Which of the following statements about authentication responses and conditions is true? ()(Choose two.)A. When a router receives a failure response, it stops querying authentication methods.B. When a router receives an error response, it stops querying a

题目
Which of the following statements about authentication responses and conditions is true? ()(Choose two.)

A. When a router receives a failure response, it stops querying authentication methods.

B. When a router receives an error response, it stops querying authentication methods.

C. If the router receives a failure response from an authentication method, it queries the next method.

D. The router does not differentiate between failure and error responses; the authentication process is always interrupted.

E. If it receives no response from the authentication method, a router will determine the error condition on its own; the router also has the option to proceed to the next method in a list if configured accordingly.


相似考题
更多“Which of the following statements about authentication responses and conditions is true? ()(Choose two.) ”相关问题
  • 第1题:

    Which two statements are true about precedence values in policy?() (Choose two.)

    A. 1 is the default precedence.

    B. A lower number is preferred.

    C. A higher number is preferred.

    D. 100 is the default precedence.


    参考答案:B, D

  • 第2题:

    Which of the following statements about language is NOT true?

    A.Language is a system
    B.Language is symbol
    C.Animals also have language
    D.Language is arbitrary

    答案:C
    解析:
    本题考查语言的定义。
    本题要求选不正确的,C选项,动物也有语言,错误。语言是人类在交际中使用的一套任意的声音符号系统。动物没有语言,动物只是本能发出声音。综上,应选C。
    A选项,系统的,故排除。
    B选项,符号,故排除。
    D选项,任意的,故排除。
    故正确答案为C项。

  • 第3题:

    Which of the following statements about authentication responses and conditions is true? ()(Choosetwo.)

    • A、When a router receives a failure response, it stops querying authentication methods.
    • B、When a router receives an error response, it stops querying authentication methods.
    • C、If the router receives a failure response from an authentication method, it queries the next method.
    • D、The router does not differentiate between failure and error responses; the authentication process is always interrupted.
    • E、If it receives no response from the authentication method, a router will determine the error condition On its own; the router also has the option to proceed to the next method in a list if configured accordingly.

    正确答案:A,E

  • 第4题:

    Which two statements are true regarding firewall user authentication?() (Choose two.)

    • A、When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.
    • B、When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.
    • C、If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .
    • D、If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.

    正确答案:B,C

  • 第5题:

    Which of the following statements about authentication responses and conditions is true?()(Choose two.)

    • A、When a router receives a failure response, it stops querying authentication methods.
    • B、When a router receives an error response, it stops querying authentication methods.
    • C、If the router receives a failure response from an authentication method, it queries the next method.
    • D、The router does not differentiate between failure and error responses; the authentication process is always interrupted.
    • E、If it receives no response from the authentication method, a router will determine the error condition on its own; the router also has the option to proceed to the next method in a list if configured accordingly.

    正确答案:A,E

  • 第6题:

    Which two statements are true about pool-based source NAT? ()(Choose two.)

    • A、PAT is not supported.
    • B、PAT is enabled by default.
    • C、It supports the address-persistent configuration option.
    • D、It supports the junos-global configuration option.

    正确答案:B,C

  • 第7题:

    Which two statements are true about the duplexing of the backups taken by RMAN? ()(Choose two.)

    • A、It's only supported for the backups performed on the tape
    • B、It is not supported for backup operations that produce image copies
    • C、Duplex backups need a parallelism for the device to be equal to number of copies
    • D、Duplex backups can be performed to either disk or tape, but cannot be performed on tape and disk simultaneously

    正确答案:B,D

  • 第8题:

    多选题
    Which two statements are true about L2TP tunnels?() (Choose two.)
    A

    Traffic is clear text

    B

    Traffic is encrypted 

    C

    They are initiated by the LNS

    D

    They are initiated by the LAC


    正确答案: B,D
    解析: 暂无解析

  • 第9题:

    多选题
    Which two statements are true about AH?() (Choose two.)
    A

    AH provides data integrity.

    B

    AH is identified by IP protocol 50.

    C

    AH is identified by IP protocol 51.

    D

    AH cannot work in conjunction with ESP


    正确答案: D,C
    解析: 暂无解析

  • 第10题:

    多选题
    Which two statements are true regarding firewall user authentication?() (Choose two.)
    A

    When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.

    B

    When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.

    C

    If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .

    D

    If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.


    正确答案: D,A
    解析: 暂无解析

  • 第11题:

    多选题
    Which two statements are true about the relationship between static NAT and proxy ARP? ()(Choose two.)
    A

    It is necessary to forward ARP requests to remote hosts.

    B

    It is necessary when translated traffic belongs to the same subnet as the ingress interface.

    C

    It is not automatic and you must configure it.

    D

    It is enabled by default and you do not need to configure it.


    正确答案: D,B
    解析: 暂无解析

  • 第12题:

    多选题
    Which two statements about static NAT are true? ()(Choose two.)
    A

    Static NAT can only be used with destination NAT.

