单选题What is a function of a user role?()A It defines the IPsec parameters for the role.B It assigns access to resources.C It associates the user with a RADIUS server.D It defines the types of authentication methods available to the user

题目
单选题
What is a function of a user role?()
A

It defines the IPsec parameters for the role.

B

It assigns access to resources.

C

It associates the user with a RADIUS server.

D

It defines the types of authentication methods available to the user


相似考题
更多“单选题What is a function of a user role?()A It defines the IPsec parameters for the role.B It assigns access to resources.C It associates the user with a RADIUS server.D It defines the types of authentication methods available to the user”相关问题
  • 第1题:

    Which user authentication methods are available in JUNOS?()

    A.MD5 and SHA

    B.RADIUS and TACACS only

    C.Local User Database

    D.Local user Database, RADIUS, and TACACS+


    参考答案:D

  • 第2题:

    Which information is contained in a AAA authentication method list?()

    • A、A pointer to the address where a RADIUS server can be located
    • B、A sequential list of user authentication methods
    • C、A description of what a user can execute on a router
    • D、The setup for the authentication phase on a router

    正确答案:B

  • 第3题:

    What is a function of a user role?()

    • A、It defines the IPsec parameters for the role.
    • B、It assigns access to resources.
    • C、It associates the user with a RADIUS server.
    • D、It defines the types of authentication methods available to the user

    正确答案:A

  • 第4题:

    A router has been configured with the authentication order settings shown below: [edit] user@host# show system authentication-order authentication-order [radius tacplus password]; The router also has a local database that contains the user lab with password lab123. What would happen if both the RADIUS and the TACACS servers respond with a reject for user lab?()

    • A、The user lab will not be able to login.
    • B、The user lab will be authenticated against the local database and will be able to login.
    • C、The user will be able to login only if tries to login as the root user.
    • D、The user lab will receive an error message indicating the username and password provided could not be found on the radius and tacacs servers.

    正确答案:B

  • 第5题:

    Which statement describes the Authentication Proxy feature?()

    • A、All traffic is permitted from the inbound to the outbound interface upon successful authentication of the user.
    • B、A specific access profile is retrieved from a TACACS+ or RADIUS server and applied to an IOS Firewall based on user provided credentials.
    • C、Prior to responding to a proxy ARP,the router will prompt the user for a login and password which are authenticated based on the configured AAA policy.
    • D、The proxy server capabilities of the IOS Firewall are enabled upon successful authentication of the user.

    正确答案:B

  • 第6题:

    You manage Hyper-V host servers and virtual machines (VMs) by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You grant a user the Delegated Administrator user role. You need to provide the user with the ability to manage VMs through the VMM Self-Service Portal. What should you do?()

    • A、In VMM, grant the user the Self-Service user role.
    • B、In VMM, grant the user the Administrator user role.
    • C、Enable the Integrated Windows Authentication option for the VMM Self-Service Portal.
    • D、Enable the Single sign-on for Terminal Services option for the VMM Self-Service Portal.

    正确答案:A

  • 第7题:

    单选题
    Click the Exhibit button. What is the cause of the error shown in the exhibit?()
    A

    A RADIUS request is being received from a device that is not configured on the RADIUS Client page.

    B

    A user entered an incorrect password during RADIUS authentication.

    C

    A RADIUS proxy attempt failed to reach the configured proxy server.

    D

    The RADIUS shared secret is incorrect.


    正确答案: B
    解析: 暂无解析

  • 第8题:

    单选题
    A router has been configured with the authentication order settings shown below: [edit] user@host# show system authentication-order authentication-order [radius tacplus password]; The router also has a local database that contains the user lab with password lab123. What would happen if both the RADIUS and the TACACS servers respond with a reject for user lab?()
    A

    The user lab will not be able to login.

    B

    The user lab will be authenticated against the local database and will be able to login.

    C

    The user will be able to login only if tries to login as the root user.

    D

    The user lab will receive an error message indicating the username and password provided could not be found on the radius and tacacs servers.


    正确答案: A
    解析: 暂无解析

  • 第9题:

    单选题
    Which information is contained in a AAA authentication method list?()
    A

    A pointer to the address where a RADIUS server can be located

    B

    A sequential list of user authentication methods

    C

    A description of what a user can execute on a router

    D

    The setup for the authentication phase on a router


    正确答案: A
    解析: 暂无解析

  • 第10题:

    单选题
    Which statement describes the Authentication Proxy feature?()
    A

    All traffic is permitted from the inbound to the outbound interface upon successful authentication of the user.

    B

    A specific access profile is retrieved from a TACACS+ or RADIUS server and applied to an IOS Firewall based on user provided credentials.

    C

    Prior to responding to a proxy ARP,the router will prompt the user for a login and password which are authenticated based on the configured AAA policy.

    D

    The proxy server capabilities of the IOS Firewall are enabled upon successful authentication of the user.


    正确答案: C
    解析: 暂无解析

  • 第11题:

    多选题
    Which three user authentication methods are supported by the Junos OS?()
    A

    RADIUS

    B

    CHAP

    C

    local user database

    D

    TACACS+

    E

    PAP


    正确答案: A,C
    解析: 暂无解析

  • 第12题:

    单选题
    Your company has a single Active Directory directory service domain. All servers in your environment run Windows Server 2003. You have a stand-alone server that serves as a Stand-alone root certification authority (CA). You need to ensure that a specific user can back up the CA and configure the audit parameters on the CA.  What should you do?()
    A

     Assign the user account to the CA Admin role.

    B

     Add the user account to the local Administrators group.

    C

     Grant the user the Back up files and directories user right.

    D

     Grant the user the Manage auditing and security log user right.


