Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Juniper JN0-570 Exam - Cheat-Test.com

Free JN0-570 Sample Questions:

Q: 1 Which three statements are true regarding split-tunneling modes? (Choose three.)
A. Choosing "Enable Split Tunneling with route change monitor" allows Network Connect to update the routing table if a route change is detected.
B. Choosing "Disable Split Tunneling" forces all traffic through the Network Connect tunnel.
C. Choosing "Enable Split Tunneling" will modify routes on the client so that any networks defined in the split-tunneling policy are routed through Network Connect.
D. Choosing "Allow access to local subnet" will not modify the route table on the local client.
E. Choosing "Enable Split Tunneling with allowed access to local subnet" requires that local resources be defined in the Network Connect access control list.
Answer: B, C, E

Q: 2 What should you do when you need to create a meeting on demand to troubleshoot a client issue?
A. Schedule an on demand meeting that begins in 10 minutes.
B. Schedule an instant meeting through Secure Meeting.
C. Start up a support meeting.
D. Start a secure meeting through the Microsoft Outlook plug-in.
Answer: C

Q: 3 Which statement about CRLs is true?
A. CRLs are distributed automatically by the CA.
B. CDP can be used to automatically validate a CRL.
C. The base CRL contains only a subset of the certificates issued by a given CA.
D. CRLs contain the serial number, revocation date, and reason code for withdrawn certificates.
Answer: D

Q: 4 What does Cache Cleaner remove by default?
A. all content downloaded through the IVE Content Intermediation Engine during the user's IVE session
B. the files in the user's Recycle Bin and the Recent Documents list at the end of the user session
C. all temporary files created during the user's IVE session
D. any AutoComplete usernames or passwords used during the user's IVE session
Answer: A

Q: 5 Which three logs are used within the SA solution? (Choose three.)
A. Event log
B. System log
C. Client-Side log
D. User Access log
E. Security log
Answer: A, C, D

Q: 6 When conducting meetings with Secure Meeting, your users frequently complain about jitter in the video presentation. How might you attempt to improve performance?
A. Ensure that image compression is enabled on the IVE device's Secure Meeting configuration page.
B. Limit the presentation video size to 800x600 resolution on the IVE device's Secure Meeting configuration page.
C. Enable the Secure Meeting acceleration feature with the optional license upgrade.
D. Ensure that 32-bit presentations mode is not enabled on the IVE device's Secure Meeting configuration page.
Answer: D

Q: 7 Your company is rolling out Secure Meeting to assist the helpdesk in troubleshooting desktop issues. Which type of meeting should you enable on the SSL VPN?
A. scheduled meeting
B. technical meeting
C. support meeting
D. instant meeting
Answer: C

Q: 8 Which three variables can be used for a username in a custom expression? (Choose three.)
A. username
B. username1
C. username2
D. username[1]
E. username[2]
Answer: A, D, E

Q: 9 Which two statements about OCSP are true? (Choose two.)
A. The IVE device is an OCSP client.
B. OCSP requires the configuration of a CDP server.
C. OCSP requires the use of SSL to secure certificate validation.
D. OCSP provides real-time certificate verification.
Answer: A, D

Q: 10 Which three statements are correct when configuring delegated administrator access? (Choose three.)
A. Modify an existing admin URL.
B. Create a new user role.
C. Modify role mapping rules.
D. Specify role restrictions.
E. Select "delegated access" at the role level.
Answer: A, C, D

Q: 11 What are three content-types that the Web compression function can properly compress? (Choose three.)
A. text/plain (.txt)
B. text/html (.html, .htm)
C. application/visio (.vis)
D. application/ms-word (.doc)
E. bin/executable (.exe)
Answer: A, B, D

Q: 12 Which Single Sign-On (SSO) policy relies on the IVE domain name?
A. SAML
B. Headers/Cookies
C. Form POST
D. Basic Auth/NTLM
Answer: D

Q: 13 Which three configuration data items can you export with the XML Export function? (Choose three.)
A. user role mapping rules
B. policy tracing sessions
C. local users accounts
D. delegated administrator roles
E. IDP sensors
Answer: A, C, D

Q: 14 Which statement accurately describes resource profiles?
A. Resource profiles are a collection of resources and ACLs.
B. Resource profiles are where ACLs are set up for resources.
C. Resource profiles are a collection of resources and their descriptions.
D. Resource profiles are where the resources, roles, and ACLs are in one location.
Answer: D

Q: 15 You have just finished creating an IVS on your device. You can log in to your IVS but you cannot access any backend resources. What should you troubleshoot first?
A. Verify that you have associated your IVS to the correct virtual IP.
B. Verify that you have allocated enough users for your IVS.
C. Verify that you have associated your IVS to the correct VLAN.
D. Verify that you are not blocked because of an untrusted certificate on the IVS.
Answer: C

