Whitch three user authentication

题目

Whitch three user authentication methos are supported by the Junos OS?()

  • A、RADIUS
  • B、CHAP
  • C、local user database
  • D、tacacs+
  • E、PAP
参考答案和解析
正确答案:A,C,D
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)

A. access profile

B. client group

C. client

D. default profile

E. external


参考答案:A, B, C

第2题:

Which three user authentication methods are supported by the Junos OS?()

A. RADIUS

B. CHAP

C. local user database

D. TACACS+

E. PAP


参考答案:A, C, D

第3题:

What are three different integrated UTM components available on the branch SRX Series devices?() (Choose three.)

A. antivirus (full AV, express AV)

B. antivirus (desktop AV)

C. Web filtering

D. antispam

E. firewall user authentication


参考答案:A, C, D

第4题:

Which two statements are true regarding firewall user authentication?() (Choose two.)

  • A、When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.
  • B、When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.
  • C、If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .
  • D、If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.

正确答案:B,C

第5题:

Which information is contained in a AAA authentication method list?()

  • A、A pointer to the address where a RADIUS server can be located
  • B、A sequential list of user authentication methods
  • C、A description of what a user can execute on a router
  • D、The setup for the authentication phase on a router

正确答案:B

第6题:

Which three authentication server types are supported for retrieving user attributes used in role- mapping rules?()

A. LDAP

B. S/Key

C. TACACS+

D. RADIUS

E. SiteMinder


参考答案:A, D, E

第7题:

Whitch three user authentication methos are supported by the Junos OS?()

A. RADIUS

B. CHAP

C. local user database

D. tacacs+

E. PAP


参考答案:A, C, D

第8题:

What are two steps to configure user authentication for a Junos Pulse Access Control Service?()

A. Configure an authentication policy as part of the user role definitions.

B. Configure a Sign-in Policy.

C. Configure authentication agents as part of the user role definitions

D. Configure an authentication policy as part of the authentication realm definition.


参考答案:B, D

第9题:

What is not a difference between VPN tunnel authentication and per-user authentication?()

  • A、VPN tunnel authentication is part of the IKE specification. 
  • B、VPN tunnel authentication does not control which end user can use the IPSec SA (VPN tunnel).
  • C、User authentication is used to control access for a specific user ID, and can be used with or without a VPN tunnel for network access authorization. 
  • D、802.1X with EAP-TLS (X.509 certificates) can be used to authenticate an IPSec tunnel.

正确答案:D

第10题:

Whitch three user authentication methos are supported by the Junos OS?()

  • A、RADIUS
  • B、CHAP
  • C、local user database
  • D、tacacs+
  • E、PAP

正确答案:A,C,D

更多相关问题