show access firewall-authentication
show security firewall-authentication users
show security audit log
show security firewall-authentication history
第1题:
A. When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.
B. When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.
C. If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .
D. If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.
第2题:
A. access profile
B. client group
C. client
D. default profile
E. external
第3题:
A.A connection as the user kate was successful
B.A connection failed due to authentication being unsuccessful
C.A connection was attempted via socket rather than TCP
D.A connection was blocked by a firewall or a similar security mechanism
E.A connection failed because the proxy user privileges did not match the login user
第4题:
Which two commands can be used to monitor firewall user authentication?()
第5题:
A user wants to be permanently added to the dba group. Which of the following commands or processes can be used to accomplish this()
第6题:
A. A client group is a list of clients associated with a group.
B. A client group is a list of groups associated with a client.
C. Client groups are referenced in security policy in the same manner in which individual clients are referenced.
D. Client groups are used to simplify configuration by enabling firewall user authentication without security policy.
第7题:
Which two statements regarding firewall user authentication client groups are true?() (Choose two.)
第8题:
Click the Exhibit button.Given the configuration shown in the exhibit, which configuration object would be used to associate both Nancy andWalter with firewall user authentication within a security policy?()
A. ftp-group
B. ftp-users
C. firewall-user
D. nancy and walter
第9题:
Which two firewall user authentication objects can be referenced in a security policy?()
第10题:
Which two statements are true regarding firewall user authentication?() (Choose two.)