killtestのJNCIA認定
JN0-140試験問題集
Juniper Networks資格の特徴
ネットワークの実務基盤を問う認定資格。ネットワーク技術業務において実務上共通して必須とされる顧客側の環境の理解と最適な環境へ導くための技術知識、問題解決能力が問われる。日本HPやマイクロソフトの認定資格などITベンダー資格試験と連携している。
1. Which two statements are true about applying Host Checker at the realm level? (Choose two.)
A. If Evaluate is checked then the client must pass policy to get the sign-in page.
B. If Evaluate is checked then the client can fail policy and still get the sign-in page.
C. If Require and Enforce is checked then the client must pass policy to get the sign-in page.
D. If Require and Enforce is checked then the client can fail policy and still get the sign-in page.
Answer: BC
2. Which log contains information about service restarts, system errors, warnings, and requests to check
server connectivity?
A. Events log
B. System log
C. User Access log
D. Admin Access log
Answer: A
3. Which statement is correct about defining an Infranet Enforcer for use as a RADIUS Client?
A. You do not need to configure a RADIUS client policy.
B. You must know the exact model number of the Infranet Enforcer.
C. You must specify the NACN password of the device in the RADIUS client policy.
D. You do not need to designate a location group to which the Infranet Enforcer will belong.
Answer: A
4. Which configuration option can be set either in the initial console menu or the Admin UI of the Infranet
Controller?
A. VLAN ID
B. Hostname
C. Domain name
D. Administrative timeout
Answer: C
5. What is the primary purpose of creating a Location Group Policy?
A. to associate more than one realm with an authentication server
B. to logically group network access devices and associate them with specific sign-in policies C. to allow
or prevent users from accessing resources in specific locations on the network
D. to define the URL that users of network access devices can use to access the Infranet Controller
Answer: B
6. What is true about the operation of the Infranet Enforcer?
A. It assigns users a set of roles.
B. It allows access based on auth table entries.
C. It verifies whether an endpoint meets security requirements.
D. It configures the UAC agent to allow or deny access to resources.
Answer: B
7. On a pre-existing OAC, which three options can the Infranet Controller overwrite when the user
accesses the Infranet Controller? (Choose three.)
A. SSID
B. login name
C. MAC address
D. wired adapters
E. encryption method
Answer: ADE
8. What must be updated regularly to detect the newest versions of personal firewalls on endpoints?
A. Infranet Enforcer firmware
B. Infranet Controller rollback software
C. Host Security Assessment Plug-in (HSAP)
D. Endpoint Security Assessment Plug-in (ESAP)
Answer: D