juniper认证考试

Which two statements regarding external authentication servers for firewall user authentication are true?() (Choose two.)A、Up to three external authentication server types can be used simultaneously.B、Only one external authentication server type can be us

题目

Which two statements regarding external authentication servers for firewall user authentication are true?() (Choose two.)

  • A、Up to three external authentication server types can be used simultaneously.
  • B、Only one external authentication server type can be used simultaneously.
  • C、If the local password database is not configured in the authentication order, and the configured authentication server  bypassed.
  • D、If the local password database is not configured in the authentication order, and the configured authentication server authentication is rejected.
参考答案和解析
正确答案:B,D
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which two statements regarding firewall user authentication client groups are true?() (Choose two.)

A. A client group is a list of clients associated with a group.

B. A client group is a list of groups associated with a client.

C. Client groups are referenced in security policy in the same manner in which individual clients are referenced.

D. Client groups are used to simplify configuration by enabling firewall user authentication without security policy.


参考答案:B, C

第2题:

Which two statements are true regarding L2TP? ()(Choose two.)

A. Tunnels are initiated by the LAC

B. Tunnels are initiated by the LNS

C. By default, subscriber authentication occurs on the LNS

D. By default, subscriber authentication occurs on the LAC


参考答案:A, C

第3题:

Consider the Mysql Enterprise Audit plugin. Which statement is true when you identify a connection event that has used external authentication?()

A.The attribute "STATUS" is set to the string EXTERNAL_AUTH

B.The attribute "PRIV_USER" contains the username

C.The event type that is given in the attribute "NAME" is EXTERNAL_AUTH

D.There is no differentiation between native and external authentication events

E.External authentication is managed through external auditing logs

F.The "PROXY_PRIV" user shows a username if external authentication is used


参考答案:E

第4题:

Which two commands can be used to monitor firewall user authentication?()

  • A、show access firewall-authentication
  • B、show security firewall-authentication users
  • C、show security audit log
  • D、show security firewall-authentication history

正确答案:B,D

第5题:

Which two statements regarding firewall user authentication client groups are true?() (Choose two.)

  • A、A client group is a list of clients associated with a group.
  • B、A client group is a list of groups associated with a client.
  • C、Client groups are referenced in security policy in the same manner in which individual clients are referenced.
  • D、Client groups are used to simplify configuration by enabling firewall user authentication without security policy.

正确答案:B,C

第6题:

Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)

A. access profile

B. client group

C. client

D. default profile

E. external


参考答案:A, B, C

第7题:

Which two external authentication methods are supported by the Junos OS for user authentication?()

A. RADIUS

B. KERBEROS

C. IPsec

D. TACACS+


参考答案:A, D

第8题:

Which two statements are true regarding firewall user authentication?() (Choose two.)

A. When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.

B. When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.

C. If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .

D. If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.


参考答案:B, C

第9题:

Which two statements about authentication settings for DCNM-LAN are true? ()

  • A、 If none of the authentication servers that are configured for the current authentication mode responds to an authentication request, the DCNM-LAN server falls back to localauthentication.
  • B、 DCNM-LAN only supports TACACS+.
  • C、 Each DCNM-LAN server will have the same device credentials.
  • D、 Administering DCNM-LAN authentication settings requires an authentication license.
  • E、 DCNM-LAN server users are local to the DCNM-LAN server.

正确答案:A,E

第10题:

Which two statements are true regarding firewall user authentication?() (Choose two.)

  • A、When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.
  • B、When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.
  • C、If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .
  • D、If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.

正确答案:B,C

更多相关问题