多选题Which three authentication resources are grouped within an authentication realm?()AAuthentication enforcerBDirectory serverCCaptive authenticationDAuthentication policyERole-mapping rules

题目
多选题
Which three authentication resources are grouped within an authentication realm?()
A

Authentication enforcer

B

Directory server

C

Captive authentication

D

Authentication policy

E

Role-mapping rules


相似考题
更多“多选题Which three authentication resources are grouped within an authentication realm?()AAuthentication enforcerBDirectory serverCCaptive authenticationDAuthentication policyERole-mapping rules”相关问题
  • 第1题:

    Which action is optional when adding an authentication realm for use on an Infranet Controller? ()

    A. Modify sign-in policy.

    B. Configure role mapping.

    C. Assign authentication server.

    D. Configure authentication policy.


    参考答案:D

  • 第2题:

    An authentication realm consists of which three authentication resources?()

    • A、Authentication server
    • B、Session options
    • C、Authentication policy
    • D、End-point security policy
    • E、Role-mapping rules

    正确答案:A,C,E

  • 第3题:

    Which three authentication server types are supported for retrieving user attributes used in role- mapping rules?()

    • A、LDAP
    • B、S/Key
    • C、TACACS+
    • D、RADIUS
    • E、SiteMinder

    正确答案:A,D,E

  • 第4题:

    Which two statements regarding external authentication servers for firewall userauthentication are true?()

    • A、Up to three external authentication server types can be used simultaneously.
    • B、Only one external authentication server type can be used simultaneously.
    • C、If the local password database is not configured in the authentication order, and the configured authentication server is unreachable, authentication is not performed.
    • D、If the local password database is not configured in the authentication order, and the configured authentication server rejects the authentication request, authentication is not performed

    正确答案:B,D

  • 第5题:

    Which three authentication resources are grouped within an authentication realm?()

    • A、Authentication enforcer
    • B、Directory server
    • C、Captive authentication
    • D、Authentication policy
    • E、Role-mapping rules

    正确答案:B,D,E

  • 第6题:

    多选题
    On which three traffic types does firewall pass-through authentication work? ()(Choose three.)
    A

    ping

    B

    FTP

    C

    Telnet

    D

    HTTP

    E

    HTTPS


    正确答案: A,E
    解析: 暂无解析

  • 第7题:

    多选题
    Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)
    A

    access profile

    B

    client group

    C

    client

    D

    default profile

    E

    external


    正确答案: A,C
    解析: 暂无解析

  • 第8题:

    多选题
    Which two statements regarding external authentication servers for firewall userauthentication are true?()
    A

    Up to three external authentication server types can be used simultaneously.

    B

    Only one external authentication server type can be used simultaneously.

    C

    If the local password database is not configured in the authentication order, and the configured authentication server is unreachable, authentication is not performed.

    D

    If the local password database is not configured in the authentication order, and the configured authentication server rejects the authentication request, authentication is not performed


    正确答案: B,A
    解析: 暂无解析

  • 第9题:

    多选题
    Which two statements regarding external authentication servers for firewall user authentication are true?() (Choose two.)
    A

    Up to three external authentication server types can be used simultaneously.

    B

    Only one external authentication server type can be used simultaneously.

    C

    If the local password database is not configured in the authentication order, and the configured authentication server  bypassed.

    D

    If the local password database is not configured in the authentication order, and the configured authentication server authentication is rejected.


    正确答案: B,A
    解析: 暂无解析

  • 第10题:

    多选题
    Which three authentication resources are grouped within an authentication realm?()
    A

    Authentication enforcer

    B

    Directory server

    C

    Captive authentication

    D

    Authentication policy

    E

    Role-mapping rules


    正确答案: E,C
    解析: 暂无解析

  • 第11题:

    单选题
    Which the security mechanism uses the concept of a realm?()
    A

     authorization

    B

     data integrity

    C

     confidentiality

    D

     authentication


    正确答案: A
    解析: 暂无解析

  • 第12题:

    多选题
    Which two statements about using the CHAP authentication mechanism in a PPP link are true?()
    A

