多选题Which two traffic types trigger pass-through firewall user authentication?()ASSHBTelnetCICMPDOSPFEHTTP

题目
多选题
Which two traffic types trigger pass-through firewall user authentication?()
A

SSH

B

Telnet

C

ICMP

D

OSPF

E

HTTP


相似考题
参考答案和解析
正确答案: D,A
解析: 暂无解析
更多“多选题Which two traffic types trigger pass-through firewall user authentication?()ASSHBTelnetCICMPDOSPFEHTTP”相关问题
  • 第1题:

    Which two firewall user authentication objects can be referenced in a security policy?()

    • A、access profile
    • B、client group
    • C、client
    • D、default profile

    正确答案:B,C

  • 第2题:

    Which two commands can be used to monitor firewall user authentication?()

    • A、show access firewall-authentication
    • B、show security firewall-authentication users
    • C、show security audit log
    • D、show security firewall-authentication history

    正确答案:B,D

  • 第3题:

    A user wants to establish an HTTP session to a server behind an SRX device but is being pointed to Web page on the SRX device for additional authentication.Which type of user authentication is configured?()

    • A、pass-through with Web redirect
    • B、WebAuth with HTTP redirect
    • C、WebAuth
    • D、pass-through

    正确答案:A

  • 第4题:

    Which statement describes the Authentication Proxy feature?()

    • A、All traffic is permitted from the inbound to the outbound interface upon successful authentication of the user.
    • B、A specific access profile is retrieved from a TACACS+ or RADIUS server and applied to an IOS Firewall based on user provided credentials.
    • C、Prior to responding to a proxy ARP,the router will prompt the user for a login and password which are authenticated based on the configured AAA policy.
    • D、The proxy server capabilities of the IOS Firewall are enabled upon successful authentication of the user.

    正确答案:B

  • 第5题:

    Which two statements regarding external authentication servers for firewall user authentication are true?() (Choose two.)

    • A、Up to three external authentication server types can be used simultaneously.
    • B、Only one external authentication server type can be used simultaneously.
    • C、If the local password database is not configured in the authentication order, and the configured authentication server  bypassed.
    • D、If the local password database is not configured in the authentication order, and the configured authentication server authentication is rejected.

    正确答案:B,D

  • 第6题:

    Which statement accurately describes firewall user authentication?()

    • A、Firewall user authentication provides another layer of security in a network.
    • B、Firewall user authentication provides a means for accessing a JUNOS Software-based security device.
    • C、Firewall user authentication enables session-based forwarding.
    • D、Firewall user authentication is used as a last resort security method in a network.

    正确答案:A

  • 第7题:

    多选题
    Which three advanced permit actions within security policies are valid?()
    A

    Mark permitted traffic for firewall user authentication.

    B

    Mark permitted traffic for SCREEN options.

    C

    Associate permitted traffic with an IPsec tunnel.

    D

    Associate permitted traffic with a NAT rule.

    E

    Mark permitted traffic for IDP processing.


    正确答案: C,E
    解析: 暂无解析

  • 第8题:

    多选题
    Which two statements regarding firewall user authentication client groups are true?()
    A

    Individual clients are configured under client groups in the configuration hierarchy.

    B

    Client groups are configured under individual clients in the configuration hierarchy.

    C

    Client groups are referenced in security policy in the same manner in which individual clients are referenced.

    D

    Client groups are used to simplify configuration by enabling firewall user authentication without security policy.


    正确答案: C,D
    解析: 暂无解析

  • 第9题:

    多选题
    Which two statements are true regarding firewall user authentication?() (Choose two.)
    A

    When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.

    B

    When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.

    C

    If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .

    D

    If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.


    正确答案: D,A
    解析: 暂无解析

  • 第10题:

    多选题
    Which two statements regarding external authentication servers for firewall user authentication are true?() (Choose two.)
    A

    Up to three external authentication server types can be used simultaneously.

    B

    Only one external authentication server type can be used simultaneously.

    C

    If the local password database is not configured in the authentication order, and the configured authentication server  bypassed.

    D

    If the local password database is not configured in the authentication order, and the configured authentication server authentication is rejected.


