多选题Which two B-RAS service offerings maintain the analog dial-up model with centralized user authentication,authorization,andaccounting?()ARouted1483BBridged1483CPPPoverATMDPPPoverEthernet

题目
多选题
Which two B-RAS service offerings maintain the analog dial-up model with centralized user authentication,authorization,andaccounting?()
A

Routed1483

B

Bridged1483

C

PPPoverATM

D

PPPoverEthernet


相似考题
更多“多选题Which two B-RAS service offerings maintain the analog dial-up model with centralized user authentication,authorization,andaccounting?()ARouted1483BBridged1483CPPPoverATMDPPPoverEthernet”相关问题
  • 第1题:

    Which two methods of authentication are used by the Infranet Controller for IPSec enforcement?()

    A. dial-up VPN

    B. IKE authentication

    C. XAuth authentication

    D. shared IKE authentication


    参考答案:A, C

  • 第2题:

    Which two items does a user object in the UCS system contain?()

    • A、Authentication and Authorization credentials
    • B、Microsoft Active Directory credentials
    • C、LDAP assignment
    • D、Role assignment

    正确答案:A,D

  • 第3题:

    What are two steps to configure user authentication for a Junos Pulse Access Control Service?()

    • A、Configure an authentication policy as part of the user role definitions.
    • B、Configure a Sign-in Policy.
    • C、Configure authentication agents as part of the user role definitions
    • D、Configure an authentication policy as part of the authentication realm definition.

    正确答案:B,D

  • 第4题:

    Which two statements are true regarding firewall user authentication?() (Choose two.)

    • A、When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.
    • B、When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.
    • C、If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .
    • D、If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.

    正确答案:B,C

  • 第5题:

    Which two methods of authentication are used by the Infranet Controller for IPSec enforcement?()

    • A、dial-up VPN
    • B、IKE authentication
    • C、XAuth authentication
    • D、shared IKE authentication

    正确答案:A,C

  • 第6题:

    Which two external authentication server types are supported by JUNOS Software for firewall user authentication?()

    • A、RADIUS
    • B、TACACS+
    • C、LDAP
    • D、IIS

    正确答案:A,C

  • 第7题:

    多选题
    Which two traffic types trigger pass-through firewall user authentication?()
    A

    SSH

    B

    Telnet

    C

    ICMP

    D

    OSPF

    E

    HTTP


    正确答案: D,E
    解析: 暂无解析

  • 第8题:

    多选题
    Which two statements are true regarding firewall user authentication?() (Choose two.)
    A

    When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.

    B

    When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.

    C

    If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .

    D

    If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.


    正确答案: D,A
    解析: 暂无解析

  • 第9题:

    多选题
    What are two steps to configure user authentication for a Junos Pulse Access Control Service?()
    A

    Configure an authentication policy as part of the user role definitions.

    B

    Configure a Sign-in Policy.

    C

    Configure authentication agents as part of the user role definitions

    D

    Configure an authentication policy as part of the authentication realm definition.


    正确答案: B,D
    解析: 暂无解析

  • 第10题:

    多选题
    Which two B-RAS service offerings maintain the analog dial-up model with centralized user authentication,authorization,andaccounting?()
    A

    Routed1483

    B

    Bridged1483

    C

    PPPoverATM

    D

    PPPoverEthernet


    正确答案: D,A
    解析: 暂无解析

  • 第11题:

    多选题
    Which two external authentication methods are supported by the Junos OS for user authentication?()
    A

    RADIUS

    B

    KERBEROS

    C

    LDAP

    D

    TACACS+


    正确答案: A,D
    解析: 暂无解析

  • 第12题:

    多选题
    Which two external authentication server types are supported by JUNOS Software for firewall user authentication?()
    A

    RADIUS

    B

    TACACS+

    C

    LDAP

    D

    IIS


    正确答案: B,D
    解析: 暂无解析

  • 第13题:

    Which two B-RAS service offerings do not require user authentication?()

    A.Routed 1483

    B.Bridged 1483

    C.PPP over ATM

    D.PPP over Ethernet


    参考答案:A, B

  • 第14题:

    What is not a difference between VPN tunnel authentication and per-user authentication?()

    • A、VPN tunnel authentication is part of the IKE specification. 
    • B、VPN tunnel authentication does not control which end user can use the IPSec SA (VPN tunnel).
    • C、User authentication is used to control access for a specific user ID, and can be used with or without a VPN tunnel for network access authorization. 
    • D、802.1X with EAP-TLS (X.509 certificates) can be used to authenticate an IPSec tunnel.

    正确答案:D

  • 第15题:

    Which two B-RAS service offerings do not require user authentication?()

    • A、Routed 1483
    • B、Bridged 1483
    • C、PPP over ATM
    • D、PPP over Ethernet

    正确答案:A,B

  • 第16题:

    Which two external authentication methods are supported by the Junos OS for user authentication?()

    • A、RADIUS
    • B、KERBEROS
    • C、IPsec
    • D、TACACS+

    正确答案:A,D

  • 第17题:

    Which two B-RAS service offerings maintain the analog dial-up model with centralized user authentication,authorization,andaccounting?()

    • A、Routed1483
    • B、Bridged1483
    • C、PPPoverATM
    • D、PPPoverEthernet

    正确答案:C,D

  • 第18题:

    A Windows Communication Foundation (WCF) service is required to log all authorization attempts to the Windows Event Log. You need to configure a behavior and apply it to the service to support this requirement. Which behavior should you configure and apply?()

    • A、service Authentication Manager
    • B、service Authorization
    • C、service Credentials
    • D、service Security Audit

    正确答案:D

  • 第19题:

    多选题
    Which two items does a user object in the UCS system contain?()
    A

    Authentication and Authorization credentials

    B

    Microsoft Active Directory credentials

    C

    LDAP assignment

    D

    Role assignment


    正确答案: B,D
    解析: 暂无解析

  • 第20题:

    多选题
    Which two statements regarding firewall user authentication client groups are true?() (Choose two.)
    A

    A client group is a list of clients associated with a group.

    B

    A client group is a list of groups associated with a client.

    C

    Client groups are referenced in security policy in the same manner in which individual clients are referenced.

    D

    Client groups are used to simplify configuration by enabling firewall user authentication without security policy.


    正确答案: D,A
    解析: 暂无解析

  • 第21题:

    多选题
    Which two B-RAS service offerings do not require user authentication?()
    A

    Routed 1483

    B

    Bridged 1483

    C

    PPP over ATM

    D

    PPP over Ethernet


    正确答案: A,B
    解析: 暂无解析

  • 第22题:

    多选题
    Which two ports are used with RADIUS authentication and authorization?()
    A

    UDP port 1812

    B

    UDP port 2000

    C

    TCP port 2002

    D

    UDP port 1645


    正确答案: C,D
    解析: 暂无解析

  • 第23题:

    多选题
    Which two firewall user authentication objects can be referenced in a security policy?()
    A

    access profile

    B

    client group

    C

    client

    D

    default profile


    正确答案: D,A
    解析: 暂无解析

  • 第24题:

    多选题
    Which two commands can be used to monitor firewall user authentication?()
    A

    show access firewall-authentication

    B

    show security firewall-authentication users

    C

    show security audit log

    D

    show security firewall-authentication history


    正确答案: C,D
    解析: 暂无解析