Given the configuration shown in the exhibit, which configuration object would be used to associate bothNancy and Walter with firewall user authentication within a security policy?() profile ftp-users { client nancy { firewall-user { password "$9$lJ8vLNdVYZUHKMi.PfzFcyrvX7"; ## SECRET-DATA } } client walter { firewall-user { password "$9$a1UqfTQnApB36pBREKv4aJUk.5QF"; ## SECRET-DATA } } session-options { client-group ftp-group; } } firewall-authentication { pass-through { default-profile ftp-users;ftp { banner { login "JUNOS Rocks!"; } } } }
第1题:
Giventheconfigurationshownintheexhibit,whichconfigurationobjectwouldbeusedtoassociatebothNancyandWalterwithfirewalluserauthenticationwithinasecuritypolicy?()profileftp-users{clientnancy{firewall-user{password"$9$lJ8vLNdVYZUHKMi.PfzFcyrvX7";SECRET-DATA}}clientwalter{firewall-user{password"$9$a1UqfTQnApB36pBREKv4aJUk.5QF";SECRET-DATA}}session-options{client-groupftp-group;}}firewall-authentication{pass-through{default-profileftp-users;ftp{banner{login"JUNOSRocks!";}}}}
A.ftp-group
B.ftp-users
C.firewall-user
D.nancyandwalter
第2题:
A. A client group is a list of clients associated with a group.
B. A client group is a list of groups associated with a client.
C. Client groups are referenced in security policy in the same manner in which individual clients are referenced.
D. Client groups are used to simplify configuration by enabling firewall user authentication without security policy.
第3题:
Click the Exhibit button.Given the configuration shown in the exhibit, which configuration object would be used to associate both Nancy andWalter with firewall user authentication within a security policy?()
A. ftp-group
B. ftp-users
C. firewall-user
D. nancy and walter
第4题:
Which two statements regarding firewall user authentication client groups are true?() (Choose two.)
第5题:
A. Mark permitted traffic for firewall user authentication.
B. Mark permitted traffic for SCREEN options.
C. Associate permitted traffic with an IPsec tunnel.
D. Associate permitted traffic with a NAT rule.
E. Mark permitted traffic for IDP processing.
第6题:
A. behavior aggregate
B. policer
C. multifield
D. forwarding policy
第7题:
A. 192.168.0.0/16 only
B. 192.168.0.0/17 only
C. 192.168.0.0/16 and 192.168.0.0/17
D. 192.168.0.0/17, 192.168.50.0/24, and 192.168.51.0/24
第8题:
A. RIP
B. OSPF
C. BGP and RIP
D. RIP and PIM
第9题:
A. access profile
B. client group
C. client
D. default profile
E. external
第10题:
Which two firewall user authentication objects can be referenced in a security policy?()