ftp-group
ftp-users
firewall-user
nancy and walter
第1题:
A. 192.168.0.0/16 only
B. 192.168.0.0/17 only
C. 192.168.0.0/16 and 192.168.0.0/17
D. 192.168.0.0/17, 192.168.50.0/24, and 192.168.51.0/24
第2题:
Which two statements regarding firewall user authentication client groups are true?() (Choose two.)
第3题:
Which two commands can be used to monitor firewall user authentication?()
第4题:
Which statement describes the Authentication Proxy feature?()
第5题:
Under which configuration hierarchy is an access profile configured for firewall user authentication?()
第6题:
Which three advanced permit actions within security policies are valid?() (Choose three.)
第7题:
Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)
第8题:
ftp-group
ftp-users
firewall-user
nancy and walter
第9题:
Individual clients are configured under client groups in the configuration hierarchy.
Client groups are configured under individual clients in the configuration hierarchy.
Client groups are referenced in security policy in the same manner in which individual clients are referenced.
Client groups are used to simplify configuration by enabling firewall user authentication without security policy.
第10题:
A client group is a list of clients associated with a group.
A client group is a list of groups associated with a client.
Client groups are referenced in security policy in the same manner in which individual clients are referenced.
Client groups are used to simplify configuration by enabling firewall user authentication without security policy.
第11题:
[edit access]
[edit security access]
[edit firewall access]
[edit firewall-authentication]
第12题:
access profile
client group
client
default profile
第13题:
A. access profile
B. client group
C. client
D. default profile
E. external
第14题:
Which two firewall user authentication objects can be referenced in a security policy?()
第15题:
You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003. All client computers run Windows XP Professional, and all client computer objects are store din the Clients organizational unit (OU). Client computers receive critical security patches from servers at Microsoft. A server named Testking1 runs Software Update Services (SUS). You enable Testking1 to obtain and store security patches for distribution on the internal network. Now you need to ensure that all client computers receive future security patches from Testking1 only. You open the Group Policy object (GPO) for the Clients OU. Which setting should you configure?()
第16题:
Which two statements regarding firewall user authentication client groups are true?()
第17题:
Given the configuration shown in the exhibit, which configuration object would be used to associate bothNancy and Walter with firewall user authentication within a security policy?() profile ftp-users { client nancy { firewall-user { password "$9$lJ8vLNdVYZUHKMi.PfzFcyrvX7"; ## SECRET-DATA } } client walter { firewall-user { password "$9$a1UqfTQnApB36pBREKv4aJUk.5QF"; ## SECRET-DATA } } session-options { client-group ftp-group; } } firewall-authentication { pass-through { default-profile ftp-users;ftp { banner { login "JUNOS Rocks!"; } } } }
第18题:
Which three advanced permit actions within security policies are valid?()
第19题:
Which statement accurately describes firewall user authentication?()
第20题:
access profile
client group
client
default profile
external
第21题:
192.168.0.0/16 only
192.168.50.0/24 only
192.168.50.0/24 and 192.168.51.0/24
192.168.0.0/17, 192.168.50.0/24, and 192.168.51.0/24
第22题:
192.168.0.0/16 only
192.168.0.0/17 only
192.168.50 0/24 and 192168.51.0/24
192.168.0.0/17, 192.168.50 0/24. and 192.168.51.0/24
第23题:
All traffic is permitted from the inbound to the outbound interface upon successful authentication of the user.
A specific access profile is retrieved from a TACACS+ or RADIUS server and applied to an IOS Firewall based on user provided credentials.
Prior to responding to a proxy ARP,the router will prompt the user for a login and password which are authenticated based on the configured AAA policy.
The proxy server capabilities of the IOS Firewall are enabled upon successful authentication of the user.
第24题:
Firewall user authentication provides another layer of security in a network.
Firewall user authentication provides a means for accessing a JUNOS Software-based security device.
Firewall user authentication enables session-based forwarding.
Firewall user authentication is used as a last resort security method in a network.