Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Juniper JN0-561 Exam - Cheat-Test.com

Free JN0-561 Sample Questions:

Q: 1 Which model does not support clustering?
A. SA700
B. SA2000
C. SA4000
D. SA6000
Answer: A

Q: 2 What is a disadvantage of using Core Access?
A. has limited auditing
B. has no kiosk access
C. has limited resource access
D. requires administrator privileges on user machines to function
Answer: C

Q: 3 Which three statements are true about the configuration of an LDAP Authentication Server on the IVE? (Choose three.)
A. LDAP can be used for both authentication and authorization purposes.
B. LDAP Authentication Server cannot provide password management capabilities like AD/NT.
C. You can use an LDAP Authentication Server to do LDAP accounting as well as authentication.
D. To use the password management feature you must select the appropriate LDAP server type from the pull down menu.
E. If you want to enable password management on any LDAP server, you need to provide an administrator account (with write privileges to the directory) for the Admin DN.
Answer: A, D, E

Q: 4 Which two Web Resource Policy features provide you with the capability to configure the IVE to work with corporate Proxy Servers? (Choose two.)
A. Cache Policies
B. Selective Rewriting
C. Web Proxy Policies
D. Web Proxy Servers
Answer: C, D

Q: 5 When can the Host Checker feature be invoked by the IVE? (Choose three.)
A. when the user logs out of the IVE
B. before the login page is presented
C. when assigning users to a Realm
D. only after the sign-in page is displayed
E. before allowing access to a particular resource
Answer: B, C, E

Q: 6 Which three statements are true about the Host Checker feature? (Choose three.)
A. Host Checker can be used to check the age of a file on a client system.
B. Host Checker can be invoked before a user is allowed to sign in to the IVE.
C. Host Checker can be used to check the presence of a particular file on a client system.
D. Host Checker can verify the client certificate being offered by the client system via a Certificate Revocation List (CRL) check.
Answer: A, B, C

Q: 7 When creating Web bookmarks for a User Role, what two are examples of URL variables that can provide personalization based on user attributes? (Choose two.)
A. http://*.golf.local/*
B. http://intranet/<USER>
C. http://intranet/<userAttr.dept>
D. http://erp.golf.local/<GROUPNAME>
Answer: B, C

Q: 8 Which two types of Digital Certificates are used by the IVE? (Choose two.)
A. Client Certificates
B. LDAP Certificates
C. Server Certificates
D. RADIUS Certificates
Answer: A, C

Q: 9 You want your users to be able to browse to any SSL-enabled Web site behind the IVE. All necessary certificates have been loaded. What do you need to do to accomplish this? (Choose three.)
A. set the ewrite file:// URLs option in the resource policy
B. set the "Allow users to type URLs" option in the User Role
C. set the "Allow browsing untrusted SSL servers" option in the User Role
D. configure a resource policy to allow access to all addresses using port 443
E. configure a resource policy to allow access to all addresses using protocol SSL
Answer: B, C, D

Q: 10 Which two combinations of Authentication Servers and Directory Servers are valid? (Choose two.)
A. Authentication Server: IVE
Directory Server: LDAP
B. Authentication Server: LDAP
Directory Server: AD/NT
C. Authentication Server: RADIUS
Directory Server: LDAP
D. Authentication Server: AD/NT
Directory Server: RADIUS
Answer: A, C

Q: 11 Two resource policies cover the same resource. The first policy resource definition is not as specific as the second policy.
Which resource policy takes precedence and why?
A. The first policy takes precedence because it is the first match in the rule list and first match stops processing.
B. The second policy takes precedence because it is most specific and the system works on longest match.
C. The second policy takes precedence because all rules are always evaluated and the last match it finds controls the action.
D. The second policy takes precedence. Unless you specify that the first rule is marked to stop processing, the system continues to check for matches until it reaches the last match and it takes that rule's action.
Answer: A

Q: 12 What makes RADIUS unique from the other Authentication Servers that the IVE can utilize?
A. It can be used to obtain User attributes.
B. It can be used to obtain Group information.
C. It can be used to do Accounting as well as Authentication.
D. It can be used as both a Directory Server and an Authentication Server.
Answer: C

Q: 13 Cache Cleaner is enabled in the default configuration.
What will it clear from the users system when the IVE session is over?
A. nothing
B. all temporary Internet files
C. all content downloaded through the IVE's rewriter engine
D. all cached usernames and passwords from the browser
Answer: C

Q: 14 You are configuring J-SAM for customer access to a client/server application. The user has administrative access to his workstation. You have properly configured the SAM access control policy.
Which additional option must be turned on under User > Roles> [ROLE] > for J-SAM to work properly?
A. Session Start Script
B. Automatic Host-mapping
C. User Can Add Applications
D. Prompt for Username and Password for Intranet Sites
Answer: B

