多选题Which two statements regarding external authentication servers for firewall userauthentication are true?()AUp to three external authentication server types can be used simultaneously.BOnly one external authentication server type can be used simultaneou

题目
多选题
Which two statements regarding external authentication servers for firewall userauthentication are true?()
A

Up to three external authentication server types can be used simultaneously.

B

Only one external authentication server type can be used simultaneously.

C

If the local password database is not configured in the authentication order, and the configured authentication server is unreachable, authentication is not performed.

D

If the local password database is not configured in the authentication order, and the configured authentication server rejects the authentication request, authentication is not performed


相似考题
更多“多选题Which two statements regarding external authentication servers for firewall userauthentication are true?()AUp to three external authentication server types can be used simultaneously.BOnly one external authentication server type can be used simultaneou”相关问题
  • 第1题:

    Which one of these statements is true of OSPF type 5 LSAs? ()

    • A、 They are used to summarize area routes to other areas.
    • B、 They are used in not-so-stubby areas to propagate external routes.
    • C、 They are used to notify areas of the ASBR.
    • D、 They are flooded to all areas except stub areas (external route).

    正确答案:D

  • 第2题:

    Which two external authentication methods are supported by the Junos OS for user authentication?()

    • A、RADIUS
    • B、KERBEROS
    • C、IPsec
    • D、TACACS+

    正确答案:A,D

  • 第3题:

    Which two external authentication server types are supported by JUNOS Software for firewall user authentication?()

    • A、RADIUS
    • B、TACACS+
    • C、LDAP
    • D、IIS

    正确答案:A,C

  • 第4题:

    Which two external authentication servers are supported for administrative access to a Junos device?()

    • A、RADIUS
    • B、LDAP
    • C、ACE
    • D、TACACS+

    正确答案:A,D

  • 第5题:

    Consider the Mysql Enterprise Audit plugin. Which statement is true when you identify a connection event that has used external authentication?()

    • A、The attribute "STATUS" is set to the string EXTERNAL_AUTH
    • B、The attribute "PRIV_USER" contains the username
    • C、The event type that is given in the attribute "NAME" is EXTERNAL_AUTH
    • D、There is no differentiation between native and external authentication events
    • E、External authentication is managed through external auditing logs
    • F、The "PROXY_PRIV" user shows a username if external authentication is used

    正确答案:E

  • 第6题:

    Which two are true regarding external tables? ()

    • A、External tables can be updated. 
    • B、External tables are read-only tables. 
    • C、Indexes can be created on external tables. 
    • D、Indexes cannot be created on external tables.

    正确答案:B,D

  • 第7题:

    多选题
    Which two statements are true regarding the USING clause in table joins?()
    A

    It can be used to join a maximum of three tables

    B

    It can be used to restrict the number of columns used in a NATURAL join

    C

    It can be used to access data from tables through equijoins as well as nonequijoins

    D

    It can be used to join tables that have columns with the same name and compatible data types


    正确答案: A,C
    解析: 暂无解析

  • 第8题:

    多选题
    Which two statements regarding firewall user authentication client groups are true?() (Choose two.)
    A

    A client group is a list of clients associated with a group.

    B

    A client group is a list of groups associated with a client.

    C

    Client groups are referenced in security policy in the same manner in which individual clients are referenced.

    D

    Client groups are used to simplify configuration by enabling firewall user authentication without security policy.


    正确答案: D,A
    解析: 暂无解析

  • 第9题:

    多选题
    Which two statements regarding external authentication servers for firewall user authentication are true?() (Choose two.)
    A

    Up to three external authentication server types can be used simultaneously.

    B

    Only one external authentication server type can be used simultaneously.

    C

    If the local password database is not configured in the authentication order, and the configured authentication server  bypassed.

    D

    If the local password database is not configured in the authentication order, and the configured authentication server authentication is rejected.


