CMS专题

多选题Which two statements regarding firewall user authentication client groups are true?() (Choose two.)AA client group is a list of clients associated with a group.BA client group is a list of groups associated with a client.CClient groups are referenced i

题目
多选题
Which two statements regarding firewall user authentication client groups are true?() (Choose two.)
A

A client group is a list of clients associated with a group.

B

A client group is a list of groups associated with a client.

C

Client groups are referenced in security policy in the same manner in which individual clients are referenced.

D

Client groups are used to simplify configuration by enabling firewall user authentication without security policy.

参考答案和解析
正确答案: D,A
解析: 暂无解析
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which two external authentication methods are supported by the Junos OS for user authentication?()

A. RADIUS

B. KERBEROS

C. IPsec

D. TACACS+


参考答案:A, D

第2题:

Which two statements are correct about the aaa authentication login default grouptacacs+ localglobal configuration command? ()

  • A、 this login authenticationmethod list is automaticallyapplied to all lines except those that have a named method list explicitly defined
  • B、 If the user fails the TACACS+ authentication then the local database on the router will be used to authenticatethe user
  • C、 if the tacacs+ server fails to respond then the local database on the router will be used to authenticate the user 
  • D、 "login" is the name of the method list being configured
  • E、 if the tacacs+ server is unavailable, authentication will succeed automaticallyby default

正确答案:A,C

第3题:

Consider the Mysql Enterprise Audit plugin. The following event detail is found in the audit log:Which two points can be concluded from the given event?()

A.A connection as the user kate was successful

B.A connection failed due to authentication being unsuccessful

C.A connection was attempted via socket rather than TCP

D.A connection was blocked by a firewall or a similar security mechanism

E.A connection failed because the proxy user privileges did not match the login user


参考答案:B, E

第4题:

Under which configuration hierarchy is an access profile configured for firewall user authentication?()

  • A、[edit access]
  • B、[edit security access]
  • C、[edit firewall access]
  • D、[edit firewall-authentication]

正确答案:A

第5题:

Which two traffic types trigger pass-through firewall user authentication?()

  • A、SSH
  • B、Telnet
  • C、ICMP
  • D、OSPF
  • E、HTTP

正确答案:B,E

第6题:

Which two statements regarding firewall user authentication client groups are true?() (Choose two.)

  • A、A client group is a list of clients associated with a group.
  • B、A client group is a list of groups associated with a client.
  • C、Client groups are referenced in security policy in the same manner in which individual clients are referenced.
  • D、Client groups are used to simplify configuration by enabling firewall user authentication without security policy.

正确答案:B,C

第7题:

Which two statements are true regarding firewall user authentication?() (Choose two.)

  • A、When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.
  • B、When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.
  • C、If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .
  • D、If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.

正确答案:B,C

第8题:

Which two statements are true regarding L2TP? ()(Choose two.)

A. Tunnels are initiated by the LAC

B. Tunnels are initiated by the LNS

C. By default, subscriber authentication occurs on the LNS

D. By default, subscriber authentication occurs on the LAC


参考答案:A, C

第9题:

Which statement describes the Authentication Proxy feature?()

  • A、All traffic is permitted from the inbound to the outbound interface upon successful authentication of the user.
  • B、A specific access profile is retrieved from a TACACS+ or RADIUS server and applied to an IOS Firewall based on user provided credentials.
  • C、Prior to responding to a proxy ARP,the router will prompt the user for a login and password which are authenticated based on the configured AAA policy.
  • D、The proxy server capabilities of the IOS Firewall are enabled upon successful authentication of the user.

正确答案:B

第10题:

Which two statements are true regarding L2TP? ()(Choose two.)

  • A、Tunnels are initiated by the LAC
  • B、Tunnels are initiated by the LNS
  • C、By default, subscriber authentication occurs on the LNS
  • D、By default, subscriber authentication occurs on the LAC

正确答案:A,C

更多相关问题