参考答案和解析
正确答案: C,A
解析: 暂无解析
更多“多选题Which two methods of authentication are used by the Infranet Controller for IPSec enforcement?()Adial-up VPNBIKE authenticationCXAuth authenticationDshared IKE authentication”相关问题
  • 第1题:

    Which two primary port authentication protocols are used with VSANs?()

    • A、SPAP
    • B、CHAP
    • C、DHCHAP
    • D、ESP

    正确答案:B,C

  • 第2题:

    What is not a difference between VPN tunnel authentication and per-user authentication?()

    • A、VPN tunnel authentication is part of the IKE specification. 
    • B、VPN tunnel authentication does not control which end user can use the IPSec SA (VPN tunnel).
    • C、User authentication is used to control access for a specific user ID, and can be used with or without a VPN tunnel for network access authorization. 
    • D、802.1X with EAP-TLS (X.509 certificates) can be used to authenticate an IPSec tunnel.

    正确答案:D

  • 第3题:

    IPSec中定义密钥交换的协议是()。

    • A、IKE(internet key exhcnage)
    • B、PAP(password authentication protocol)
    • C、CHAP(challenge handshake authentication protocol)
    • D、ESP(encapsulation seurity payload)

    正确答案:A

  • 第4题:

    Which two methods of authentication are used by the Infranet Controller for IPSec enforcement?()

    • A、dial-up VPN
    • B、IKE authentication
    • C、XAuth authentication
    • D、shared IKE authentication

    正确答案:A,C

  • 第5题:

    Which two statements regarding external authentication servers for firewall userauthentication are true?()

    • A、Up to three external authentication server types can be used simultaneously.
    • B、Only one external authentication server type can be used simultaneously.
    • C、If the local password database is not configured in the authentication order, and the configured authentication server is unreachable, authentication is not performed.
    • D、If the local password database is not configured in the authentication order, and the configured authentication server rejects the authentication request, authentication is not performed

    正确答案:B,D

  • 第6题:

    What will serve as a RADIUS Client to the Infranet Controller for 802.1x authentication? ()

    • A、an ACE server
    • B、a wireless network
    • C、an Ethernet switch
    • D、Odyssey Access Client

    正确答案:C

  • 第7题:

    You need to design a method of communication between the IT and HR departments. Your solution must meet business requirements. What should you do?()

    • A、Design a custom IPSec policy to implement Encapsulating Security Payload (ESP) for all IP traffic Design the IPSec policy to use certificate-based authentication between the two departments’ computers
    • B、Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computers
    • C、Design a customer IPSec policy to implement Encapsulating Payload (ESP) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computers
    • D、Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use certificate-based authentication between the two departments’ computers

    正确答案:A

  • 第8题:

    多选题
    Which two methods of authentication are used by the Infranet Controller for IPSec enforcement?()
    A

    dial-up VPN

    B

    IKE authentication

    C

    XAuth authentication

    D

    shared IKE authentication


    正确答案: A,C
    解析: 暂无解析

  • 第9题:

    多选题
    Which two statements regarding external authentication servers for firewall userauthentication are true?()
    A

    Up to three external authentication server types can be used simultaneously.

    B

    Only one external authentication server type can be used simultaneously.

    C

    If the local password database is not configured in the authentication order, and the configured authentication server is unreachable, authentication is not performed.

    D

    If the local password database is not configured in the authentication order, and the configured authentication server rejects the authentication request, authentication is not performed


    正确答案: B,A
    解析: 暂无解析

  • 第10题:

    多选题
    In a PPP over ATM environment,which two PPP authentication methods are supported by the ERX Edge Router?()
    A

    IKE

    B

    PAP

    C

    CHAP

    D

    MSCHAP


    正确答案: D,B
    解析: 暂无解析

  • 第11题:

    单选题
    What is not a difference between VPN tunnel authentication and per-user authentication?()
    A

    VPN tunnel authentication is part of the IKE specification. 

    B

    VPN tunnel authentication does not control which end user can use the IPSec SA (VPN tunnel).

    C

    User authentication is used to control access for a specific user ID, and can be used with or without a VPN tunnel for network access authorization. 

    D

    802.1X with EAP-TLS (X.509 certificates) can be used to authenticate an IPSec tunnel.