Q: 15 You are using LDAP as your Directory Server.
Which two options are available for creating role mapping rules? (Choose two.)
A. User Attribute
B. LDAP Attributes
C. Group Membership
D. CA Certificate Attributes
Answer: A, C

Q: 16 What is the function of the Sign-in Policy?
A. It controls whether or not a user can sign-in, based on role membership.
B. It controls which options are available on the login screen, based on the user's permissions.
C. It controls who can access the login page, based on IP address, certificate information, Host Checker and other criteria.
D. It defines the URLs that users and administrators can use to access the IVE and what Sign-in Page is associated with those URLs.
Answer: D

Q: 17 Auto Allow is a feature that can be activated when creating which component in the IVE?
A. roles
B. realms
C. bookmarks
D. Authentication Servers
Answer: C

Q: 18 What are two limitations of J-SAM? (Choose two.)
A. scalable deployment
B. transparent network traversal
C. does not support UDP-based applications
D. operating system and/or Java Virtual Machine compatibility issues
Answer: C, D

Q: 19 Which resource file format should you use to define resource access via Network Connect?
A. server[/path]
B. \\server[\share[\path]]
C. [protocol://]host[:ports]
D. [protocol://]host[:ports][/path]
Answer: C

Q: 20 Which three troubleshooting tools are available from the console? (Choose three.)
A. ping
B. log filters
C. trace route
D. policy simulation
E. view ARP cache
Answer: A, C, E

Q: 21 When using the custom application feature of W-SAM to redirect traffic, you configure the name of the Windows executable and optionally the MD5 hash of that file.
What happens if the MD5 hash value does not match the checksum value of the executable?
A. W-SAM notifies the user that the checksum could not be validated and shuts down completely.
B. W-SAM notifies the user that the checksum could not be validated, but forwards connections from the application anyway.
C. W-SAM does not notify the user that the checksum verification has failed, but forwards connections from the application anyway.
D. W-SAM notifies the user that the identity of the application could not be verified and does not forward connections from the application to the IVE.
Answer: D

Q: 22 Which log contains information about service restarts, system errors and warnings, and session timeouts?
A. Event log
B. System log
C. User Access log
D. Admin Access log
Answer: A

Q: 23 Which SSL secured protocol does the IVE not ntercept?using the Content Intermediation Engine (Core Access)?
A. SFTP
B. SPOP
C. HTTPS
D. SSMTP
Answer: A

Q: 24 Which two can be configured via User Roles? (Choose two.)
A. new users
B. session options
C. access features
D. Authentication Server
E. detailed resource policies
Answer: B, C

Q: 25 Which statement is true about selecting "User can add bookmarks" when configuring Options under "Creating bookmarks for Windows or UNIX files"?
A. when users create bookmarks they automatically get access to the underlying resources.
B. when users create bookmarks they do not automatically get access to the underlying resources. You must manually grant access to that resource.
C. when users create too many bookmarks, the IVE gateway will remove any bookmarks created an administrator
D. when users misconfigure bookmarks and the bookmarks take them to a broken site, they could get locked out of the IVE
Answer: B

Q: 26 Why should you use W-SAM rather than J-SAM for a customer? (Choose two.)
A. W-SAM has a smaller client.
B. W-SAM is not dependent on one operating system.
C. W-SAM provides multiple configuration options to capture application traffic.
D. W-SAM can be used when you know the name of the application executable, but not the ports that the application uses.
Answer: C, D

Q: 27 Which three statements about IPSec VPNs are true? (Choose three.)
A. IPSec VPNs are simple to deploy.
B. IPSec VPNs are standards-based.
C. IPSec VPNs provide a dedicated, always-on connection.
D. IPSec encryption, data integrity, and authentication methods are well known.
Answer: B, C, D

Q: 28 What happens when you disable the split-tunneling option for Network Connect?
A. All network traffic from the client goes through the Network Connect tunnel.
B. The local route table may be modified during the Network Connect session.
C. You must specify the Network Connect networks to which traffic must be routed through the IVE.
D. The IVE preserves the local subnet route on the client, retaining access to local resources such as printers. The local route table may be modified during the Network Connect session.
Answer: A

Q: 29 You configure a User Role to load a specific start page rather than the IVE bookmark page. What else do you need to do to allow the user to access the page?
A. You need to create a bookmark for the page to allow access.
B. You need to create a resource policy for the page to allow access.
C. You do not need to do anything. The default Web access resource policy will grant access.
D. You do not need to do anything. If the page is a start page, access is automatically granted.
Answer: B

Q: 30 Which filter properly searches an AD/NT server directory via LDAP for the user login name and compares it to the user's IVE login name?
A. cn=<USERNAME>
B. cn=<samaccountname>
C. samaccountname=<NAME>
D. samaccountname=<USERNAME>
Answer: D


© 2014 Cheat-Test.com, All Rights Reserved