Winter Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

To successfully connect to PPS remote authentication users can:

A.

Submit a username and password that matches PPS database

B.

Submit a username and password that matches Radius

C.

Submit a digital certificate that matches a defines certificate authority

D.

Submit a username and password that matches an active directory server

Full Access
Question # 5

Do you need a license to run if-map server?

A.

False

B.

True

Full Access
Question # 6

To enable identity aware connections for Fortinet. What device is requested?

A.

FortiProxy

B.

FortiGuard

C.

FortiAuthentificator

D.

FortiAnalyser

Full Access
Question # 7

Role based restrictions can be bases on which of the following?

A.

Certificates

B.

Attributes

C.

Host Checker

D.

Source Ip

E.

Browser

F.

Users

G.

Destiny Ip

Full Access
Question # 8

During the login process user attributes can be collected from:

A.

Nis

B.

Radius

C.

AD

D.

Ldap

Full Access
Question # 9

Maximum log size

A.

500 Mb

B.

400 Mb

C.

100 Mb

D.

200 Mb

Full Access
Question # 10

Pulse Secure supports google cloud deployment?

A.

True

B.

False

Full Access
Question # 11

Where is IF-MAP configured?

A.

PCS

B.

ALL

C.

PPS

Full Access
Question # 12

Do you need integration with pulse one to run MDM?

A.

False

B.

True

Full Access
Question # 13

can you see guest onbording link on /guest page?

A.

true

B.

false

Full Access
Question # 14

which is supported on Virtual platformed (private cloud):

A.

Hyper-V

B.

Virtual box

C.

Desx

D.

KVM

Full Access
Question # 15

PPS support client side logging for which features?

A.

Mac auth

B.

Host checker

C.

Active supplicant

D.

Pulse desktop client

Full Access
Question # 16

To sniff network packets to add in support this tool?

A.

Remote debugging

B.

System snapshot

C.

Tcp dump

D.

Export XML

Full Access
Question # 17

Configuring pulse profiler at the realm level allows what function?

A.

Gathering device attributes

B.

Endpoint security

C.

Gathering switch attribute

D.

Gathering user data

Full Access
Question # 18

Host checker statement of health rules allow for which?

A.

Antiviruse enabled

B.

Antispyware enabled

C.

Firewall Enabled

D.

All

E.

Automatic Updating Enabled

Full Access