Which two commands can be used to monitor firewall user auth

题目
多选题
Which two commands can be used to monitor firewall user authentication?()
A

show access firewall-authentication

B

show security firewall-authentication users

C

show security audit log

D

show security firewall-authentication history

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which two statements are correct about firewall filters in the Junos OS?()

  • A、Firewall filters are stateless.
  • B、Firewall filters are used to control routing information that is exchanged between devices.
  • C、Firewall filters are used to control traffic passing through the device.
  • D、Firewall filters can only be applied to traffic entering the device.

正确答案:A,C

第2题:

Which Web-filtering technology can be used at the same time as integrated Web filtering on a single branch SRX Series device?()

  • A、Websense redirect Web filtering
  • B、local Web filtering (blacklist or whitelist)
  • C、firewall user authentication
  • D、ICAP

正确答案:B

第3题:

You have a firewall enforcer protecting resources in a data center. A user is experiencing difficulty connecting to a protected resource.Which two elements must exist so the user can access the resource?()

A. Resource access policy on the MAG Series device

B. IPsec routing policy on the MAG Series device

C. General traffic policy blocking access through the firewall enforcer

D. Auth table entry on the firewall enforcer


参考答案:A, D

第4题:

Which two statements are true about the Cisco Classic (CBAC) IOS Firewall set?()

  • A、It can be used to block bulk encryption attacks
  • B、It can be used to protect against denial of service attacks
  • C、Traffic originating from the router is considered trusted, so it is not inspected
  • D、Based upon the custom firewall rules, an ACL entry is statically created and added to theexisting ACL permanently
  • E、Temporary ACL entries that allow selected traffic to pass are created and persist for theduration of the communication session

正确答案:B,E

第5题:

Which two commands can be used to verify a trunk link configuration status on a given cisco switch?()

  • A、show interfaces interface
  • B、show interfaces trunk
  • C、show interfaces switchport
  • D、show ip interface brief
  • E、show interfaces vlan

正确答案:B,C

第6题:

Which of the following commands should be used to monitor the number of bytes read on any given disk?()

  • A、 tprof
  • B、 topas
  • C、 filemon
  • D、 vmstat

正确答案:B

第7题:

Which two statements are true regarding firewall user authentication?() (Choose two.)

  • A、When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.
  • B、When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.
  • C、If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .
  • D、If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.

正确答案:B,C

第8题:

Which two statements regarding firewall user authentication client groups are true?() (Choose two.)

  • A、A client group is a list of clients associated with a group.
  • B、A client group is a list of groups associated with a client.
  • C、Client groups are referenced in security policy in the same manner in which individual clients are referenced.
  • D、Client groups are used to simplify configuration by enabling firewall user authentication without security policy.

正确答案:B,C

第9题:

Which two privileged mode cisco ios commands can be used to determine a cisco router chassis serial number?()

  • A、show inventory
  • B、show flash:filesys
  • C、dirflash:include chassis
  • D、show diag
  • E、show controllers

正确答案:A,D

第10题:

Which of the following WLM commands should be used to monitor performance on a system running wlm?()

  • A、 wlmcntrl
  • B、 wlmstat
  • C、 wlmcheck
  • D、 wlmassign

正确答案:B

更多相关问题