    正确答案: B,A
    解析: 暂无解析

  • 第11题:

    多选题
    Which two firewall user authentication objects can be referenced in a security policy?()
    A

    access profile

    B

    client group

    C

    client

    D

    default profile


    正确答案: D,A
    解析: 暂无解析

  • 第12题:

    多选题
    Which two commands can be used to monitor firewall user authentication?()
    A

    show access firewall-authentication

    B

    show security firewall-authentication users

    C

    show security audit log

    D

    show security firewall-authentication history


    正确答案: C,D
    解析: 暂无解析

  • 第13题:

    On which three traffic types does firewall pass-through authentication work? ()(Choose three.)

    • A、ping
    • B、FTP
    • C、Telnet
    • D、HTTP
    • E、HTTPS

    正确答案:B,C,D

  • 第14题:

    Which two statements are true regarding firewall user authentication?() (Choose two.)

    • A、When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.
    • B、When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.
    • C、If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .
    • D、If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.

    正确答案:B,C

  • 第15题:

    Which two traffic types trigger pass-through firewall user authentication?()

    • A、SSH
    • B、Telnet
    • C、ICMP
    • D、OSPF
    • E、HTTP

    正确答案:B,E

  • 第16题:

    Which two external authentication server types are supported by JUNOS Software for firewall user authentication?()

    • A、RADIUS
    • B、TACACS+
    • C、LDAP
    • D、IIS

    正确答案:A,C

  • 第17题:

    Which two statements are true regarding firewall user authentication?()

    • A、When configured for pass-through firewall user authentication, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.
    • B、When configured for Web firewall user authentication only, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.
    • C、If a JUNOS security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted to perform authentication.
    • D、If a JUNOS security device is configured for Web firewall user authentication, new sessions are automatically intercepted to perform authentication.

    正确答案:B,C

  • 第18题:

    多选题
    Which two traffic types trigger pass-through firewall user authentication?()
    A

    SSH

    B

    Telnet

    C

    ICMP

    D

    OSPF

    E

    HTTP


    正确答案: D,E
    解析: 暂无解析

  • 第19题:

    多选题
    On which three traffic types does firewall pass-through authentication work? ()(Choose three.)
    A

    ping

    B

    FTP

    C

    Telnet

    D

    HTTP

    E

    HTTPS


    正确答案: A,E
    解析: 暂无解析

  • 第20题:

    多选题
    Which two statements are true regarding firewall user authentication?()
    A

    When configured for pass-through firewall user authentication, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.

    B

    When configured for Web firewall user authentication only, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.

    C

    If a JUNOS security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted to perform authentication.

    D

    If a JUNOS security device is configured for Web firewall user authentication, new sessions are automatically intercepted to perform authentication.


    正确答案: B,C
    解析: 暂无解析

  • 第21题:

    多选题
    Which two statements regarding firewall user authentication client groups are true?() (Choose two.)
    A

    A client group is a list of clients associated with a group.

    B

    A client group is a list of groups associated with a client.

    C

    Client groups are referenced in security policy in the same manner in which individual clients are referenced.

    D

    Client groups are used to simplify configuration by enabling firewall user authentication without security policy.


    正确答案: D,A
    解析: 暂无解析

  • 第22题:

    多选题
    You have a firewall enforcer protecting resources in a data center. A user is experiencing difficulty connecting to a protected resource.Which two elements must exist so the user can access the resource?()
    A

    Resource access policy on the MAG Series device

    B

    IPsec routing policy on the MAG Series device

    C

    General traffic policy blocking access through the firewall enforcer

    D

    Auth table entry on the firewall enforcer


    正确答案: A,C
    解析: 暂无解析

  • 第23题:

    多选题
    Which two external authentication server types are supported by JUNOS Software for firewall user authentication?()
    A

    RADIUS

    B

    TACACS+

    C

    LDAP

    D

    IIS


    正确答案: B,D
    解析: 暂无解析

  • 第24题:

    多选题
    Which three advanced permit actions within security policies are valid?() (Choose three.)
    A

    Mark permitted traffic for firewall user authentication.

    B

    Mark permitted traffic for SCREEN options.

    C

    Associate permitted traffic with an IPsec tunnel.

    D

    Associate permitted traffic with a NAT rule.

    E

    Mark permitted traffic for IDP processing.


    正确答案: B,D
    解析: 暂无解析