多选题Which two commands can be used to monitor firewall user authentication?()Ashow access firewall-authenticationBshow security firewall-authentication usersCshow security audit logDshow security firewall-authentication history

题目
多选题
Which two commands can be used to monitor firewall user authentication?()
A

show access firewall-authentication

B

show security firewall-authentication users

C

show security audit log

D

show security firewall-authentication history


相似考题
更多“多选题Which two commands can be used to monitor firewall user authentication?()Ashow access firewall-authenticationBshow security firewall-authentication usersCshow security audit logDshow security firewall-authentication history”相关问题
  • 第1题:

    Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)

    A. access profile

    B. client group

    C. client

    D. default profile

    E. external


    参考答案:A, B, C

  • 第2题:

    A  user  wants  to  be  permanently  added  to  the  dba  group.  Which  of  the  following  commands  or processes can be used to accomplish this()

    • A、chgrp
    • B、chuser
    • C、edit /etc/user
    • D、edit /etc/security/group

    正确答案:B

  • 第3题:

    Which two commands can be used to monitor firewall user authentication?()

    • A、show access firewall-authentication
    • B、show security firewall-authentication users
    • C、show security audit log
    • D、show security firewall-authentication history

    正确答案:B,D

  • 第4题:

    Which of the following would be used to monitor unauthorized access to data files?()

    • A、Performance Log and Alerts
    • B、Event Viewer
    • C、Security Configuration and Analysis
    • D、IP Security Monitor

    正确答案:B

  • 第5题:

    Under which configuration hierarchy is an access profile configured for firewall user authentication?()

    • A、[edit access]
    • B、[edit security access]
    • C、[edit firewall access]
    • D、[edit firewall-authentication]

    正确答案:A

  • 第6题:

    Which two statements are true regarding firewall user authentication?()

    • A、When configured for pass-through firewall user authentication, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.
    • B、When configured for Web firewall user authentication only, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.
    • C、If a JUNOS security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted to perform authentication.
    • D、If a JUNOS security device is configured for Web firewall user authentication, new sessions are automatically intercepted to perform authentication.

    正确答案:B,C

  • 第7题:

    Which statement accurately describes firewall user authentication?()

    • A、Firewall user authentication provides another layer of security in a network.
    • B、Firewall user authentication provides a means for accessing a JUNOS Software-based security device.
    • C、Firewall user authentication enables session-based forwarding.
    • D、Firewall user authentication is used as a last resort security method in a network.

    正确答案:A

  • 第8题:

    多选题
    Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)
    A

    access profile

    B

    client group

    C

    client

    D

    default profile

    E

    external


    正确答案: A,C
    解析: 暂无解析

  • 第9题:

    多选题
    Which two statements are true regarding firewall user authentication?()
    A

    When configured for pass-through firewall user authentication, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.

    B

    When configured for Web firewall user authentication only, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.

    C

    If a JUNOS security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted to perform authentication.

    D

    If a JUNOS security device is configured for Web firewall user authentication, new sessions are automatically intercepted to perform authentication.


    正确答案: B,C
    解析: 暂无解析

  • 第10题:

    多选题
    Which two statements regarding firewall user authentication client groups are true?() (Choose two.)
    A

    A client group is a list of clients associated with a group.

    B

    A client group is a list of groups associated with a client.

    C

    Client groups are referenced in security policy in the same manner in which individual clients are referenced.

    D

    Client groups are used to simplify configuration by enabling firewall user authentication without security policy.


    正确答案: D,A
    解析: 暂无解析

  • 第11题:

    多选题
    Which two firewall user authentication objects can be referenced in a security policy?()
    A

    access profile

    B

    client group

    C

    client

    D

    default profile


    正确答案: D,A
    解析: 暂无解析

  • 第12题:

    多选题
    Which two commands can be used to monitor firewall user authentication?()
    A

    show access firewall-authentication

    B

    show security firewall-authentication users

    C

    show security audit log

    D

    show security firewall-authentication history


    正确答案: C,D
    解析: 暂无解析

  • 第13题:

    Which two statements regarding firewall user authentication client groups are true?() (Choose two.)

    • A、A client group is a list of clients associated with a group.
    • B、A client group is a list of groups associated with a client.
    • C、Client groups are referenced in security policy in the same manner in which individual clients are referenced.
    • D、Client groups are used to simplify configuration by enabling firewall user authentication without security policy.