    B

    Static NAT rules take precedence over overlapping dynamic NAT rules.

    C

    NAT rules take precedence over overlapping static NAT rules.

    D

    A reverse mapping is automatically created.


    正确答案: C,B
    解析: 暂无解析

  • 第13题:

    Which two statements are true regarding L2TP? ()(Choose two.)

    A. Tunnels are initiated by the LAC

    B. Tunnels are initiated by the LNS

    C. By default, subscriber authentication occurs on the LNS

    D. By default, subscriber authentication occurs on the LAC


    参考答案:A, C

  • 第14题:

    Which two statements regarding firewall user authentication client groups are true?() (Choose two.)

    • A、A client group is a list of clients associated with a group.
    • B、A client group is a list of groups associated with a client.
    • C、Client groups are referenced in security policy in the same manner in which individual clients are referenced.
    • D、Client groups are used to simplify configuration by enabling firewall user authentication without security policy.

    正确答案:B,C

  • 第15题:

    Which two statements are true about L2TP tunnels?() (Choose two.)

    • A、Traffic is clear text
    • B、Traffic is encrypted 
    • C、They are initiated by the LNS
    • D、They are initiated by the LAC

    正确答案:A,D

  • 第16题:

    Which statements are true about EIGRP successor routes (Choose two.)()。

    • A、A successor route is used by EIGRP to forward traffic to a destination.
    • B、Successor routes are saved in the topology table to be used if the primary route fails.
    • C、Successor routes are flagged as "active" in the routing table.
    • D、A successor route may be backed up by a feasible successor route.
    • E、Successor routes are stored in the neighbor table following the discovery process.

    正确答案:A,D

  • 第17题:

    Which two statements are true regarding L2TP? ()(Choose two.)

    • A、Tunnels are initiated by the LAC
    • B、Tunnels are initiated by the LNS
    • C、By default, subscriber authentication occurs on the LNS
    • D、By default, subscriber authentication occurs on the LAC

    正确答案:A,C

  • 第18题:

    Which two statements are true about precedence values in policy?() (Choose two.)

    • A、1 is the default precedence.
    • B、A lower number is preferred.
    • C、A higher number is preferred.
    • D、100 is the default precedence.

    正确答案:B,D

  • 第19题:

    多选题
    Which two statements are true about hierarchical architecture? ()(Choose two.)
    A

    You can assign a logical interface to multiple zones.

    B

    You cannot assign a logical interface to multiple zones.

    C

    You can assign a logical interface to multiple routing instances.

    D

    You cannot assign a logical interface to multiple routing instances.


    正确答案: B,C
    解析: 暂无解析

  • 第20题:

    多选题
    Which of the following statements about authentication responses and conditions is true? ()(Choosetwo.)
    A

    When a router receives a failure response, it stops querying authentication methods.

    B

    When a router receives an error response, it stops querying authentication methods.

    C

    If the router receives a failure response from an authentication method, it queries the next method.

    D

    The router does not differentiate between failure and error responses; the authentication process is always interrupted.

    E

    If it receives no response from the authentication method, a router will determine the error condition On its own; the router also has the option to proceed to the next method in a list if configured accordingly.


    正确答案: B,A
    解析: 暂无解析

  • 第21题:

    多选题
    Which two statements are true regarding L2TP? ()(Choose two.)
    A

    Tunnels are initiated by the LAC

    B

    Tunnels are initiated by the LNS

    C

    By default, subscriber authentication occurs on the LNS

    D

    By default, subscriber authentication occurs on the LAC


    正确答案: C,D
    解析: 暂无解析

  • 第22题:

    多选题
    Which two statements regarding firewall user authentication client groups are true?() (Choose two.)
    A

    A client group is a list of clients associated with a group.

    B

    A client group is a list of groups associated with a client.

    C

    Client groups are referenced in security policy in the same manner in which individual clients are referenced.

    D

    Client groups are used to simplify configuration by enabling firewall user authentication without security policy.


    正确答案: D,A
    解析: 暂无解析

  • 第23题:

    多选题
    Which two statements regarding external authentication servers for firewall user authentication are true?() (Choose two.)
    A

    Up to three external authentication server types can be used simultaneously.

    B

    Only one external authentication server type can be used simultaneously.

    C

    If the local password database is not configured in the authentication order, and the configured authentication server  bypassed.

    D

    If the local password database is not configured in the authentication order, and the configured authentication server authentication is rejected.


    正确答案: B,A
    解析: 暂无解析

  • 第24题:

    多选题
    Which two statements are true about pool-based source NAT? ()(Choose two.)
    A

    PAT is not supported.

    B

    PAT is enabled by default.

    C

    It supports the address-persistent configuration option.

    D

    It supports the junos-global configuration option.


    正确答案: D,C
    解析: 暂无解析