It defines the IPsec parameters for the role.
It assigns access to resources.
It associates the user with a RADIUS server.
It defines the types of authentication methods available to the user
第1题:
A.MD5 and SHA
B.RADIUS and TACACS only
C.Local User Database
D.Local user Database, RADIUS, and TACACS+
第2题:
Which information is contained in a AAA authentication method list?()
第3题:
What is a function of a user role?()
第4题:
A router has been configured with the authentication order settings shown below: [edit] user@host# show system authentication-order authentication-order [radius tacplus password]; The router also has a local database that contains the user lab with password lab123. What would happen if both the RADIUS and the TACACS servers respond with a reject for user lab?()
第5题:
Which statement describes the Authentication Proxy feature?()
第6题:
You manage Hyper-V host servers and virtual machines (VMs) by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You grant a user the Delegated Administrator user role. You need to provide the user with the ability to manage VMs through the VMM Self-Service Portal. What should you do?()
第7题:
A RADIUS request is being received from a device that is not configured on the RADIUS Client page.
A user entered an incorrect password during RADIUS authentication.
A RADIUS proxy attempt failed to reach the configured proxy server.
The RADIUS shared secret is incorrect.
第8题:
The user lab will not be able to login.
The user lab will be authenticated against the local database and will be able to login.
The user will be able to login only if tries to login as the root user.
The user lab will receive an error message indicating the username and password provided could not be found on the radius and tacacs servers.
第9题:
A pointer to the address where a RADIUS server can be located
A sequential list of user authentication methods
A description of what a user can execute on a router
The setup for the authentication phase on a router
第10题:
All traffic is permitted from the inbound to the outbound interface upon successful authentication of the user.
A specific access profile is retrieved from a TACACS+ or RADIUS server and applied to an IOS Firewall based on user provided credentials.
Prior to responding to a proxy ARP,the router will prompt the user for a login and password which are authenticated based on the configured AAA policy.
The proxy server capabilities of the IOS Firewall are enabled upon successful authentication of the user.
第11题:
RADIUS
CHAP
local user database
TACACS+
PAP
第12题:
Assign the user account to the CA Admin role.
Add the user account to the local Administrators group.
Grant the user the Back up files and directories user right.
Grant the user the Manage auditing and security log user right.
第13题:
第14题:
What is not a difference between VPN tunnel authentication and per-user authentication?()
第15题:
What are two steps to configure user authentication for a Junos Pulse Access Control Service?()
第16题:
Chomsky defines “competence” as the ideal user’s k()of the rules of his language.
第17题:
Which user authentication methods are available in JUNOS?()
第18题:
Your company has a single Active Directory directory service domain. All servers in your environment run Windows Server 2003. You have a stand-alone server that serves as a Stand-alone root certification authority (CA). You need to ensure that a specific user can back up the CA and configure the audit parameters on the CA. What should you do?()
第19题:
LDAP
S/Key
TACACS+
RADIUS
SiteMinder
第20题:
The user lab will not be able to login.
The user lab will be authenticated against the local database and will be able to login.
The user lab will receive an error message indicating the router is unable to authenticate due to the authentication servers not responding.
The user will be able to login only if tries to login as the root user.
第21题:
FORMAT
NAME
TAG
FORMAT U%
第22题:
VPN tunnel authentication is part of the IKE specification.
VPN tunnel authentication does not control which end user can use the IPSec SA (VPN tunnel).
User authentication is used to control access for a specific user ID, and can be used with or without a VPN tunnel for network access authorization.
802.1X with EAP-TLS (X.509 certificates) can be used to authenticate an IPSec tunnel.
第23题:
MD5 and SHA
RADIUS and TACACS only
Local User Database
Local user Database, RADIUS, and TACACS+