New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Pulse Secure PCS - Pulse Connect Secure (PCS): Administration and Configuration

Page: 2 / 3
Total 100 questions

Which protocol is used to exchange user session information between PCS and PPS in order to provide seamless cloud application for on-premise users?

A.

IKEv2

B.

HTTPS

C.

IF-MAP

D.

SAML

E.

SSH

Role-based restrictions can be based on which of the following?

A.

Source IP

B.

Browser

C.

Certificates

D.

Host Checker

E.

All of the above.

Which MDM solutions are supported by PCS? (Choose three.)

A.

AirWatch

B.

MobileIron

C.

Microsoft Intune

D.

Pulse Workspace

Pulse Client, operating at the network layer, has which attributes? (Choose three.)

A.

Uses Network adapter.

B.

Uses SSL/TLS and ESP transport.

C.

Supports SNMP MIB.

D.

Location Awareness

True or False: Roles are assigned to Sign-in Policies to determine the authentication method.

A.

true

B.

false

For how many days will a PCS continue to work if the license server is not working (grace period)?

A.

10

B.

20

C.

30

D.

40

Pulse VPN Tunneling role customizations include: (Choose two.)

A.

Tunnel traffic compression mode

B.

Application traffic bandwidth management

C.

Split-Tunneling mode

D.

Route Precedence mode

What PCS Element determines the access methods and services to be used and sets the appearance of the start page for agentless access?

A.

User Realm

B.

User Role

C.

Resource Policy

D.

Sign-in Policy

Which attribute type is NOT available for role mapping options?

A.

Username

B.

User attribute

C.

Group membership

D.

User function

The Event Log contains information about: (Choose two.)

A.

Meeting Events

B.

VPN Tunnel Events

C.

Connection Requests.

D.

Hourly updates on number of users signed in

E.

SAM/JAVA access