What are three valid syntax configurations when configuring VPN Tunneling Access Control Resources? (Choose three.)
A. 10.1.1.0/24
B. http://10.1.1.0/24
C. tcp://*:80,443
D. icmp://*:80,443
E. udp://10.1.1.0/24
You are currently the administrator of a network which provisions secure remote access using the Junos Pulse Secure Access Service in an active/passive cluster. You want to upgrade both units in the cluster to Software Release 7.2. You want to ensure that secure remote access is maintained during the upgrade.
Which feature addresses this concern?
A. Central Manager
B. CL license
C. IP address takeover (IPAT)
D. virtual IP (VIP)
You must create a self-signed certificate during an initial install. What information must you provide? (Choose two.)
A. public key
B. certificate signing request
C. common name
D. organization name
You want to create a resource policy that permits access to multiple Web sites using wildcards.
Which two expressions meet the requirements for specifying the resources in this resource policy? (Choose two.)
A. http://site.mycompany.com
B. http://site%.mycompany.com
C. http://site*.mycompany.com
D. http://site!.mycompany.com
Junos Pulse Collaboration meeting creators want to search for and invite other Secure Access Service users to meetings. Which two types of authentication servers would be used? (Choose two.)
A. local authentication server
B. AD/NT authentication server
C. LDAP authentication server
D. RADIUS authentication server
A company needs their users to be able to access Windows terminal servers from a Macintosh OS X or Linux platform. Which license will satisfy this requirement?
A. Enhanced Endpoint Security
B. Virtual Appliance
C. Junos Pulse Collaboration Suite
D. Premier Java RDP Applet
Which two tasks would be performed during initial configuration of the Junos Pulse Secure Access Service? (Choose two.)
A. Configure external interface.
B. Create an administrator account.
C. Create user accounts.
D. Configure internal interface.
A user must communicate with a server-initiated connection through the Junos Pulse Secure Access Service. Which access method must be available to the user for this to be accomplished?
A. browser-based access
B. Network Layer access
C. Application Layer access
D. core access
Which two parameters are defined by a user role that customizes the appearance of the start page? (Choose two.)
A. file access
B. sign-in page layout
C. bookmarks
D. bookmark layout
Which anti-spyware functionality integrated with Host Checker will detect and remediate Windows endpoints?
A. Cache Cleaner
B. Enhanced Endpoint Security
C. Connection Control
D. Secure Virtual Workspace
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Juniper exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your JN0-355 exam preparations and Juniper certification application, do not hesitate to visit our Vcedump.com to find your solutions here.