dial-up VPN
IKE authentication
XAuth authentication
shared IKE authentication
第1题:
Which two primary port authentication protocols are used with VSANs?()
第2题:
What is not a difference between VPN tunnel authentication and per-user authentication?()
第3题:
IPSec中定义密钥交换的协议是()。
第4题:
Which two methods of authentication are used by the Infranet Controller for IPSec enforcement?()
第5题:
Which two statements regarding external authentication servers for firewall userauthentication are true?()
第6题:
What will serve as a RADIUS Client to the Infranet Controller for 802.1x authentication? ()
第7题:
You need to design a method of communication between the IT and HR departments. Your solution must meet business requirements. What should you do?()
第8题:
dial-up VPN
IKE authentication
XAuth authentication
shared IKE authentication
第9题:
Up to three external authentication server types can be used simultaneously.
Only one external authentication server type can be used simultaneously.
If the local password database is not configured in the authentication order, and the configured authentication server is unreachable, authentication is not performed.
If the local password database is not configured in the authentication order, and the configured authentication server rejects the authentication request, authentication is not performed
第10题:
IKE
PAP
CHAP
MSCHAP
第11题:
VPN tunnel authentication is part of the IKE specification.
VPN tunnel authentication does not control which end user can use the IPSec SA (VPN tunnel).
User authentication is used to control access for a specific user ID, and can be used with or without a VPN tunnel for network access authorization.
802.1X with EAP-TLS (X.509 certificates) can be used to authenticate an IPSec tunnel.
第12题:
show access firewall-authentication
show security firewall-authentication users
show security audit log
show security firewall-authentication history
第13题:
IPSec VPN is a widely-acknowledged solution for enterprise network. Which three IPsec VPNstatements are true?()
第14题:
Which two commands can be used to monitor firewall user authentication?()
第15题:
Which two external authentication methods are supported by the Junos OS for user authentication?()
第16题:
Which action is optional when adding an authentication realm for use on an Infranet Controller? ()
第17题:
Which two statements regarding external authentication servers for firewall user authentication are true?() (Choose two.)
第18题:
In a PPP over ATM environment,which two PPP authentication methods are supported by the ERX Edge Router?()
第19题:
SPAP
CHAP
DHCHAP
ESP
第20题:
When a router receives a failure response, it stops querying authentication methods.
When a router receives an error response, it stops querying authentication methods.
If the router receives a failure response from an authentication method, it queries the next method.
The router does not differentiate between failure and error responses; the authentication process is always interrupted.
If it receives no response from the authentication method, a router will determine the error condition on its own; the router also has the option to proceed to the next method in a list if configured accordingly.
第21题:
Up to three external authentication server types can be used simultaneously.
Only one external authentication server type can be used simultaneously.
If the local password database is not configured in the authentication order, and the configured authentication server bypassed.
If the local password database is not configured in the authentication order, and the configured authentication server authentication is rejected.
第22题:
clear system login
boot -s
recovery
delete system root-authentication
第23题:
RADIUS
KERBEROS
LDAP
TACACS+
第24题:
IKE keepalives are unidirectional and sent every ten seconds
IPsec uses the Encapsulating Security Protocol (ESP) or the Authentication Header (AH)protocol for exchanging keys
To establish IKE SA, main mode utilizes six packets while aggressive mode utilizes only threepackets
IKE uses the Diffie-Hellman algorithm to generate symmetrical keys to be used by IPsec peers