Which two prerequisites should your IT Information security team consider about the authentication protocol set configuration at both the endpoint and the controller side?

Your company has deployed the Junos Pulse Access Control Service. Your IT information security
team needs the Host Checker feature enabled and enforced for all corporate users, along with
802.1X Layer 2 authentication using the Odyssey Access Client and the Junos Pulse client.
Which two prerequisites should your IT Information security team consider about the
authentication protocol set configuration at both the endpoint and the controller side? (Choose
two.)

Your company has deployed the Junos Pulse Access Control Service. Your IT information security
team needs the Host Checker feature enabled and enforced for all corporate users, along with
802.1X Layer 2 authentication using the Odyssey Access Client and the Junos Pulse client.
Which two prerequisites should your IT Information security team consider about the
authentication protocol set configuration at both the endpoint and the controller side? (Choose
two.)

A.
EAP-PEAP as the outer authentication protocol and EAP-MS-CHAPv2 as the inner
authentication protocol

B.
EAP-TTLS as the outer authentication protocol and EAP-JUAC as the inner authentication
protocol

C.
EAP-TTLS as the outer authentication protocol and EAP-MS-CHAPv2 as the inner
authentication protocol

D.
EAP-PEAP as the outer authentication protocol and EAP-JUAC as the inner authentication
protocol



Leave a Reply 0

Your email address will not be published. Required fields are marked *