多选题Which two commands can be used to monitor firewall user authentication?()Ashow access firewall-authenticationBshow security firewall-authentication usersCshow security audit logDshow security firewall-authentication history

题目
多选题
Which two commands can be used to monitor firewall user authentication?()
A

show access firewall-authentication

B

show security firewall-authentication users

C

show security audit log

D

show security firewall-authentication history

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which two statements are true regarding firewall user authentication?() (Choose two.)

A. When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.

B. When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.

C. If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .

D. If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.


参考答案:B, C

第2题:

Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)

A. access profile

B. client group

C. client

D. default profile

E. external


参考答案:A, B, C

第3题:

Consider the Mysql Enterprise Audit plugin. The following event detail is found in the audit log:Which two points can be concluded from the given event?()

A.A connection as the user kate was successful

B.A connection failed due to authentication being unsuccessful

C.A connection was attempted via socket rather than TCP

D.A connection was blocked by a firewall or a similar security mechanism

E.A connection failed because the proxy user privileges did not match the login user


参考答案:B, E

第4题:

Which two commands can be used to monitor firewall user authentication?()

  • A、show access firewall-authentication
  • B、show security firewall-authentication users
  • C、show security audit log
  • D、show security firewall-authentication history

正确答案:B,D

第5题:

A  user  wants  to  be  permanently  added  to  the  dba  group.  Which  of  the  following  commands  or processes can be used to accomplish this()

  • A、chgrp
  • B、chuser
  • C、edit /etc/user
  • D、edit /etc/security/group

正确答案:B

第6题:

Which two statements regarding firewall user authentication client groups are true?() (Choose two.)

A. A client group is a list of clients associated with a group.

B. A client group is a list of groups associated with a client.

C. Client groups are referenced in security policy in the same manner in which individual clients are referenced.

D. Client groups are used to simplify configuration by enabling firewall user authentication without security policy.


参考答案:B, C

第7题:

Which two statements regarding firewall user authentication client groups are true?() (Choose two.)

  • A、A client group is a list of clients associated with a group.
  • B、A client group is a list of groups associated with a client.
  • C、Client groups are referenced in security policy in the same manner in which individual clients are referenced.
  • D、Client groups are used to simplify configuration by enabling firewall user authentication without security policy.

正确答案:B,C

第8题:

Click the Exhibit button.Given the configuration shown in the exhibit, which configuration object would be used to associate both Nancy andWalter with firewall user authentication within a security policy?()

A. ftp-group

B. ftp-users

C. firewall-user

D. nancy and walter


参考答案:A

第9题:

Which two firewall user authentication objects can be referenced in a security policy?()

  • A、access profile
  • B、client group
  • C、client
  • D、default profile

正确答案:B,C

第10题:

Which two statements are true regarding firewall user authentication?() (Choose two.)

  • A、When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.
  • B、When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.
  • C、If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .
  • D、If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.

正确答案:B,C

更多相关问题