    正确答案: B,A
    解析: 暂无解析

  • 第10题:

    多选题
    Which two external authentication methods are supported by the Junos OS for user authentication?()
    A

    RADIUS

    B

    KERBEROS

    C

    LDAP

    D

    TACACS+


    正确答案: A,D
    解析: 暂无解析

  • 第11题:

    多选题
    Which two external authentication server types are supported by JUNOS Software for firewall user authentication?()
    A

    RADIUS

    B

    TACACS+

    C

    LDAP

    D

    IIS


    正确答案: B,D
    解析: 暂无解析

  • 第12题:

    单选题
    Consider the Mysql Enterprise Audit plugin. Which statement is true when you identify a connection event that has used external authentication?()
    A

    The attribute STATUS is set to the string EXTERNAL_AUTH

    B

    The attribute PRIV_USER contains the username

    C

    The event type that is given in the attribute NAME is EXTERNAL_AUTH

    D

    There is no differentiation between native and external authentication events

    E

    External authentication is managed through external auditing logs

    F

    The PROXY_PRIV user shows a username if external authentication is used


    正确答案: C
    解析: 暂无解析

  • 第13题:

    Which two commands can be used to monitor firewall user authentication?()

    • A、show access firewall-authentication
    • B、show security firewall-authentication users
    • C、show security audit log
    • D、show security firewall-authentication history

    正确答案:B,D

  • 第14题:

    Which two statements regarding external authentication servers for firewall userauthentication are true?()

    • A、Up to three external authentication server types can be used simultaneously.
    • B、Only one external authentication server type can be used simultaneously.
    • C、If the local password database is not configured in the authentication order, and the configured authentication server is unreachable, authentication is not performed.
    • D、If the local password database is not configured in the authentication order, and the configured authentication server rejects the authentication request, authentication is not performed

    正确答案:B,D

  • 第15题:

    Which two statements regarding external authentication servers for firewall user authentication are true?() (Choose two.)

    • A、Up to three external authentication server types can be used simultaneously.
    • B、Only one external authentication server type can be used simultaneously.
    • C、If the local password database is not configured in the authentication order, and the configured authentication server  bypassed.
    • D、If the local password database is not configured in the authentication order, and the configured authentication server authentication is rejected.

    正确答案:B,D

  • 第16题:

    Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)

    • A、access profile
    • B、client group
    • C、client
    • D、default profile
    • E、external

    正确答案:A,B,C

  • 第17题:

    Which two statements are true about the roles in the Oracle database?()

    • A、A role can be granted to itself.
    • B、Roles are owned by the SYS user.
    • C、Roles can be granted to other roles.
    • D、A role cannot be assigned external authentication.
    • E、A role can contain both system and object privileges.

    正确答案:C,E

  • 第18题:

    多选题
    Which two external authentication servers are supported for administrative access to a Junos device?()
    A

    RADIUS

    B

    LDAP

    C

    ACE

    D

    TACACS+


    正确答案: C,A
    解析: 暂无解析

  • 第19题:

    多选题
    Which three authentication server types are supported for retrieving user attributes used in role- mapping rules?()
    A

    LDAP

    B

    S/Key

    C

    TACACS+

    D

    RADIUS

    E

    SiteMinder


    正确答案: C,E
    解析: 暂无解析

  • 第20题:

    多选题
    Which two statements regarding external authentication servers for firewall userauthentication are true?()
    A

    Up to three external authentication server types can be used simultaneously.

    B

    Only one external authentication server type can be used simultaneously.

    C

    If the local password database is not configured in the authentication order, and the configured authentication server is unreachable, authentication is not performed.

    D

    If the local password database is not configured in the authentication order, and the configured authentication server rejects the authentication request, authentication is not performed


    正确答案: B,A
    解析: 暂无解析

  • 第21题:

    多选题
    Which two statements are true about the roles in the Oracle database?()
    A

    A role can be granted to itself.

    B

    Roles are owned by the SYS user.

    C

    Roles can be granted to other roles.

    D

    A role cannot be assigned external authentication.

    E

    A role can contain both system and object privileges.


    正确答案: E,D
    解析: 暂无解析

  • 第22题:

    多选题
    Which two are true regarding external tables? ()
    A

    External tables can be updated.

    B

    External tables are read-only tables.

    C

    Indexes can be created on external tables.

    D

    Indexes cannot be created on external tables.


    正确答案: B,A
    解析: 暂无解析

  • 第23题:

    多选题
    Which two commands can be used to monitor firewall user authentication?()
    A

    show access firewall-authentication

    B

    show security firewall-authentication users

    C

    show security audit log

    D

    show security firewall-authentication history


    正确答案: C,D
    解析: 暂无解析

  • 第24题:

    单选题
    Which one of these statements is true of OSPF type 5 LSAs? ()
    A

     They are used to summarize area routes to other areas.

    B

     They are used in not-so-stubby areas to propagate external routes.

    C

     They are used to notify areas of the ASBR.

    D

     They are flooded to all areas except stub areas (external route).


    正确答案: B
    解析: 暂无解析