    正确答案: A
    解析: 暂无解析

  • 第12题:

    多选题
    Which two commands can be used to monitor firewall user authentication?()
    A

    show access firewall-authentication

    B

    show security firewall-authentication users

    C

    show security audit log

    D

    show security firewall-authentication history


    正确答案: C,D
    解析: 暂无解析

  • 第13题:

    IPSec VPN is a widely-acknowledged solution for enterprise network. Which three IPsec VPNstatements are true?()

    • A、IKE keepalives are unidirectional and sent every ten seconds
    • B、IPsec uses the Encapsulating Security Protocol (ESP) or the Authentication Header (AH)protocol for exchanging keys
    • C、To establish IKE SA, main mode utilizes six packets while aggressive mode utilizes only threepackets
    • D、IKE uses the Diffie-Hellman algorithm to generate symmetrical keys to be used by IPsec peers

    正确答案:A,C,D

  • 第14题:

    Which two commands can be used to monitor firewall user authentication?()

    • A、show access firewall-authentication
    • B、show security firewall-authentication users
    • C、show security audit log
    • D、show security firewall-authentication history

    正确答案:B,D

  • 第15题:

    Which two external authentication methods are supported by the Junos OS for user authentication?()

    • A、RADIUS
    • B、KERBEROS
    • C、IPsec
    • D、TACACS+

    正确答案:A,D

  • 第16题:

    Which action is optional when adding an authentication realm for use on an Infranet Controller? ()

    • A、Modify sign-in policy.
    • B、Configure role mapping.
    • C、Assign authentication server.
    • D、Configure authentication policy.

    正确答案:D

  • 第17题:

    Which two statements regarding external authentication servers for firewall user authentication are true?() (Choose two.)

    • A、Up to three external authentication server types can be used simultaneously.
    • B、Only one external authentication server type can be used simultaneously.
    • C、If the local password database is not configured in the authentication order, and the configured authentication server  bypassed.
    • D、If the local password database is not configured in the authentication order, and the configured authentication server authentication is rejected.

    正确答案:B,D

  • 第18题:

    In a PPP over ATM environment,which two PPP authentication methods are supported by the ERX Edge Router?()

    • A、IKE
    • B、PAP
    • C、CHAP
    • D、MSCHAP

    正确答案:B,C

  • 第19题:

    多选题
    Which two primary port authentication protocols are used with VSANs?()
    A

    SPAP

    B

    CHAP

    C

    DHCHAP

    D

    ESP


    正确答案: B,D
    解析: 暂无解析

  • 第20题:

    多选题
    Which of the following statements about authentication responses and conditions is true?()(Choose two.)
    A

    When a router receives a failure response, it stops querying authentication methods.

    B

    When a router receives an error response, it stops querying authentication methods.

    C

    If the router receives a failure response from an authentication method, it queries the next method.

    D

    The router does not differentiate between failure and error responses; the authentication process is always interrupted.

    E

    If it receives no response from the authentication method, a router will determine the error condition on its own; the router also has the option to proceed to the next method in a list if configured accordingly.


    正确答案: D,A
    解析: 暂无解析

  • 第21题:

    多选题
    Which two statements regarding external authentication servers for firewall user authentication are true?() (Choose two.)
    A

    Up to three external authentication server types can be used simultaneously.

    B

    Only one external authentication server type can be used simultaneously.

    C

    If the local password database is not configured in the authentication order, and the configured authentication server  bypassed.

    D

    If the local password database is not configured in the authentication order, and the configured authentication server authentication is rejected.


    正确答案: B,A
    解析: 暂无解析

  • 第22题:

    多选题
    Which two commands are used during the password recovery process?()
    A

    clear system login

    B

    boot -s

    C

    recovery

    D

    delete system root-authentication


    正确答案: A,B
    解析: 暂无解析

  • 第23题:

    多选题
    Which two external authentication methods are supported by the Junos OS for user authentication?()
    A

    RADIUS

    B

    KERBEROS

    C

    LDAP

    D

    TACACS+


    正确答案: A,D
    解析: 暂无解析

  • 第24题:

    多选题
    IPSec VPN is a widely-acknowledged solution for enterprise network. Which three IPsec VPNstatements are true?()
    A

    IKE keepalives are unidirectional and sent every ten seconds

    B

    IPsec uses the Encapsulating Security Protocol (ESP) or the Authentication Header (AH)protocol for exchanging keys

    C

    To establish IKE SA, main mode utilizes six packets while aggressive mode utilizes only threepackets

    D

    IKE uses the Diffie-Hellman algorithm to generate symmetrical keys to be used by IPsec peers


    正确答案: D,B
    解析: 暂无解析