    CHAP uses a two-way handshake

    B

    CHAP authentication periodically occurs after link establishment

    C

    CHAP has no protection from playback attacks

    D

    CHAP authentication is performed only upon link establishment

    E

    CHAP uses a three-way handshake

    F

    CHAP authentication passwords are sent in plaintext


    正确答案: E,D
    解析: 暂无解析

  • 第13题:

    Which additional configuration must be completed when setting up role restrictions using certificates? ()

    A. Set up a certificate authentication server.

    B. Configure the authentication realm to remember certificate information.

    C. Configure the authentication realm to use a certificate server for authentication.

    D. Configure a role mapping rule requiring certification information to map user to role.


    参考答案:B

  • 第14题:

    Which security mechanism uses the concept of a realm?()

    • A、Authorization
    • B、Data integrity
    • C、Confidentiality
    • D、Authentication

    正确答案:D

  • 第15题:

    Which action is optional when adding an authentication realm for use on an Infranet Controller? ()

    • A、Modify sign-in policy.
    • B、Configure role mapping.
    • C、Assign authentication server.
    • D、Configure authentication policy.

    正确答案:D

  • 第16题:

    Which additional configuration must be completed when setting up role restrictions using certificates? ()

    • A、Set up a certificate authentication server.
    • B、Configure the authentication realm to remember certificate information.
    • C、Configure the authentication realm to use a certificate server for authentication.
    • D、Configure a role mapping rule requiring certification information to map user to role.

    正确答案:B

  • 第17题:

    Which two statements regarding external authentication servers for firewall user authentication are true?() (Choose two.)

    • A、Up to three external authentication server types can be used simultaneously.
    • B、Only one external authentication server type can be used simultaneously.
    • C、If the local password database is not configured in the authentication order, and the configured authentication server  bypassed.
    • D、If the local password database is not configured in the authentication order, and the configured authentication server authentication is rejected.

    正确答案:B,D

  • 第18题:

    多选题
    Which three authentication options does IS-IS support?()
    A

    MD5

    B

    DES

    C

    Kerberos

    D

    Unauthenticated

    E

    Simple password


    正确答案: B,E
    解析: 暂无解析

  • 第19题:

    多选题
    Which three authentication server types are supported for retrieving user attributes used in role- mapping rules?()
    A

    LDAP

    B

    S/Key

    C

    TACACS+

    D

    RADIUS

    E

    SiteMinder


    正确答案: C,E
    解析: 暂无解析

  • 第20题:

    多选题
    What are two steps to configure user authentication for a Junos Pulse Access Control Service?()
    A

    Configure an authentication policy as part of the user role definitions.

    B

    Configure a Sign-in Policy.

    C

    Configure authentication agents as part of the user role definitions

    D

    Configure an authentication policy as part of the authentication realm definition.


    正确答案: B,D
    解析: 暂无解析

  • 第21题:

    多选题
    An authentication realm consists of which three authentication resources?()
    A

    Authentication server

    B

    Session options

    C

    Authentication policy

    D

    End-point security policy

    E

    Role-mapping rules


    正确答案: B,D
    解析: 暂无解析

  • 第22题:

    多选题
    Which three user authentication methods are supported by the Junos OS?()
    A

    RADIUS

    B

    CHAP

    C

    local user database

    D

    TACACS+

    E

    PAP


    正确答案: A,C
    解析: 暂无解析

  • 第23题:

    多选题
    Which of the following procedures are involved in the recommended three-step troubleshootingflow?(Choose the best three answers.)()
    A

    Problem report

    B

    Problem collaboration

    C

    Problem diagnosis

    D

    Problem resolution

    E

    Problem documentation

    F

    Probiem authentication


    正确答案: C,A
    解析: 暂无解析

  • 第24题:

    多选题
    Which three advanced permit actions within security policies are valid?() (Choose three.)
    A

    Mark permitted traffic for firewall user authentication.

    B

    Mark permitted traffic for SCREEN options.

    C

    Associate permitted traffic with an IPsec tunnel.

    D

    Associate permitted traffic with a NAT rule.

    E

    Mark permitted traffic for IDP processing.


    正确答案: B,D
    解析: 暂无解析