更多“Whitch three user authentication”相关问题
  • 第1题:

    Which three user authentication methods are supported by the Junos OS?()

    A. RADIUS

    B. CHAP

    C. local user database

    D. TACACS+

    E. PAP


    参考答案:A, C, D

  • 第2题:

    Which information is contained in a AAA authentication method list?()

    • A、A pointer to the address where a RADIUS server can be located
    • B、A sequential list of user authentication methods
    • C、A description of what a user can execute on a router
    • D、The setup for the authentication phase on a router

    正确答案:B

  • 第3题:

    Which two statements are true regarding firewall user authentication?() (Choose two.)

    • A、When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.
    • B、When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.
    • C、If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .
    • D、If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.

    正确答案:B,C

  • 第4题:

    What are three different integrated UTM components available on the branch SRX Series devices?() (Choose three.)

    • A、antivirus (full AV, express AV)
    • B、antivirus (desktop AV)
    • C、Web filtering
    • D、antispam
    • E、firewall user authentication

    正确答案:A,C,D

  • 第5题:

    Which three authentication resources are grouped within an authentication realm?()

    • A、Authentication enforcer
    • B、Directory server
    • C、Captive authentication
    • D、Authentication policy
    • E、Role-mapping rules

    正确答案:B,D,E

  • 第6题:

    Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)

    • A、access profile
    • B、client group
    • C、client
    • D、default profile
    • E、external

    正确答案:A,B,C

  • 第7题:

    Which three features are provided by Oracle Net Services? ()

    • A、Data encryption.
    • B、User authentication.
    • C、Transparent data conversion
    • D、Configuration and administration mechanisms.
    • E、Support for multiple network transport protocols.

    正确答案:C,D,E

  • 第8题:

    单选题
    Which statement accurately describes firewall user authentication?()
    A

    Firewall user authentication provides another layer of security in a network.

    B

    Firewall user authentication provides a means for accessing a JUNOS Software-based security device.

    C

    Firewall user authentication enables session-based forwarding.

    D

    Firewall user authentication is used as a last resort security method in a network.


    正确答案: A
    解析: 暂无解析

  • 第9题:

    多选题
    Which two statements are true regarding firewall user authentication?()
    A

    When configured for pass-through firewall user authentication, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.

    B

    When configured for Web firewall user authentication only, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.

    C

    If a JUNOS security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted to perform authentication.

    D

    If a JUNOS security device is configured for Web firewall user authentication, new sessions are automatically intercepted to perform authentication.


    正确答案: B,C
    解析: 暂无解析

  • 第10题:

    多选题
    Whitch three user authentication methos are supported by the Junos OS?()
    A

    RADIUS

    B

    CHAP

    C

    local user database

    D

    tacacs+

    E

    PAP


    正确答案: E,C
    解析: 暂无解析

  • 第11题:

    多选题
    Which two statements regarding external authentication servers for firewall user authentication are true?() (Choose two.)
    A

    Up to three external authentication server types can be used simultaneously.

    B

    Only one external authentication server type can be used simultaneously.

    C

    If the local password database is not configured in the authentication order, and the configured authentication server  bypassed.

    D

    If the local password database is not configured in the authentication order, and the configured authentication server authentication is rejected.


    正确答案: B,A
    解析: 暂无解析

  • 第12题:

    多选题
    Which three user authentication methods are supported by the Junos OS?()
    A

    RADIUS

    B

    CHAP

    C

    local user database

    D

    TACACS+

    E

    PAP


    正确答案: E,B
    解析: 暂无解析

  • 第13题:

    Whitch three user authentication methos are supported by the Junos OS?()

    A. RADIUS

    B. CHAP

    C. local user database

    D. tacacs+

    E. PAP


    参考答案:A, C, D

  • 第14题:

    What is not a difference between VPN tunnel authentication and per-user authentication?()

    • A、VPN tunnel authentication is part of the IKE specification. 
    • B、VPN tunnel authentication does not control which end user can use the IPSec SA (VPN tunnel).
    • C、User authentication is used to control access for a specific user ID, and can be used with or without a VPN tunnel for network access authorization. 
    • D、802.1X with EAP-TLS (X.509 certificates) can be used to authenticate an IPSec tunnel.

    正确答案:D

  • 第15题:

    Whitch three user authentication methos are supported by the Junos OS?()

    • A、RADIUS
    • B、CHAP
    • C、local user database
    • D、tacacs+
    • E、PAP

    正确答案:A,C,D

  • 第16题:

    Which three authentication server types are supported for retrieving user attributes used in role- mapping rules?()

    • A、LDAP
    • B、S/Key
    • C、TACACS+
    • D、RADIUS
    • E、SiteMinder

    正确答案:A,D,E

  • 第17题:

    Which two statements are true regarding firewall user authentication?()

    • A、When configured for pass-through firewall user authentication, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.
    • B、When configured for Web firewall user authentication only, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.
    • C、If a JUNOS security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted to perform authentication.
    • D、If a JUNOS security device is configured for Web firewall user authentication, new sessions are automatically intercepted to perform authentication.

    正确答案:B,C

  • 第18题:

    Which three user authentication methods are supported by the Junos OS?()

    • A、RADIUS
    • B、CHAP
    • C、local user database
    • D、TACACS+
    • E、PAP

    正确答案:A,C,D

  • 第19题:

    多选题
    Which three advanced permit actions within security policies are valid?() (Choose three.)
    A

    Mark permitted traffic for firewall user authentication.

    B

    Mark permitted traffic for SCREEN options.

    C

    Associate permitted traffic with an IPsec tunnel.

    D

    Associate permitted traffic with a NAT rule.

    E

    Mark permitted traffic for IDP processing.


    正确答案: E,A
    解析: 暂无解析

  • 第20题:

    多选题
    What are three different integrated UTM components available on the branch SRX Series devices?() (Choose three.)
    A

    antivirus (full AV, express AV)

    B

    antivirus (desktop AV)

    C

    Web filtering

    D

    antispam

    E

    firewall user authentication


    正确答案: A,B
    解析: 暂无解析

  • 第21题:

    多选题
    Which two statements are true regarding firewall user authentication?() (Choose two.)
    A

    When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.

    B

    When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.

    C

    If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .

    D

    If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.


    正确答案: D,A
    解析: 暂无解析

  • 第22题:

    多选题
    What are two steps to configure user authentication for a Junos Pulse Access Control Service?()
    A

    Configure an authentication policy as part of the user role definitions.

    B

    Configure a Sign-in Policy.

    C

    Configure authentication agents as part of the user role definitions

    D

    Configure an authentication policy as part of the authentication realm definition.


    正确答案: B,D
    解析: 暂无解析

  • 第23题:

    多选题
    Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)
    A

    access profile

    B

    client group

    C

    client

    D

    default profile

    E

    external


    正确答案: D,A
    解析: 暂无解析

  • 第24题:

    多选题
    Which three authentication server types are supported for retrieving user attributes used in role- mapping rules?()
    A

    LDAP

    B

    S/Key

    C

    TACACS+

    D

    RADIUS

    E

    SiteMinder


    正确答案: E,D
    解析: 暂无解析