Which statement accurately describes firewall user authentic

题目
单选题
Which statement accurately describes firewall user authentication?()
A

Firewall user authentication provides another layer of security in a network.

B

Firewall user authentication provides a means for accessing a JUNOS Software-based security device.

C

Firewall user authentication enables session-based forwarding.

D

Firewall user authentication is used as a last resort security method in a network.

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

A packet is evaluated against three user-defined terms within a firewall filter and no match is found. What correctly describes the action the firewall filter will take for this packet?()

  • A、The filter will permit the packet and take no additional action
  • B、The filter will reject the packet and send an ICMP message back to the sender
  • C、The filter will discard the packet and take no additional action
  • D、The filter will permit the packet and write a log entry to the firewall log

正确答案:C

第2题:

Which two statements are true regarding firewall user authentication?() (Choose two.)

  • A、When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.
  • B、When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.
  • C、If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .
  • D、If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.

正确答案:B,C

第3题:

Ezonexam has implemented the use of the Virtual Trunking Protocol (VTP). Which statement below accurately describes a benefit of doing this?

A.VTP will allow physically redundant links while preventing switching loops

B.VTP will allow switches to share VLAN configuration information

C.VTP will allow a single port to carry information to more than one VLAN

D.VTP will allow for routing between VLANs

E.None of the above


正确答案:B

第4题:

which one of the following accurately describes field names?()

  • A、they must be unique in a database  
  • B、they can only be used once in a view  
  • C、they can only used once on each form  
  • D、they can be used mulriple times on a form 

正确答案:C

第5题:

Which statement describes the Authentication Proxy feature?()

  • A、All traffic is permitted from the inbound to the outbound interface upon successful authentication of the user.
  • B、A specific access profile is retrieved from a TACACS+ or RADIUS server and applied to an IOS Firewall based on user provided credentials.
  • C、Prior to responding to a proxy ARP,the router will prompt the user for a login and password which are authenticated based on the configured AAA policy.
  • D、The proxy server capabilities of the IOS Firewall are enabled upon successful authentication of the user.

正确答案:B

第6题:

Which statement describes the PFE?()

  • A、The PFE controls the RE by providing Layer 2 and Layer 3 forwarding tables
  • B、The PFE implements advanced services such as policing, stateless firewall filtering, and class of service
  • C、The PFE sends traffic to the RE for systematic packet forwarding
  • D、The PFE receives hardware and environmental status messages from the RE

正确答案:B

第7题:

Which two traffic types trigger pass-through firewall user authentication?()

  • A、SSH
  • B、Telnet
  • C、ICMP
  • D、OSPF
  • E、HTTP

正确答案:B,E

第8题:

Which statement accurately describes a benefit provided by VTP()。

A.VTP allows routing between VLANs.

B.VTP allows a single port to carry information to more than one VLAN.

C.VTP allows physically redundant links while preventing switching loops.

D.VTP allows switches to share VLAN configuration information.


参考答案:D

第9题:

Which of the following accurately describes the meaning of redundant cooling?()

  • A、The source of cooling to a RAID system
  • B、The cooling system in a redundant power supply
  • C、A cooling system that can be installed in case of failure
  • D、A second cooling system in case of a failure

正确答案:D

第10题:

Under which configuration hierarchy is an access profile configured for firewall user authentication?()

  • A、[edit access]
  • B、[edit security access]
  • C、[edit firewall access]
  • D、[edit firewall-authentication]

正确答案:A

更多相关问题