save the rule. C. Before you can select User Attributes for comparison purposes, you must configure the merge settings. D. Before you can select User Attributes for comparison purposes, you must use the Update button after you select the User Attribute Rule based on option to have it display. Answer: D 27. Which three functions are performed by user roles? (Choose three.) A. defining user session parameters B. allowing access to specific services C. allowing access to types of services D. selecting user authentication methods E. establishing session settings and options Answer: ACE 28. Under which three conditions can the Host Checker feature be invoked by the IVE? (Choose three.) A. when assigning users to a role B. when the user logs out of the IVE C. before the login page is presented D. before allowing access to a resource E. only after the sign-in page is displayed Answer: ACD 29. Advanced License is installed and you want to filter logs to extract information about system events. How would you create dynamic log filters? A. You type the query in by hand in the Edit query field, then select Update. B. You create the query in the Query field using the Filter Variables Dictionary. C. In the log display, you click on a field containing the value you want to use as a filter. D. The Advanced License does not allow for customized logging. You must buy a special license to perform log filtering. Answer: C 30. Which two GUI options can you customize when using the Sign-in Page menu? (Choose two.) A. Define Sign-In URLs. B. Change the Logo image. C. Define Authentication Servers. D. Customize the Welcome messages.

www.Prepking.com

Answer: BD 31. What is the purpose of Host Checker? A. to distribute software to the remote machine B. to capture sign-in credentials of the remote user C. to remove unwanted files from the remote machine D. to determine the security status of the remote machine Answer: D 32. You receive an IVE from the factory. Which Web address should you access if you want to initially configure the device using a browser? A. https://192.168.0.1 B. https://192.168.1.1/admin C. Obtain IP address using DHCP. D. You cannot initially configure the IVE from a browser. Answer: D 33. What are two features of J-SAM? (Choose two.) A. Map network drives using NetBios. B. Encapsulate static TCP port client and server traffic. C. Encapsulate dynamic UDP port client and server traffic. D. Support for only Windows, Linux, and Solaris platforms. Answer: AB 34. From which two locations can a user obtain a copy of the Citrix ICA client? (Choose two.) A. Download a custom ICA client. B. Download automatically from IVE. C. Download from the Juniper Web site. D. Download from System->Maintenance->Installers . Answer: AB 35. Which TCP port does LDAP normally use? A. 389 B. 443 C. 636 D. 1812 Answer: A 36. What is the advantage of selecting the Auto-Allow option when creating file bookmarks? A. It allows users to create their own bookmarks and resource policies without contacting the IVE administrator.

www.Prepking.com

B. The IVE will create the resource policies for any of the file bookmarks that the user creates using the admin GUI. C. It allows the user to create resource policies, but only if the complementary option "User can add bookmarks" is selected. D. It allows Windows and NFS shares to be automatically mounted during the sign-in process. Answer: B 37. Assuming there are no default Web resource policies, you create a Web bookmark for the URL http://*acme.net/* without selecting any other options. You then select the Save Changes button. Which statement is true? A. You are not able to access any of the servers in acme.net nor any subdirectories. B. You receive an error because you have not configured enough information to have the IVE accept the data. C. You are able to access all servers and sub-folders within any domain that contains the word cme.?You are able to access all servers and sub-folders within any domain that contains the word ?cme. D. You are only able to access those http servers with the domain name of acme.net, all sub-domains, and sub-directories of those Web sites. Answer: A 38. You are configuring J-SAM for a customer. The user has administrative access to the workstation. You have properly configured the SAM access control policy. Which additional role option must be turned on for J-SAM to work properly? A. session start script B. automatic host-mapping C. user can add applications D. prompt for username and password for intranet sites Answer: B 39. Which three are required when defining Sign-in Policies? (Choose three.) A. sign-in URL B. sign-in page C. authorization server D. authentication server E. authentication realm Answer: ABE 40. Two resource policies cover the same resource. The first policy is a Permit Policy and the second policy is a Deny Policy. Which policy takes precedence and why? A. The first policy takes precedence because it is a Permit Policy.

www.Prepking.com

100% Pass Guaranteed or Full Refund Word to Word Real Exam Questions from Real Test Buy full version of exam from this link below http://www.prepking.com/JN0-562.htm

Anda mungkin juga menyukai