show access firewall-authentication
show security firewall-authentication users
show security audit log
show security firewall-authentication history
第1题:
A. access profile
B. client group
C. client
D. default profile
E. external
第2题:
A user wants to be permanently added to the dba group. Which of the following commands or processes can be used to accomplish this()
第3题:
Which two commands can be used to monitor firewall user authentication?()
第4题:
Which of the following would be used to monitor unauthorized access to data files?()
第5题:
Under which configuration hierarchy is an access profile configured for firewall user authentication?()
第6题:
Which two statements are true regarding firewall user authentication?()
第7题:
Which statement accurately describes firewall user authentication?()
第8题:
access profile
client group
client
default profile
external
第9题:
When configured for pass-through firewall user authentication, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.
When configured for Web firewall user authentication only, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.
If a JUNOS security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted to perform authentication.
If a JUNOS security device is configured for Web firewall user authentication, new sessions are automatically intercepted to perform authentication.
第10题:
A client group is a list of clients associated with a group.
A client group is a list of groups associated with a client.
Client groups are referenced in security policy in the same manner in which individual clients are referenced.
Client groups are used to simplify configuration by enabling firewall user authentication without security policy.
第11题:
access profile
client group
client
default profile
第12题:
show access firewall-authentication
show security firewall-authentication users
show security audit log
show security firewall-authentication history
第13题:
Which two statements regarding firewall user authentication client groups are true?() (Choose two.)
第14题:
Which two firewall user authentication objects can be referenced in a security policy?()
第15题:
Which two statements are true regarding firewall user authentication?() (Choose two.)
第16题:
Which two statements regarding firewall user authentication client groups are true?()
第17题:
Given the configuration shown in the exhibit, which configuration object would be used to associate bothNancy and Walter with firewall user authentication within a security policy?() profile ftp-users { client nancy { firewall-user { password "$9$lJ8vLNdVYZUHKMi.PfzFcyrvX7"; ## SECRET-DATA } } client walter { firewall-user { password "$9$a1UqfTQnApB36pBREKv4aJUk.5QF"; ## SECRET-DATA } } session-options { client-group ftp-group; } } firewall-authentication { pass-through { default-profile ftp-users;ftp { banner { login "JUNOS Rocks!"; } } } }
第18题:
Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)
第19题:
ftp-group
ftp-users
firewall-user
nancy and walter
第20题:
Individual clients are configured under client groups in the configuration hierarchy.
Client groups are configured under individual clients in the configuration hierarchy.
Client groups are referenced in security policy in the same manner in which individual clients are referenced.
Client groups are used to simplify configuration by enabling firewall user authentication without security policy.
第21题:
When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.
When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.
If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .
If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.
第22题:
[edit access]
[edit security access]
[edit firewall access]
[edit firewall-authentication]
第23题:
Firewall user authentication provides another layer of security in a network.
Firewall user authentication provides a means for accessing a JUNOS Software-based security device.
Firewall user authentication enables session-based forwarding.
Firewall user authentication is used as a last resort security method in a network.
第24题:
Performance Log and Alerts
Event Viewer
Security Configuration and Analysis
IP Security Monitor