更多“多选题Which three authentication server types are supported for retrieving user attributes used in role- mapping rules?()ALDAPBS/KeyCTACACS+DRADIUSESiteMinder”相关问题
  • 第1题:

    Which three user authentication methods are supported by the Junos OS?()

    A. RADIUS

    B. CHAP

    C. local user database

    D. TACACS+

    E. PAP


    参考答案:A, C, D

  • 第2题:

    An administrator has created three different Odyssey Access Client preconfiguration files and assigned them to three different roles in the same realm.Which action should the administrator take to ensure that users get the correct Odyssey Access Client preconfiguration file?()

    • A、Configure each user account in the auth server with the appropriate Odyssey Access Client preconfiguration files.
    • B、Configure the role-mapping rules with the appropriate Odyssey Access Client preconfiguration files.
    • C、Ensure that merge roles is selected in the role-mapping rules.
    • D、Ensure that the first role a user is mapped to is the role with the appropriate Odyssey Access Client preconfiguration file.

    正确答案:D

  • 第3题:

    Which two statements regarding external authentication servers for firewall userauthentication are true?()

    • A、Up to three external authentication server types can be used simultaneously.
    • B、Only one external authentication server type can be used simultaneously.
    • C、If the local password database is not configured in the authentication order, and the configured authentication server is unreachable, authentication is not performed.
    • D、If the local password database is not configured in the authentication order, and the configured authentication server rejects the authentication request, authentication is not performed

    正确答案:B,D

  • 第4题:

    Which additional configuration must be completed when setting up role restrictions using certificates? ()

    • A、Set up a certificate authentication server.
    • B、Configure the authentication realm to remember certificate information.
    • C、Configure the authentication realm to use a certificate server for authentication.
    • D、Configure a role mapping rule requiring certification information to map user to role.

    正确答案:B

  • 第5题:

    Which two statements regarding external authentication servers for firewall user authentication are true?() (Choose two.)

    • A、Up to three external authentication server types can be used simultaneously.
    • B、Only one external authentication server type can be used simultaneously.
    • C、If the local password database is not configured in the authentication order, and the configured authentication server  bypassed.
    • D、If the local password database is not configured in the authentication order, and the configured authentication server authentication is rejected.

    正确答案:B,D

  • 第6题:

    You are configuring an LDAP authentication server, and you want to configure role-mapping rules based on group membership. When you attempt to search for groups in the server catalog, no groups appear.Assuming the LDAP server is reachable and functioning properly, in the admin GUI. Which two parts of the configuration should you verify are correct?()

    • A、Finding user entries
    • B、Authentication required
    • C、LDAP Server Type
    • D、Determining group membership

    正确答案:B,D

  • 第7题:

    多选题
    On which three traffic types does firewall pass-through authentication work? ()(Choose three.)
    A

    ping

    B

    FTP

    C

    Telnet

    D

    HTTP

    E

    HTTPS


    正确答案: A,E
    解析: 暂无解析

  • 第8题:

    多选题
    Which three authentication server types are supported for retrieving user attributes used in role- mapping rules?()
    A

    LDAP

    B

    S/Key

    C

    TACACS+

    D

    RADIUS

    E

    SiteMinder


    正确答案: C,E
    解析: 暂无解析

  • 第9题:

    多选题
    Which two statements regarding external authentication servers for firewall userauthentication are true?()
    A

    Up to three external authentication server types can be used simultaneously.

    B

    Only one external authentication server type can be used simultaneously.

    C

    If the local password database is not configured in the authentication order, and the configured authentication server is unreachable, authentication is not performed.