    正确答案:B,C

  • 第14题:

    Which two firewall user authentication objects can be referenced in a security policy?()

    • A、access profile
    • B、client group
    • C、client
    • D、default profile

    正确答案:B,C

  • 第15题:

    Which two statements are true regarding firewall user authentication?() (Choose two.)

    • A、When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.
    • B、When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.
    • C、If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .
    • D、If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.

    正确答案:B,C

  • 第16题:

    Which two statements regarding firewall user authentication client groups are true?()

    • A、Individual clients are configured under client groups in the configuration hierarchy.
    • B、Client groups are configured under individual clients in the configuration hierarchy.
    • C、Client groups are referenced in security policy in the same manner in which individual clients are referenced.
    • D、Client groups are used to simplify configuration by enabling firewall user authentication without security policy.

    正确答案:B,C

  • 第17题:

    Given the configuration shown in the exhibit, which configuration object would be used to associate bothNancy and Walter with firewall user authentication within a security policy?() profile ftp-users { client nancy { firewall-user { password "$9$lJ8vLNdVYZUHKMi.PfzFcyrvX7"; ## SECRET-DATA } } client walter { firewall-user { password "$9$a1UqfTQnApB36pBREKv4aJUk.5QF"; ## SECRET-DATA } } session-options { client-group ftp-group; } } firewall-authentication { pass-through { default-profile ftp-users;ftp { banner { login "JUNOS Rocks!"; } } } }

    • A、ftp-group
    • B、ftp-users
    • C、firewall-user
    • D、nancy and walter

    正确答案:A

  • 第18题:

    Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)

    • A、access profile
    • B、client group
    • C、client
    • D、default profile
    • E、external

    正确答案:A,B,C

  • 第19题:

    单选题
    Given the configuration shown in the exhibit, which configuration object would be used to associate bothNancy and Walter with firewall user authentication within a security policy?() profile ftp-users { client nancy { firewall-user { password "$9$lJ8vLNdVYZUHKMi.PfzFcyrvX7"; ## SECRET-DATA } } client walter { firewall-user { password "$9$a1UqfTQnApB36pBREKv4aJUk.5QF"; ## SECRET-DATA } } session-options { client-group ftp-group; } } firewall-authentication { pass-through { default-profile ftp-users;ftp { banner { login "JUNOS Rocks!"; } } } }
    A

    ftp-group

    B

    ftp-users

    C

    firewall-user

    D

    nancy and walter


    正确答案: A
    解析: 暂无解析

  • 第20题:

    多选题
    Which two statements regarding firewall user authentication client groups are true?()
    A

    Individual clients are configured under client groups in the configuration hierarchy.

    B

    Client groups are configured under individual clients in the configuration hierarchy.

    C

    Client groups are referenced in security policy in the same manner in which individual clients are referenced.

    D

    Client groups are used to simplify configuration by enabling firewall user authentication without security policy.


    正确答案: C,D
    解析: 暂无解析

  • 第21题:

    多选题
    Which two statements are true regarding firewall user authentication?() (Choose two.)
    A

    When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.

    B

    When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.

    C

    If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .

    D

    If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.


    正确答案: D,A
    解析: 暂无解析

  • 第22题:

    单选题
    Under which configuration hierarchy is an access profile configured for firewall user authentication?()
    A

    [edit access]

    B

    [edit security access]

    C

    [edit firewall access]

    D

    [edit firewall-authentication]


    正确答案: A
    解析: 暂无解析

  • 第23题:

    单选题
    Which statement accurately describes firewall user authentication?()
    A

    Firewall user authentication provides another layer of security in a network.

    B

    Firewall user authentication provides a means for accessing a JUNOS Software-based security device.

    C

    Firewall user authentication enables session-based forwarding.

    D

    Firewall user authentication is used as a last resort security method in a network.


    正确答案: B
    解析: 暂无解析

  • 第24题:

    单选题
    Which of the following would be used to monitor unauthorized access to data files?()
    A

    Performance Log and Alerts

    B

    Event Viewer

    C

    Security Configuration and Analysis

    D

    IP Security Monitor


    正确答案: C
    解析: 暂无解析