    正确答案: D
    解析: 暂无解析

  • 第13题:

    In the fields of physical security and information security, access control is the selective restriction of access to a place or other resource. The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization (授权).
    An access control mechanism (71) between a user (or a process executing on behalf of a user) and system resources, such as applications, operating systems, firewalls, routers, files, and databases. The system must first authenticate(验证)a user seeking access. Typically the authentication function determines whether the user is (72) to access the system at all. Then the access control function determines if the specific requested access by this user is permitted. A security administrator maintains an authorization database that specifies what type of access to which resources is allowed for this user. The access control function consults this database to determine whether to(73)access. An auditing function monitors and keeps a record of user accesses to system resources.
    In practice, a number of(74)may cooperatively share the access control function. All operating systems have at least a rudimentary(基本的), and in many cases a quite robust, access control component. Add-on security packages can add to the(75)access control capabilities of the OS. Particular applications or utilities, such as a database management system, also incorporate access control functions. External devices, such as firewalls, can also provide access control services.

    A.open
    B.monitor
    C.grant
    D.seek

    答案:C
    解析:
    在物理安全和信息安全领域,访问控制是对一个地方或其他资源的访问限制。访问的行为可能意味着消费、输入或使用。允许访问资源被称为授权。
    访问控制机制连接用户(代表用户执行的进程)和系统资源(如应用程序、操作系统、防火墙、路由器、文件和数据库)之间的连接。系统必须首先对用户进行身份验证。通常,身份验证功能决定用户是否被允许访问系统。然后,访问控制功能决定是否允许该用户指定的访问权限。安全管理员维护一个授权数据库,该数据库指定允许该用户访问哪些资源的类型。访问控制函数咨询此数据库以确定是否授予访问权。审计功能监视并保存用户访问系统资源的记录。
    在实践中,一些用户可以合作共享访问控制函数。所有操作系统都至少有一个基本的,而且在许多情况下是一个相当健壮的访问控制组件。附加安全包可以添加到操作系统的自动访问控制功能。特定的应用程序或实用程序,如数据库管理系统,也包括访问控制功能。外部设备,如防火墙,也可以提供访问控制服务。

  • 第14题:

    What is not a difference between VPN tunnel authentication and per-user authentication?()

    • A、VPN tunnel authentication is part of the IKE specification. 
    • B、VPN tunnel authentication does not control which end user can use the IPSec SA (VPN tunnel).
    • C、User authentication is used to control access for a specific user ID, and can be used with or without a VPN tunnel for network access authorization. 
    • D、802.1X with EAP-TLS (X.509 certificates) can be used to authenticate an IPSec tunnel.

    正确答案:D

  • 第15题:

    What are two steps to configure user authentication for a Junos Pulse Access Control Service?()

    • A、Configure an authentication policy as part of the user role definitions.
    • B、Configure a Sign-in Policy.
    • C、Configure authentication agents as part of the user role definitions
    • D、Configure an authentication policy as part of the authentication realm definition.

    正确答案:B,D

  • 第16题:

    Chomsky defines “competence” as the ideal user’s k()of the rules of his language.


    正确答案:knowledge

  • 第17题:

    Which user authentication methods are available in JUNOS?()

    • A、MD5 and SHA
    • B、RADIUS and TACACS only
    • C、Local User Database
    • D、Local user Database, RADIUS, and TACACS+

    正确答案:D

  • 第18题:

    Your company has a single Active Directory directory service domain. All servers in your environment run Windows Server 2003. You have a stand-alone server that serves as a Stand-alone root certification authority (CA). You need to ensure that a specific user can back up the CA and configure the audit parameters on the CA.  What should you do?()

    • A、 Assign the user account to the CA Admin role.
    • B、 Add the user account to the local Administrators group.
    • C、 Grant the user the Back up files and directories user right.
    • D、 Grant the user the Manage auditing and security log user right.

    正确答案:B

  • 第19题:

    多选题
    Which three authentication server types are supported for retrieving user attributes used in role- mapping rules?()
    A

    LDAP

    B

    S/Key

    C

    TACACS+

    D

    RADIUS

    E

    SiteMinder


    正确答案: C,E
    解析: 暂无解析

  • 第20题:

    单选题
    A router has been configured with the settings shown below: [edit] user@host# show system authentication-order authentication-order [ radius tacplus ]; The router also has a local database that contains the user lab with password lab123. What would happen if both the RADIUS and the TACACS servers are not accessible?()
    A

    The user lab will not be able to login.

    B

    The user lab will be authenticated against the local database and will be able to login.

    C

    The user lab will receive an error message indicating the router is unable to authenticate due to the authentication servers not responding.

    D

    The user will be able to login only if tries to login as the root user.


    正确答案: D
    解析: 暂无解析

  • 第21题:

    单选题
    Which backup option defines a user-defined name for a backup? ()
    A

    FORMAT

    B

    NAME

    C

    TAG

    D

    FORMAT U%


    正确答案: B
    解析: 暂无解析

  • 第22题:

    单选题
    What is not a difference between VPN tunnel authentication and per-user authentication?()
    A

    VPN tunnel authentication is part of the IKE specification. 

    B

    VPN tunnel authentication does not control which end user can use the IPSec SA (VPN tunnel).

    C

    User authentication is used to control access for a specific user ID, and can be used with or without a VPN tunnel for network access authorization. 

    D

    802.1X with EAP-TLS (X.509 certificates) can be used to authenticate an IPSec tunnel.


    正确答案: A
    解析: 暂无解析

  • 第23题:

    单选题
    Which user authentication methods are available in JUNOS?()
    A

    MD5 and SHA

    B

    RADIUS and TACACS only

    C

    Local User Database

    D

    Local user Database, RADIUS, and TACACS+


    正确答案: A
    解析: 暂无解析