    D

    If the local password database is not configured in the authentication order, and the configured authentication server rejects the authentication request, authentication is not performed


    正确答案: B,A
    解析: 暂无解析

  • 第10题:

    多选题
    You are configuring an LDAP authentication server, and you want to configure role-mapping rules based on group membership. When you attempt to search for groups in the server catalog, no groups appear.Assuming the LDAP server is reachable and functioning properly, in the admin GUI. Which two parts of the configuration should you verify are correct?()
    A

    Finding user entries

    B

    Authentication required

    C

    LDAP Server Type

    D

    Determining group membership


    正确答案: D,B
    解析: 暂无解析

  • 第11题:

    多选题
    Which three authentication resources are grouped within an authentication realm?()
    A

    Authentication enforcer

    B

    Directory server

    C

    Captive authentication

    D

    Authentication policy

    E

    Role-mapping rules


    正确答案: E,C
    解析: 暂无解析

  • 第12题:

    多选题
    Which two external authentication methods are supported by the Junos OS for user authentication?()
    A

    RADIUS

    B

    KERBEROS

    C

    LDAP

    D

    TACACS+


    正确答案: A,D
    解析: 暂无解析

  • 第13题:

    An authentication realm consists of which three authentication resources?()

    • A、Authentication server
    • B、Session options
    • C、Authentication policy
    • D、End-point security policy
    • E、Role-mapping rules

    正确答案:A,C,E

  • 第14题:

    Which three authentication server types are supported for retrieving user attributes used in role- mapping rules?()

    • A、LDAP
    • B、S/Key
    • C、TACACS+
    • D、RADIUS
    • E、SiteMinder

    正确答案:A,D,E

  • 第15题:

    Which two external authentication server types are supported by JUNOS Software for firewall user authentication?()

    • A、RADIUS
    • B、TACACS+
    • C、LDAP
    • D、IIS

    正确答案:A,C

  • 第16题:

    Which three authentication resources are grouped within an authentication realm?()

    • A、Authentication enforcer
    • B、Directory server
    • C、Captive authentication
    • D、Authentication policy
    • E、Role-mapping rules

    正确答案:B,D,E

  • 第17题:

    Which three user authentication methods are supported by the Junos OS?()

    • A、RADIUS
    • B、CHAP
    • C、local user database
    • D、TACACS+
    • E、PAP

    正确答案:A,C,D

  • 第18题:

    Whitch three user authentication methos are supported by the Junos OS?()

    • A、RADIUS
    • B、CHAP
    • C、local user database
    • D、tacacs+
    • E、PAP

    正确答案:A,C,D

  • 第19题:

    多选题
    Whitch three user authentication methos are supported by the Junos OS?()
    A

    RADIUS

    B

    CHAP

    C

    local user database

    D

    tacacs+

    E

    PAP


    正确答案: C,A
    解析: 暂无解析

  • 第20题:

    多选题
    Which three server types are supported for the installation of Cisco CRS?()
    A

    Cisco MCS 78xx servers

    B

    Dell PowerEdge servers

    C

    HP DL Cisco certified servers

    D

    Acer Altos servers

    E

    IBM xSeries Cisco certified servers

    F

    Apple servers


    正确答案: F,E
    解析: 暂无解析

  • 第21题:

    多选题
    Which two statements regarding external authentication servers for firewall user authentication are true?() (Choose two.)
    A

    Up to three external authentication server types can be used simultaneously.

    B

    Only one external authentication server type can be used simultaneously.

    C

    If the local password database is not configured in the authentication order, and the configured authentication server  bypassed.

    D

    If the local password database is not configured in the authentication order, and the configured authentication server authentication is rejected.


    正确答案: B,A
    解析: 暂无解析

  • 第22题:

    多选题
    An authentication realm consists of which three authentication resources?()
    A

    Authentication server

    B

    Session options

    C

    Authentication policy

    D

    End-point security policy

    E

    Role-mapping rules


    正确答案: B,D
    解析: 暂无解析

  • 第23题:

    多选题
    Which three user authentication methods are supported by the Junos OS?()
    A

    RADIUS

    B

    CHAP

    C

    local user database

    D

    TACACS+

    E

    PAP


    正确答案: A,C
    解析: 暂无解析

  • 第24题:

    多选题
    Which two external authentication server types are supported by JUNOS Software for firewall user authentication?()
    A

    RADIUS

    B

    TACACS+

    C

    LDAP

    D

    IIS


    正确答案: B,D
    解析: 暂无解析