Braindumps of JN0-140
Certified Internet Associate (JNCIA-AC) 140 Exam
Exam Questions, Answers, Braindumps (JN0-140)
The exam is tough but the guide from www.exams.ws
was really helpful.
Which two methods of authentication are used by the
Infranet Controller for IPSec enforcement? (Choose
A. dial-up VPN
B. IKE authentication
C. XAuth authentication
D. shared IKE authentication
Answer: A, C
What will serve as a RADIUS Client to the Infranet
Controller for 802.1x authentication?
A. an ACE server
B. a wireless network
C. an Ethernet switch
D. Odyssey Access Client
If Host Checker restrictions are applied at the role
level and the "Allow access to the role if any
ONE of the select policies is passed" option
is unchecked, which two statements are true? (Choose
A. All roles are evaluated together.
B. Each role is evaluated separately.
C. Clients must pass all policies to access the role.
D. Clients will pass as long as one policy is accepted.
Answer: B, C
Which additional configuration must be completed when
setting up role restrictions using certificates?
A. Set up a certificate authentication server.
B. Configure the authentication realm to remember
C. Configure the authentication realm to use a certificate
server for authentication.
D. Configure a role mapping rule requiring certification
information to map user to role.
What happens when Host Checker is configured to perform
checks every "0" minutes?
A. Host Checker is disabled.
B. Host Checker will perform continous checks.
C. Host Checker will perform checks when user logs
D. Host Checker will perform checks when user first
Your company has a mix of employees and contractors.
Contractor usernames always begin with "con-";
employee usernames never begin with "con-".
You need to give employees access to all resources
and give contractors access to a limited set of resources.
Employee and contractor roles have been created with
the appropriate access privileges, and the realm is
set to merge settings for all assigned roles. Which
role mapping ruleset would result in the correct access
privileges being assigned?
A. username="*" -> Employee-role
Stop username="con-*" -> Contractor-role
B. username="*" -> Employee-role username="con-*"
-> Contractor-role Stop
C. username="con-*" -> Contractor-role
Stop username="*" -> Employee-role
D. username="con-*" -> Contractor-role
username="*" -> Employee-role Stop
Which Infranet Enforcer CLI command shows users that
were authenticated using the Infranet Controller?
A. get policy id #
B. get auth table
C. get admin auth table
D. set -n infranet policy command "get all"
Which three are required when defining Sign-in Policies?
A. sign-in URL
B. sign-in page
C. authorization server
D. authentication server
E. authentication realm
Answer: A, B, E