Which two statements regarding external authentication servers for firewall user authentication are true?() (Choose two.)
第1题:
A. Tunnels are initiated by the LAC
B. Tunnels are initiated by the LNS
C. By default, subscriber authentication occurs on the LNS
D. By default, subscriber authentication occurs on the LAC
第2题:
Which two statements regarding firewall user authentication client groups are true?() (Choose two.)
第3题:
Which two commands can be used to monitor firewall user authentication?()
第4题:
Which statement about WSA user authentication is true?()
第5题:
Which two statements regarding external authentication servers for firewall userauthentication are true?()
第6题:
Which two statements are true regarding L2TP? ()(Choose two.)
第7题:
Which two external authentication servers are supported for administrative access to a Junos device?()
第8题:
Consider the Mysql Enterprise Audit plugin. Which statement is true when you identify a connection event that has used external authentication?()
第9题:
Tunnels are initiated by the LAC
Tunnels are initiated by the LNS
By default, subscriber authentication occurs on the LNS
By default, subscriber authentication occurs on the LAC
第10题:
a single WSA can have multiple LDAP realms
WSA supports LDAP but not NTLM
WSA supports NTLM but not LDAP
a single WSA can have up to two authentication realms: one for LDAP and for NTLM
第11题:
Up to three external authentication server types can be used simultaneously.
Only one external authentication server type can be used simultaneously.
If the local password database is not configured in the authentication order, and the configured authentication server bypassed.
If the local password database is not configured in the authentication order, and the configured authentication server authentication is rejected.
第12题:
The attribute STATUS is set to the string EXTERNAL_AUTH
The attribute PRIV_USER contains the username
The event type that is given in the attribute NAME is EXTERNAL_AUTH
There is no differentiation between native and external authentication events
External authentication is managed through external auditing logs
The PROXY_PRIV user shows a username if external authentication is used
第13题:
A. RADIUS
B. KERBEROS
C. IPsec
D. TACACS+
第14题:
Which two statements about authentication settings for DCNM-LAN are true? ()
第15题:
Which two statements are true regarding firewall user authentication?() (Choose two.)
第16题:
Which two external authentication methods are supported by the Junos OS for user authentication?()
第17题:
Which two external authentication server types are supported by JUNOS Software for firewall user authentication?()
第18题:
Which two statements are true regarding firewall user authentication?()
第19题:
Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)
第20题:
Which two statements are true about the roles in the Oracle database?()
第21题:
When configured for pass-through firewall user authentication, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.
When configured for Web firewall user authentication only, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.
If a JUNOS security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted to perform authentication.
If a JUNOS security device is configured for Web firewall user authentication, new sessions are automatically intercepted to perform authentication.
第22题:
Up to three external authentication server types can be used simultaneously.
Only one external authentication server type can be used simultaneously.
If the local password database is not configured in the authentication order, and the configured authentication server is unreachable, authentication is not performed.
If the local password database is not configured in the authentication order, and the configured authentication server rejects the authentication request, authentication is not performed
第23题:
A role can be granted to itself.
Roles are owned by the SYS user.
Roles can be granted to other roles.
A role cannot be assigned external authentication.
A role can contain both system and object privileges.