Summer Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

PCS PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

PCS PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: Pulse Connect Secure (PCS): Administration and Configuration
  • Last Update: Sep 12, 2025
  • Questions and Answers: 100
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

PCS Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

PCS Practice Exam Questions with Answers Pulse Connect Secure (PCS): Administration and Configuration Certification

Question # 6

What is the Subject Name for Office 365 applications?

A.

Email Address

B.

sAMAccountName

C.

Objectguid

D.

Full Access
Question # 7

Which user role is configured by default?

A.

Users

B.

Partners

C.

Read Only Administrators

D.

Contractors

Full Access
Question # 8

What important condition must be met for Kerberos SSO to function?

A.

NTLM protocol sync

B.

User access compatibility

C.

CA Certificate authentication to Active Directory

D.

Time sync between Connect Secure and Active Directory

Full Access
Question # 9

Which of these Pulse hardware appliances support 4 unit clusters?

A.

PSA300

B.

PSA3000

C.

PSA5000

D.

PSA7000

Full Access
Question # 10

Which method of access can be used to support Microsoft Remote Desktop (RDP) access from internet kiosks?

A.

Microsoft RDP client

B.

Pulse SAM

C.

Core HTML5

D.

SAML

Full Access
Question # 11

Core web access provides support for which applications? (Choose three.)

A.

Java applications

B.

Web applications

C.

Point to Point applications

D.

HTML5 VDI

Full Access
Question # 12

True or False: Roles are assigned to Sign-in Policies to determine the authentication method.

A.

true

B.

false

Full Access
Question # 13

Pulse client provides support for which multi-factor authentication (MFA) vendor?

A.

Duo Security

B.

Microsoft

C.

RSA

D.

Google

E.

All of the above.

Full Access
Question # 14

Four PSA7000 devices form a multi-unit cluster. They each have 100 user licenses locally installed. If one device fails, how many users are supported by the remaining three live cluster members?

A.

100

B.

200

C.

300

D.

400

Full Access
Question # 15

When configuring a realm to require multiple sign-in credentials, which three are valid secondary authentication methods? (Choose three.)

A.

Active Directory

B.

Client certificate

C.

RADIUS

D.

LDAP

E.

Netegrity

Full Access
Question # 16

While browsing Web sites that are being rewritten by the PCS device, users encounter several SSL-enabled sites that appear to have invalid certificates. What are three ways that the administrator could configure the PCS device to respond? (Choose three.)

A.

The PCS device can allow access without warning the user.

B.

The PCS device displays only static content.

C.

The PCS device can warn the user and allow access.

D.

The PCS device can deny access to the site.

E.

The PCS device will present a remediation page with user options.

Full Access
Question # 17

How many vCPU are required to deploy PSA7000-V virtual appliance?

A.

2

B.

4

C.

6

D.

8

Full Access
Question # 18

Which of the following are valid methods of providing user licenses to a Pulse virtual appliance? (Choose two.)

A.

Configure the virtual appliance to retrieve unused licenses directly from a cluster of physical appliances on the same LAN network.

B.

Enter an auth code on the virtual appliance to retrieve a license from the Pulse Cloud License Server (PCLS).

C.

Lease a subscription license from a physical PSA appliance configured as a Pulse Secure License Server.

D.

Enter a license key directly on the virtual appliance which was previously used on a physical PSA appliance.

E.

No need to enter anything as licenses are not required for virtual appliances.

Full Access
Question # 19

During the login process user attributes can be collected from where?

A.

LDAP

B.

SNMP

C.

LLDP

D.

CDP

E.

PROFILER

Full Access
Question # 20

True or False: You can integrate MFA solution with a Cloud Secure SSO solution.

A.

true

B.

false

Full Access
Question # 21

To successfully connect to PCS, local authentication users:

A.

Submit a username and password that matches a Microsoft Active Directory server.

B.

Submit a digital certificate that matches a defined Certificate Authority.

C.

Submit a username and password that matches a PCS database.

D.

Submit a time-based, one-time password from their RSA SecurID software.

Full Access
Question # 22

Which Single Sign-On (SSO) policy relies on the Connect Secure domain name?

A.

Headers/Cookies

B.

Basic Auth/NTLM

C.

Form POST

D.

SAML

Full Access
Question # 23

Authentication Realms specify the authentication server, authentication policy, user directory/attribute store and what other element?

A.

Radius Attribute Policy

B.

Sign-in Notification

C.

Role-mapping Rules

D.

Authentication Protocol Set

Full Access
Question # 24

In the authentication process, after successfully validating the users credentials against the configured authentication server, what does Pulse Connect Secure do next?

A.

Evaluates Realm Host-Check policy.

B.

Begins the Authorization Process.

C.

Evaluates the certificate on the endpoint.

D.

Begins the Return Attribute Process

Full Access
Question # 25

Which methods of access can be used to support clientless access to internal systems using the Telnet protocol? (Choose two.)

A.

Telnet.exe

B.

Core Java

C.

Core HTML5

D.

Pulse SAM

Full Access
Question # 26

The following needs to be defined prior to configuring role-mapping:

A.

Sign-in Policies

B.

Authentication Servers

C.

Sign-in Notification

D.

User Roles

Full Access
Question # 27

A sign-in policy with multiple realms can be used and may require the user to do what?

A.

Define Realm based restrictions.

B.

Choose Role-based restrictions.

C.

Select a Realm from a list.

D.

Provide their IP Address.

Full Access
Question # 28

Which three statements about role mapping are true? (Choose three.)

A.

Role mapping can be based on a user attribute value.

B.

Role mapping can be configured first, before creating the actual roles.

C.

Role mapping can be based on VLAN assignment.

D.

Role mapping can be based on a certificate and its data.

E.

Role mapping can be based on custom expressions.

Full Access
Question # 29

What must you do to use OCSP to validate certificates?

A.

Configure the LDAP name of the OCSP server.

B.

Configure the chain back to the root CA.

C.

Ensure the OCSP server’s CA certificate is installed in the PCS.

D.

Validate the Trusted Client CA for the connection.

Full Access
Question # 30

True or False: Existing configurations can be used when enabling Cloud Secure functionality through Cloud Secure UX.

A.

true

B.

false

Full Access