单项选择题
You are customizing the user interface options for the finance department in your organization. Users in the department are able to see a session counter on the Web interface of the Junos Pulse Access Control Service. The CFO is unable to see the session counter.Which explanation would cause this behavior?()
A. The CFO is mapped to the finance role, but the session counter was enabled prior to the role mapping.
B. The CFO is mapped to the finance role, but the session counter was enabled after the role mapping.
C. The CFO is mapped to the executive and finance roles, but the CFO was mapped to the executive role first, which does not have the session counter enabled.
D. The CFO is mapped to the executive and finance roles, but the CFO was mapped to the executive role last, which does not have the session counter enabled.
相关考题
-
单项选择题
When configuring resource access policies in a Junos Pulse Access Control Service device, which entry is permitted when defining the specific resources?()
A. Hostname
B. fully qualified domain name
C. IP address
D. address book entry -
单项选择题
Two MAG4610s are running in an active/passive cluster configuration. The system administrator is planning to apply a service package to the cluster.Which process should the administrator follow?()
A. Perform the upgrade on the active node of the cluster. When completed, the node reboots and then pushes the service package to the passive node automatically.
B. Perform the upgrade on the passive node of the cluster. When completed, the node reboots and then pushes the service package to the active node automatically.
C. On the clustering status page, disable the active node. Perform the upgrade on the disabled node. When completed and the node reboots, enable the node on the clustering status page.Repeat the process on the passive node.
D. On the clustering status page, disable the passive node. Perform the upgrade on the disabled node. When completed and the node reboots, enable the node on the clustering status page.Repeat the process on the active node. -
多项选择题
Without calling JTAC, which two troubleshooting tools on a MAG Series device would you use to identify the cause of an authentication failure?()
A. Remote Debugging
B. System Snapshot
C. User Access logs
D. Policy Tracing
