REAL QUESTIONS SUBMIT MATERIAL ADVERTISE
Braindumps

Microsoft

Cisco

Citrix

CIW

CompTia

CWNA

Apple

Adobe

HP

Legato

Exin

Filemaker

Brocade

Ericsson

TIA

Veritas

ISEB

SCP

IISFA

ISM

OMG

Apc

Mile2

Foundry

Huawei

McData

Symantec

TeraData

RedHat

Solar Winds

Blue Coat

Riverbed

 

 
 
Click on name of dumper to view the dump
 
Aadi
 
 

 

Braindumps of JN0-140
Certified Internet Associate (JNCIA-AC) 140 Exam

 

Exam Questions, Answers, Braindumps (JN0-140)
The exam is tough but the guide from www.exams.ws was really helpful.


QUESTION 1
Which two methods of authentication are used by the Infranet Controller for IPSec enforcement? (Choose two.)
A. dial-up VPN
B. IKE authentication
C. XAuth authentication
D. shared IKE authentication
Answer: A, C


QUESTION 2
What will serve as a RADIUS Client to the Infranet Controller for 802.1x authentication?
A. an ACE server
B. a wireless network
C. an Ethernet switch
D. Odyssey Access Client
Answer: C

QUESTION 3
If Host Checker restrictions are applied at the role level and the "Allow access to the role if any ONE of the select policies is passed" option is unchecked, which two statements are true? (Choose two.)
A. All roles are evaluated together.
B. Each role is evaluated separately.
C. Clients must pass all policies to access the role.
D. Clients will pass as long as one policy is accepted.
Answer: B, C

QUESTION 4
Which additional configuration must be completed when setting up role restrictions using certificates?
A. Set up a certificate authentication server.
B. Configure the authentication realm to remember certificate information.
C. Configure the authentication realm to use a certificate server for authentication.
D. Configure a role mapping rule requiring certification information to map user to role.
Answer: B

QUESTION 5
What happens when Host Checker is configured to perform checks every "0" minutes?
A. Host Checker is disabled.
B. Host Checker will perform continous checks.
C. Host Checker will perform checks when user logs out.
D. Host Checker will perform checks when user first logs in.
Answer: D

QUESTION 6
Your company has a mix of employees and contractors. Contractor usernames always begin with "con-"; employee usernames never begin with "con-". You need to give employees access to all resources and give contractors access to a limited set of resources. Employee and contractor roles have been created with the appropriate access privileges, and the realm is set to merge settings for all assigned roles. Which role mapping ruleset would result in the correct access privileges being assigned?
A. username="*" -> Employee-role Stop username="con-*" -> Contractor-role
B. username="*" -> Employee-role username="con-*" -> Contractor-role Stop
C. username="con-*" -> Contractor-role Stop username="*" -> Employee-role
D. username="con-*" -> Contractor-role username="*" -> Employee-role Stop
Answer: C

QUESTION 7
Which Infranet Enforcer CLI command shows users that were authenticated using the Infranet Controller?
A. get policy id #
B. get auth table
C. get admin auth table
D. set -n infranet policy command "get all"
Answer: B

QUESTION 8
Which three are required when defining Sign-in Policies? (Choose three.)
A. sign-in URL
B. sign-in page
C. authorization server
D. authentication server
E. authentication realm
Answer: A, B, E

JN0-140

 

 

Braindumps Real exam questions and verified answers - 100% passing guarantee - cheap prices.

 

Free brain dumps Braindumps, notes, books for free

 

Braindumps and Exams - Instant download real exam questions - Passing guarantee.

Follow us on FaceBook
Braindumps on Facebook
 
 
 
 
 

CheckPoint

Linux

Novell

DB/2

Network Appliance

EC-Council

Nortel

McAfee

Juniper

ISACA

PMI

Sybase

EMC

HDI

SNIA

ISC

Sair

IBM

Lotus

Exam Express

3COM

BICSI

DeLL

Enterasys

Extreme Networks

Guidance Software

Computer Associates

Network General

SAS Institute

Alcatel Lucent

SeeBeyond

TruSecure

Polycom

Hyperion

Hitachi

Nokia

Fortinet

Vmware

Fujitsu

Tibco

Intel

PostgreSQLCE

BusinessObjects

RESSoftware

BlackBerry

AccessData

ICDL

Isilon

SAP

The Open Group

ACSM

Altiris

Avaya

Cognos

F5

Genesys

SDI

ACI

ASQ

Google

H3C

HIPAA

HRCI

SOA

IIBA

Zend