多选题Which two statements regarding firewall user authentication client groups are true?() (Choose two.)AA client group is a list of clients associated with a group.BA client group is a list of groups associated with a client.CClient groups are referenced i

题目
多选题
Which two statements regarding firewall user authentication client groups are true?() (Choose two.)
A

A client group is a list of clients associated with a group.

B

A client group is a list of groups associated with a client.

C

Client groups are referenced in security policy in the same manner in which individual clients are referenced.

D

Client groups are used to simplify configuration by enabling firewall user authentication without security policy.


相似考题
更多“多选题Which two statements regarding firewall user authentication client groups are true?() (Choose two.)AA client group is a list of clients associated with a group.BA client group is a list of groups associated with a client.CClient groups are referenced i”相关问题
  • 第1题:

    You are configuring an LDAP authentication server, and you want to configure role-mapping rules based on group membership. When you attempt to search for groups in the server catalog, no groups appear.Assuming the LDAP server is reachable and functioning properly, in the admin GUI. Which two parts of the configuration should you verify are correct?()

    A. Finding user entries

    B. Authentication required

    C. LDAP Server Type

    D. Determining group membership


    参考答案:B, D

  • 第2题:

    Which three statements are true about load-based Call Admission Control?()

    • A、grants a VoWLAN client-initiated call based on the number of active clients associated to the accesspoint
    • B、grants a VoWLAN client-initiated call based on channel bandwidth capacity
    • C、uses the 802.11i specification
    • D、uses 802.11 action frames
    • E、requires a WMM-enabled client

    正确答案:B,D,E

  • 第3题:

    Which two statements are true regarding firewall user authentication?() (Choose two.)

    • A、When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.
    • B、When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.
    • C、If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .
    • D、If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.

    正确答案:B,C

  • 第4题:

    Given the configuration shown in the exhibit, which configuration object would be used to associate bothNancy and Walter with firewall user authentication within a security policy?() profile ftp-users { client nancy { firewall-user { password "$9$lJ8vLNdVYZUHKMi.PfzFcyrvX7"; ## SECRET-DATA } } client walter { firewall-user { password "$9$a1UqfTQnApB36pBREKv4aJUk.5QF"; ## SECRET-DATA } } session-options { client-group ftp-group; } } firewall-authentication { pass-through { default-profile ftp-users;ftp { banner { login "JUNOS Rocks!"; } } } }

    • A、ftp-group
    • B、ftp-users
    • C、firewall-user
    • D、nancy and walter

    正确答案:A

  • 第5题:

    Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)

    • A、access profile
    • B、client group
    • C、client
    • D、default profile
    • E、external

    正确答案:A,B,C

  • 第6题:

    You are a system administrator at Company. The network includes 100 Windows 2000 Professional computers. A user named Peter wants to share a local printing device directly connected to his computer. Peter needs to share this device among three groups:  Engineering, Accounting, and Operations. Peter wants to delegate printer administration to one print administrator from each group. Each print administrator must be able to delete print jobs generated by their own group on the print device. They should not be able to delete print jobs from other groups. You want to configure Peter’s client computer to support these requirements.  What should you do? ()

    • A、 Create a single shared printer to be used by all three groups.Allow each print administrator Manage Documents permission. 
    • B、 Create a separate shared printer for each group. For each shared printer, allow the respective      print administrator Manage Documents permission. 
    • C、 Create a single shared printer to be used by all three groups. Add the print administrator’s user      account from each group to the Power Users group on Peter’s client computer. 
    • D、 Create a separate shared printer for each group. Add the print administrator’s user account  from each group to the Power Users group on Peter’s client computer. 

    正确答案:B

  • 第7题:

    You need to design a security strategy that will ensure that unauthorized users cannot access personnel data. Your solution must comply with security requirements and the company’s new administrative model.What should you do?()

    • A、In the Default Domain Policy Group Policy object (GPO) for the corp.woodgrovebank.com domain, add the LA/HRUsers group to the Restricted Groups list. Add only the HR department user accounts to the Allowed Members list
    • B、In the Default Domain Policy Group Policy object (GPO) for the la.corp.woodgrovebank.com domain, add the LA/HRUsers group to the Restricted Groups list. Add only the HR department user accounts to the Allowed Members list
    • C、In the Default Domain Policy Group Policy object (GPO) for the corp.woodgrovebank.com domain, add the LA/HRUsers group and the CORP/Backup Operators group to the Restricted Groups list. Add only the HR department user accounts and the administrator user accounts to the Allowed Members list for each group
    • D、In the Default Domain Policy Group Policy object (GPO) for the la.corp.woodgrovebank.com domain, add the LA/HRUsers group and the CORP/Backup Operators group to the Restricted Groups list. Add only the HR department user accounts to the Allowed Members list for the LA/HRUsers group. Add only the administrator user accounts to the Allowed Members list for the CORP/Backup Operators group

