CMS专题

多选题Which two statements are true regarding firewall user authentication?()AWhen configured for pass-through firewall user authentication, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.B

题目
多选题
Which two statements are true regarding firewall user authentication?()
A

When configured for pass-through firewall user authentication, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.

B

When configured for Web firewall user authentication only, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.

C

If a JUNOS security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted to perform authentication.

D

If a JUNOS security device is configured for Web firewall user authentication, new sessions are automatically intercepted to perform authentication.

如果没有搜索结果,请直接 联系老师 获取答案。
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which two statements are true regarding L2TP? ()(Choose two.)

A. Tunnels are initiated by the LAC

B. Tunnels are initiated by the LNS

C. By default, subscriber authentication occurs on the LNS

D. By default, subscriber authentication occurs on the LAC


参考答案:A, C

第2题:

Which two statements are true about firewall filter configurations?()

  • A、Multiple action modifiers can be included in the same term.
  • B、Only a single action modifier can be included in the same term.
  • C、The default term within a firewall filter uses the discard action.
  • D、The default term within a firewall filter uses the reject action.

正确答案:A,C

第3题:

The user SYS creates a job by using the following command:Which two statements are true about the job that was created by the preceding command?()

A. The job is enabled by default after creation

B. The job is automatically dropped after the end date

C. The job executes with the privileges of the user SYS

D.


参考答案:B, C

第4题:

Which two statements are true regarding firewall user authentication?()

  • A、When configured for pass-through firewall user authentication, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.
  • B、When configured for Web firewall user authentication only, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.
  • C、If a JUNOS security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted to perform authentication.
  • D、If a JUNOS security device is configured for Web firewall user authentication, new sessions are automatically intercepted to perform authentication.

正确答案:B,C

第5题:

Which two statements are true regarding high-availability chassis clustering?()

  • A、A chassis cluster consists of two devices.
  • B、A chassis cluster consists of two or more devices.
  • C、Devices participating in a chassis cluster can be different models.
  • D、Devices participating in a chassis cluster must be the same models

正确答案:A,D

第6题:

Which two statements regarding firewall user authentication client groups are true?() (Choose two.)

  • A、A client group is a list of clients associated with a group.
  • B、A client group is a list of groups associated with a client.
  • C、Client groups are referenced in security policy in the same manner in which individual clients are referenced.
  • D、Client groups are used to simplify configuration by enabling firewall user authentication without security policy.

正确答案:B,C

第7题:

Which two statements are true regarding firewall user authentication?() (Choose two.)

  • A、When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.
  • B、When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.
  • C、If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .
  • D、If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.

正确答案:B,C

第8题:

Which two statements regarding symmetric key encryption are true?() (Choose two.)

A. The same key is used for encryption and decryption.

B. It is commonly used to create digital certificate signatures.

C. It uses two keys: one for encryption and a different key for decryption.

D. An attacker can decrypt data if the attacker captures the key used for encryption.


参考答案:A, D

第9题:

Which two statements are true regarding L2TP? ()(Choose two.)

  • A、Tunnels are initiated by the LAC
  • B、Tunnels are initiated by the LNS
  • C、By default, subscriber authentication occurs on the LNS
  • D、By default, subscriber authentication occurs on the LAC

正确答案:A,C

第10题:

Which two statements regarding asymmetric key encryption are true?()

  • A、The same key is used for encryption and decryption.
  • B、It is commonly used to create digital certificate signatures.
  • C、It uses two keys: one for encryption and a different key for decryption.
  • D、An attacker can decrypt data if the attacker captures the key used for encryption

正确答案:A,B

更多相关问题