JN0-355 Junos Pulse Secure Access, Specialist (JNCIS-SA)

JNCIS-SA Exam Objectives (Exam: JN0-355)

Overview
Components and elements
Component functions, interaction and relationships
Junos Pulse Gateway and Virtual Appliance product lines
Licensing
Deployment considerations and integration options
SSL, TLS and digital certificates overview
Access methods

Initial Configuration
Configure the basic elements of a Junos Pulse Secure Access Service environment
Initial configuration via CLI
Initial configuration via admin UI

Roles
Describe the concepts, operation and functionality of roles
Purpose of roles
Role mapping and merging
Customization of the end-user experience
Configure roles
Roles and role options

Policies and Profiles
Describe the concepts, operation and functionality of policies and profiles
Purpose of policies; policy types and elements
Purpose of profiles and profile types
Interrelationship and usage guidelines
Configure policies and profiles
Policies and policy options
Profiles and profile options

Authentication
Describe the authentication process for the Junos Pulse Secure Access Service
Authentication elements
Sign-in process
Digital certificates
Certificate validation process
Advanced authentication options
Configure authentication
Authentication servers
Authentication realms
Role mapping
Sign-in policies
Certificates
Advanced options

Client/Server Communications
Identify and describe client/server applications
WSAM
JSAM
VPN tunneling
Configure client/server applications
SAM
VPN tunneling

Junos Pulse Client
Describe the features, benefits and functionality of the Junos Pulse client
Components and features
Configure the Junos Pulse client
WSAM application access
VPN tunneling

Junos Pulse Collaboration
Describe the features, benefits and functionality of Junos Pulse Collaboration
Components and features
Deployment
Collaboration client
Scheduling meetings
Monitoring meetings
Configure Junos Pulse Collaboration
Collaboration configuration
Meeting options
Pulse Connection

Endpoint Security
Describe the concepts, operation and functionality of endpoint security
TNC architecture
Host Checker
Enhanced Endpoint Security (EES)
Secure Virtual Workspace (SVW)
Cache Cleaner
Enforcement
Configure endpoint security
Host Checker
Enhanced Endpoint Security (EES)
Secure Virtual Workspace (SVW)
Cache Cleaner

Virtualization
Describe the concepts, operation and functionality of virtualization in a Junos Pulse Secure Access Service environment
Concepts and components
Virtual appliances
Virtual Desktop Infrastructure
Configure virtualization
Licensing
Virtual desktops

High Availability
Describe the concepts and requirements for high availability in a Junos Pulse Secure Access Service environment
Clustering
Deployment options and considerations
Licensing
Configure high availability
Clustering configuration
Upgrades

Administration, Management and Troubleshooting
Demonstrate knowledge of how to manage and troubleshoot a Junos Pulse Secure Access Service environment
Configuration file management
Backup and archiving
Logging
System monitoring
Statistics
Policy tracing
Packet capture tools
Connectivity testing tools
Session recording
System snapshot
Client connectivity


QUESTION 1
Which two statements are correct regarding the MAG6611 Junos Pulse Gateway in an
active/active cluster configuration? (Choose two.)

A. Virtual IP (VIP) is available.
B. It supports up to two devices.
C. It supports up to four devices.
D. External load balancing is preferred.

Answer: C,D

Explanation:


QUESTION 2
What is the function of the smart caching setting within a Web caching policy?

A. to send the cache control compress header to the client
B. to remove the cache control headers from the origin server
C. to not modify the cache control header from the origin server
D. to send the appropriate cache control header based on Web content.

Answer: D

Explanation:


QUESTION 3
You have configured RADIUS authentication on the Junos Pulse Secure Access Service. Users
report that their authentication is rejected. The RADIUS administrator reports that the RADIUS
server requires a specific attribute that identifies the Junos Pulse Secure Access Service on the
RADIUS server.
In the Admin UI, which configuration parameter will address this issue?

A. Name
B. NAS-Identifier
C. RADIUS Server
D. Shared Secret

Answer: B

Explanation:


QUESTION 4
What are three benefits that resource profiles provide over resource policies? (Choose three.)

A. Resource profiles provide automatic mapping of users to roles.
B. Resource profiles provide a simplified process for creating bookmarks and resource policies.
C. One profile can be assigned to multiple roles.
D. Resource options can be customized for each profile.
E. Resource profiles provide a simplified process for configuring applications such as VPN
tunneling.

Answer: B,C,D

Explanation:


QUESTION 5
You must deploy VPN tunneling using Network Connect to multiple Microsoft Windows devices.
Due to access restrictions, the users do not have permission to install WSAM.
Which component resolves this issue?

A. Juniper Installer Service
B. Host Checker
C. third-party integrity measurement verifier
D. Windows Secure Application Manager scriptable launcher

Answer: A

Explanation:

Click here to view complete Q&A of JN0-355 exam
Certkingdom Review

MCTS Training, MCITP Trainnig

Best Cisco JN0-355 Certification, Cisco JN0-355 Training at certkingdom.com

Click to rate this post!
[Total: 0 Average: 0]

Leave a comment

(*) Required, Your email will not be published