    正确答案:B

  • 第8题:

    单选题
    Refer to the exhibit. A Cisco Aironet Wireless LAN Client Adapter has been installed and configured through the ADU on the PC. The Aironet System Tray Utility (ASTU) has been enabled during the installation and the icon appears in the system tray area in the lower right of the desktop. What is thesignificance of the icon?()
    A

    It indicates that the radio of the client adapter is disabled

    B

    It indicates that the client adapter is not associated to an access point or another client

    C

    It indicates that the client adapter is associated to an access point or another client, but the user is not EAP authenticated

    D

    It indicates that the client adapter is associated to an access point or another client, that the user is authenticated if the client adapter is configured for EAP authentication, and that the signal strength is excellent or good

    E

    It indicates that the client adapter is associated to an access point or another client, that the user is authenticated if the client adapter is configured for EAP authentication, and that the signal strength is fair

    F

    It indicates that the client adapter is associated to an access point or another client, that the user is authenticated if the client adapter is configured for EAP authentication, and that the signal strength is poor


    正确答案: F
    解析: 暂无解析

  • 第9题:

    多选题
    Which two statements regarding firewall user authentication client groups are true?()
    A

    Individual clients are configured under client groups in the configuration hierarchy.

    B

    Client groups are configured under individual clients in the configuration hierarchy.

    C

    Client groups are referenced in security policy in the same manner in which individual clients are referenced.

    D

    Client groups are used to simplify configuration by enabling firewall user authentication without security policy.


    正确答案: C,D
    解析: 暂无解析

  • 第10题:

    多选题
    Which two statements are true regarding redundancy groups? ()(Choose two.)
    A

    When priority settings are equal and the members participating in a cluster are initialized at the same time, the primary assigned to node 0.

    B

    The preempt option determines the primary and secondary roles for redundancy group 0 during a failure and recovery

    C

    Redundancy group 0 manages the control plane failover between the nodes of a cluster.

    D

    The primary role can be shared for redundancy group 0 when the active-active option is enabled.


    正确答案: A,D
    解析: 暂无解析

  • 第11题:

    多选题
    Which two statements are true regarding firewall user authentication?() (Choose two.)
    A

    When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.

    B

    When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.

    C

    If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .

    D

    If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.


    正确答案: D,A
    解析: 暂无解析

  • 第12题:

    多选题
    Which two statements regarding external authentication servers for firewall user authentication are true?() (Choose two.)
    A

    Up to three external authentication server types can be used simultaneously.

    B

    Only one external authentication server type can be used simultaneously.

    C

    If the local password database is not configured in the authentication order, and the configured authentication server  bypassed.

    D

    If the local password database is not configured in the authentication order, and the configured authentication server authentication is rejected.


    正确答案: B,A
    解析: 暂无解析

  • 第13题:

    Which two statements regarding firewall user authentication client groups are true?() (Choose two.)

    • A、A client group is a list of clients associated with a group.
    • B、A client group is a list of groups associated with a client.
    • C、Client groups are referenced in security policy in the same manner in which individual clients are referenced.
    • D、Client groups are used to simplify configuration by enabling firewall user authentication without security policy.

    正确答案:B,C

  • 第14题:

    Which two firewall user authentication objects can be referenced in a security policy?()

    • A、access profile
    • B、client group
    • C、client
    • D、default profile

    正确答案:B,C

  • 第15题:

    Which two statements regarding firewall user authentication client groups are true?()

    • A、Individual clients are configured under client groups in the configuration hierarchy.
    • B、Client groups are configured under individual clients in the configuration hierarchy.
    • C、Client groups are referenced in security policy in the same manner in which individual clients are referenced.
    • D、Client groups are used to simplify configuration by enabling firewall user authentication without security policy.

    正确答案:B,C

  • 第16题:

    Which two statements regarding external authentication servers for firewall user authentication are true?() (Choose two.)

    • A、Up to three external authentication server types can be used simultaneously.
    • B、Only one external authentication server type can be used simultaneously.
    • C、If the local password database is not configured in the authentication order, and the configured authentication server  bypassed.
    • D、If the local password database is not configured in the authentication order, and the configured authentication server authentication is rejected.

