When configuring resource access policies in a Junos Pulse Access Control Service device, which entry is permitted when defining the specific resources?
Without calling JTAC, which two troubleshooting tools on a MAG Series device would you use to identify the cause of an authentication failure?
What information does the Junos Pulse Access Control Service provide to Security Threat Response Manager (STRM)? (Choose two
Which two actions must be performed to allow the new Junos Pulse Access Control Service to load the older version of firmware? (Choose two