New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium Pulse Secure PPS Dumps Questions Answers

Page: 1 / 5
Total 120 questions

Pulse Policy Secure (PPS) Deployment Implementation and Configuration Questions and Answers

Question 1

Basic rule-level customization for landing pages include

Options:

A.

Logo

B.

Image

C.

Backround color

Buy Now
Question 2

when configuring LDAP, which information?

Options:

A.

Psw

B.

Admin DN

C.

Ip address

D.

Base DN

E.

Server name

Question 3

When you have a switch, how are the ways to configure the vlans?

Options:

A.

Trusted

B.

Trunk

C.

Access

D.

Untrusted

Question 4

When a node takes over the cluster VIP, it notifies other networking devices that now peers the vip by sending

Options:

A.

A message with a IP

B.

Notification

C.

A gratuitous ARP message

D.

Hello

Question 5

What layer of the OSI model does IPsec use?

Options:

A.

Layer 8

B.

Layer 3

C.

Layer 2

D.

Layer 7

Question 6

ICE license enable full box capacity when needed?

Options:

A.

False

B.

True

Question 7

Which system log type contains information about active sync proxy events?

Options:

A.

User Access

B.

Client Logs

C.

Event

Question 8

Cloud secure supported platforms

Options:

A.

MAC

B.

Dios

C.

Windows

D.

Chrome OS

E.

Andorid

Question 9

IF-MAP recognizes two metadata types that are similar to roles on the Pulse Policy Secure and SA:

Options:

A.

IF-MAP capabilities

B.

IF-MAP roles

C.

IF-MAP policy

D.

IF-MAP realm

Question 10

Host Checker policies are supported on which endpoint operating system?

Options:

A.

All

B.

Windows

C.

Android

D.

IOS

E.

Mac

Question 11

A resource access policy is assigned to an enforcer based on what criteria?

Options:

A.

Source IP address

B.

Radius Attri

C.

Sign-in Page

D.

User Realm

E.

User Role

Question 12

Cloud Secure integrates with :

Options:

A.

AirWatch

B.

Pulse Workspace

C.

Misrosoft Intune

D.

Mobilelron

Question 13

Which two characteristics apply to policy Secure Demonstration and training edition (DTE) virtual appliances?

Options:

A.

Can have licenses added to it

B.

Can upgrade the software

C.

Fully featured

D.

Only for 30 days

Question 14

Which steps must you complete to configure a cluster?

Options:

A.

Add IP Vip

B.

Modify cluster propreties

C.

Create cluster

D.

Join cluster

E.

Add member

Question 15

Which configuration elements are part of a Host checker Policy (2)

Options:

A.

Policy Rule

B.

Remediation setting

Question 16

You are deploying a VPN tunneling client and are asked to configure a restrictive set of tunneling policies. In the Admin UI, which two VPN Tunneling role settings apply? (Choose two.

Options:

A.

Split Tunneling

B.

Connection Settings

C.

VPN Tunneling Access Control

D.

Route Monitor

Question 17

HC policies can be enforced at the realm level or a role level, but can only be enabled for evaluation at

Options:

A.

Auth server

B.

Sign-in page

C.

Role

D.

Realm

E.

Sign-in policy

Question 18

To sniff network packets to add in support this tool?

Options:

A.

Remote debugging

B.

System snapshot

C.

Tcp dump

D.

Export XML

Page: 1 / 5
Total 120 questions