Q: 16 Which custom expression would allow users to login only during business hours (8:00AM to 5:00PM, Monday through Friday)?
A. (loginTime.day = (Mon - Fri) AND loginTime = (8:00AM - 5:00PM))
B. (loginTime.dayofWeek = (Mon - Fri) AND loginTime in (8:00AM - 5:00PM))
C. (loginTime.dayofWeek = (Mon - Fri) AND loginTime = (08:00 - 17:00))
D. (loginTime.Weekday = (Mon - Fri) AND loginTime in (08:00 - 17:00))
Answer: C

Q: 17 Which three proxy scenarios are supported by Network Connect when split tunneling is enabled? (Choose three.)
A. explicit proxy to get to the IVE device
B. support for a Winsock proxy client
C. explicit proxy to get to internal applications
D. PAC file to get to internal applications
E. automatic setting detection is configured in the client's browser
Answer: A, C, D

Q: 18 Which two are valid options for using CRLs to validate a user's certificate? (Choose two.)
A. Use LDAP to access the CDP.
B. Use the CDP specified in the CA certificate.
C. Use the CDP specified in the user certificate.
D. Use OCSP to access the CDP.
Answer: B, C

Q: 19 Which two are valid regarding the deployment of an active/active cluster? (Choose two.)
A. It allows you to keep configurations synchronized.
B. An external load balancing system is required.
C. It can be used to scale the total number of licensed users.
D. A virtual IP address must be configured on only one device.
Answer: A, B

Q: 20 Which ActiveX parameter rewrite option does the IVE support?
A. rewrite hostname and port
B. rewrite ClassID
C. rewrite cookies and headers
D. rewrite URL
Answer: D

Q: 21 What is a factory predefined format in the IVE logging system?
A. tab delimited
B. CSV
C. Webtrends Enhanced Log Format
D. World Wide Consortium of the Web
Answer: C

Q: 22 You would like to configure Host Checker to perform checks on your UNIX hosts. Which three options are available for host evaluation? (Choose three.)
A. ports
B. files
C. client-side permissions
D. processes
E. integrated third-party security products
Answer: A, B, D

Q: 23 Which two statements about Endpoint Security Assessment Plug-In (ESAP) are true? (Choose two.)
A. The plug-in is included in the IVE system software package.
B. The plug-in can be upgraded independently of the IVE system software package.
C. The plug-in can be automatically imported from the Juniper Networks staging site.
D. The plug-in can be configured to monitor that the virus definitions on the client are up to date.
Answer: A, B

Q: 24 Which series of steps describes the appropriate method for upgrading an active/passive cluster?
A. 1) upgrade master; 2) disable master; 3) reboot master; 4) enable backup; 5) upgrade backup; 6) enable backup
B. 1) disable master; 2) upgrade master; 3) enable master; 4) disable backup; 5) join backup
C. 1) disable backup; 2) upgrade backup; 3) enable backup; 4) disable master; 5) upgrade master; 6) enable master
D. 1) upgrade backup; 2) reboot backup; 3) upgrade master; 4) reboot master; 5) sync cluster
Answer: C

Q: 25 Which two statements are valid about support meetings? (Choose two.)
A. Support meetings can be created on demand.
B. Support meetings can be scheduled in advance.
C. Support meetings have all the advantages of Secure Meeting.
D. Support meetings are limited to two attendees.
Answer: A, D

Q: 26 Which statement about PKI is true?
A. PKI uses digital certificates to bind public keys to an entity.
B. PKI negotiates a secured connection between a client and a server.
C. PKI requires the use of a certificate authority and registration authority.
D. PKI specifies the use of a negotiated shared key.
Answer: A

Q: 27 You have correctly enabled meeting email notifications by defining the appropriate SMTP options on the IVE device's Secure Meeting configuration page. However, when new meetings are created, invitees do not receive the emails. What might be causing this problem?
A. The time is not synchronized between the IVE device and the SMTP server.
B. You have not specified the IVE device's fully qualified hostname on the Network configuration page.
C. You have chosen to "Hide attendee names" when specifying meeting options.
D. You have invited attendees with email addresses in a domain that is not registered on the Secure Meeting configuration page.
Answer: B

Q: 28 Which three statements about role mapping are true? (Choose three.)
A. Role mapping can be based on a user attribute value.
B. Role mapping can be configured first, before creating the actual roles.
C. Role mapping can be based on a certificate and its data.
D. Role mapping can be based on custom expressions.
E. Role mapping can be based on VLAN assignment.
Answer: A, C, D

Q: 29 You would like to configure your IVE device to provide a secure area for user access where all data is removed when the session is terminated. Which component of the Juniper Endpoint Defense Initiative provides this functionality?
A. Integrity Measurement Verifier
B. Cache Cleaner
C. Secure Virtual Workspace
D. Host Check Client Interface
Answer: C


© 2014 Cheat-Test.com, All Rights Reserved