Which three authentication server types are supported for retrieving user attributes used in role- mapping rules?()
第1题:
A. RADIUS
B. KERBEROS
C. IPsec
D. TACACS+
第2题:
A. Set up a certificate authentication server.
B. Configure the authentication realm to remember certificate information.
C. Configure the authentication realm to use a certificate server for authentication.
D. Configure a role mapping rule requiring certification information to map user to role.
第3题:
The configuration of a Web Services Security management (WSSM) Partner allows for the specification of XSL mapping rules. What is the input and output of these XSL mapping rules?()
第4题:
Which of the following is the MOST likely authentication scheme used in 802.1x?()
第5题:
An administrator has created three different Odyssey Access Client preconfiguration files and assigned them to three different roles in the same realm.Which action should the administrator take to ensure that users get the correct Odyssey Access Client preconfiguration file?()
第6题:
Which two external authentication server types are supported by JUNOS Software for firewall user authentication?()
第7题:
Which three authentication resources are grouped within an authentication realm?()
第8题:
Which three user authentication methods are supported by the Junos OS?()
第9题:
Whitch three user authentication methos are supported by the Junos OS?()
第10题:
LDAP
S/Key
TACACS+
RADIUS
SiteMinder
第11题:
Authentication server
Session options
Authentication policy
End-point security policy
Role-mapping rules
第12题:
RADIUS
CHAP
local user database
TACACS+
PAP
第13题:
A. RADIUS
B. CHAP
C. local user database
D. TACACS+
E. PAP
第14题:
A. RADIUS
B. CHAP
C. local user database
D. tacacs+
E. PAP
第15题:
An authentication realm consists of which three authentication resources?()
第16题:
Which two external authentication methods are supported by the Junos OS for user authentication?()
第17题:
Which two statements regarding external authentication servers for firewall userauthentication are true?()
第18题:
Which additional configuration must be completed when setting up role restrictions using certificates? ()
第19题:
Which two statements regarding external authentication servers for firewall user authentication are true?() (Choose two.)
第20题:
You are configuring an LDAP authentication server, and you want to configure role-mapping rules based on group membership. When you attempt to search for groups in the server catalog, no groups appear.Assuming the LDAP server is reachable and functioning properly, in the admin GUI. Which two parts of the configuration should you verify are correct?()
第21题:
RADIUS
CHAP
local user database
tacacs+
PAP
第22题:
Finding user entries
Authentication required
LDAP Server Type
Determining group membership
第23题:
Authentication enforcer
Directory server
Captive authentication
Authentication policy
Role-mapping rules