    正确答案:B,D

  • 第17题:

    You are configuring an LDAP authentication server, and you want to configure role-mapping rules based on group membership. When you attempt to search for groups in the server catalog, no groups appear.Assuming the LDAP server is reachable and functioning properly, in the admin GUI. Which two parts of the configuration should you verify are correct?()

    • A、Finding user entries
    • B、Authentication required
    • C、LDAP Server Type
    • D、Determining group membership

    正确答案:B,D

  • 第18题:

    You need to recommend a solution for managing administrative rights for the branch office client computers. The solution must meet the companys technical requirements.What should you recommend configuring?()

    • A、Account Policies by using GPOs
    • B、Local Users and Groups by using Group Policy preferences
    • C、Restricted Groups by using GPOs
    • D、Security Options by using Group Policy preferences

    正确答案:B

  • 第19题:

    单选题
    Given the configuration shown in the exhibit, which configuration object would be used to associate bothNancy and Walter with firewall user authentication within a security policy?() profile ftp-users { client nancy { firewall-user { password "$9$lJ8vLNdVYZUHKMi.PfzFcyrvX7"; ## SECRET-DATA } } client walter { firewall-user { password "$9$a1UqfTQnApB36pBREKv4aJUk.5QF"; ## SECRET-DATA } } session-options { client-group ftp-group; } } firewall-authentication { pass-through { default-profile ftp-users;ftp { banner { login "JUNOS Rocks!"; } } } }
    A

    ftp-group

    B

    ftp-users

    C

    firewall-user

    D

    nancy and walter


    正确答案: A
    解析: 暂无解析

  • 第20题:

    多选题
    Which three statements are true about load-based Call Admission Control?()
    A

    grants a VoWLAN client-initiated call based on the number of active clients associated to the accesspoint

    B

    grants a VoWLAN client-initiated call based on channel bandwidth capacity

    C

    uses the 802.11i specification

    D

    uses 802.11 action frames

    E

    requires a WMM-enabled client


    正确答案: A,D
    解析: 暂无解析

  • 第21题:

    单选题
    Refer to the exhibit. A Cisco Aironet Wireless LAN Client Adapter has been installed and configured  through the ADU on the PC. The Aironet System Tray Utility (ASTU) has been enabled during the  installation and the icon appears in the system tray area in the lower right of the desktop. What is the  significance of the icon?()
    A

     It indicates that the radio of the client adapter is disabled.

    B

     It indicates that the client adapter is not associated to an access point or another client. 

    C

     It indicates that the client adapter is associated to an access point or another client, but the user is not  EAP authenticated.

    D

     It indicates that the client adapter is associated to an access point or another client, that the user is  authenticated if the client adapter is configured for EAP authentication, and that the signal strength is  excellent or good.

    E

     It indicates that the client adapter is associated to an access point or another client, that the user is  authenticated if the client adapter is configured for EAP authentication, and that the signal strength is fair.

    F

     It indicates that the client adapter is associated to an access point or another client, that the user is  authenticated if the client adapter is configured for EAP authentication, and that the signal strength is poor.


    正确答案: F
    解析: 暂无解析

  • 第22题:

    多选题
    Which two statements are true regarding L2TP? ()(Choose two.)
    A

    Tunnels are initiated by the LAC

    B

    Tunnels are initiated by the LNS

    C

    By default, subscriber authentication occurs on the LNS

    D

    By default, subscriber authentication occurs on the LAC


    正确答案: C,D
    解析: 暂无解析

  • 第23题:

    多选题
    Which two statements regarding firewall user authentication client groups are true?() (Choose two.)
    A

    A client group is a list of clients associated with a group.

    B

    A client group is a list of groups associated with a client.

    C

    Client groups are referenced in security policy in the same manner in which individual clients are referenced.

    D

    Client groups are used to simplify configuration by enabling firewall user authentication without security policy.


    正确答案: D,A
    解析: 暂无解析

  • 第24题:

    多选题
    You are configuring an LDAP authentication server, and you want to configure role-mapping rules based on group membership. When you attempt to search for groups in the server catalog, no groups appear.Assuming the LDAP server is reachable and functioning properly, in the admin GUI. Which two parts of the configuration should you verify are correct?()
    A

    Finding user entries

    B

    Authentication required

    C

    LDAP Server Type

    D

    Determining group membership


    正确答案: D,B
    解析: 暂无解析