Which of the following are NOT required in an active/active cluster? (Choose two.)
A. A virtual IP address (VIP) configured on the PCS
B. An external load balancer
C. IP connectivity between nodes
D. All nodes having IP addresses in the same IP subnet
Connection set connection options allow for configuration of which option?
A. User configuration
B. User access
C. Endpoint security
D. List of Connection URLs
Which option is NOT supported when defining an Active Directory server?
A. Domain/NetBIOS Name
B. Directory filter
C. Kerberos realm
D. Container path
True or False: Meeting (MTG) license is not required for the Pulse Collaboration feature.
A. true
B. false
Which two elements do detailed resource policy rules contain? (Choose two.)
A. role
B. resources
C. rule name
D. action
During the login process user attributes can be collected from where?
A. LDAP
B. SNMP
C. LLDP
D. CDP
E. PROFILER
What important condition must be met for Kerberos SSO to function?
A. NTLM protocol sync
B. User access compatibility
C. CA Certificate authentication to Active Directory
D. Time sync between Connect Secure and Active Directory
What tool determines polices applied on the user for a given realm?
A. Policy Tracing
B. Simulation
C. Session Recording
D. System Snapshot
E. Monitoring
True or False: Reserved Lease Duration can be customized.
A. true
B. false
Which is a correct statement about Host Checker Statement of Health rules?
A. Can only be applied to Macintosh endpoints.
B. Can only be applied when running Pulse Client.
C. Can only be applied to Microsoft endpoints.
D. Can only be applied when Host Checker is installed.
E. Can only be applied to Linux endpoints.
For how many days will a PCS continue to work if the license server is not working (grace period)?
A. 10
B. 20
C. 30
D. 40
True or False: Cloud Secure functionality is integrated into PCS.
A. true
B. false
Pulse Policy Secure supports multiple authentication servers including: (Choose three.)
A. Active Directory
B. Local servers
C. LDAP
D. RADIUS
E. XForce
Which methods of access can be used to support clientless access to internal systems using the Telnet protocol? (Choose two.)
A. Telnet.exe
B. Core Java
C. Core HTML5
D. Pulse SAM
Possible Pulse SAM customizations include: (Choose two.)
A. User can Add Applications
B. Supported Applications
C. Server Initiated connections
D. Destination IPs/Subnets