access profile
client group
client
default profile
第1题:
Which two statements regarding firewall user authentication client groups are true?() (Choose two.)
第2题:
Which two commands can be used to monitor firewall user authentication?()
第3题:
Which statement describes the Authentication Proxy feature?()
第4题:
Under which configuration hierarchy is an access profile configured for firewall user authentication?()
第5题:
Which two statements are true regarding firewall user authentication?()
第6题:
Which statement accurately describes firewall user authentication?()
第7题:
ftp-group
ftp-users
firewall-user
nancy and walter
第8题:
Individual clients are configured under client groups in the configuration hierarchy.
Client groups are configured under individual clients in the configuration hierarchy.
Client groups are referenced in security policy in the same manner in which individual clients are referenced.
Client groups are used to simplify configuration by enabling firewall user authentication without security policy.
第9题:
When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.
When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.
If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .
If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.
第10题:
Up to three external authentication server types can be used simultaneously.
Only one external authentication server type can be used simultaneously.
If the local password database is not configured in the authentication order, and the configured authentication server bypassed.
If the local password database is not configured in the authentication order, and the configured authentication server authentication is rejected.
第11题:
[edit access]
[edit security access]
[edit firewall access]
[edit firewall-authentication]
第12题:
show access firewall-authentication
show security firewall-authentication users
show security audit log
show security firewall-authentication history
第13题:
Which two firewall user authentication objects can be referenced in a security policy?()
第14题:
Which two statements are true regarding firewall user authentication?() (Choose two.)
第15题:
Which two statements regarding firewall user authentication client groups are true?()
第16题:
Given the configuration shown in the exhibit, which configuration object would be used to associate bothNancy and Walter with firewall user authentication within a security policy?() profile ftp-users { client nancy { firewall-user { password "$9$lJ8vLNdVYZUHKMi.PfzFcyrvX7"; ## SECRET-DATA } } client walter { firewall-user { password "$9$a1UqfTQnApB36pBREKv4aJUk.5QF"; ## SECRET-DATA } } session-options { client-group ftp-group; } } firewall-authentication { pass-through { default-profile ftp-users;ftp { banner { login "JUNOS Rocks!"; } } } }
第17题:
Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)
第18题:
SSH
Telnet
ICMP
OSPF
HTTP
第19题:
access profile
client group
client
default profile
external
第20题:
When configured for pass-through firewall user authentication, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.
When configured for Web firewall user authentication only, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.
If a JUNOS security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted to perform authentication.
If a JUNOS security device is configured for Web firewall user authentication, new sessions are automatically intercepted to perform authentication.
第21题:
A client group is a list of clients associated with a group.
A client group is a list of groups associated with a client.
Client groups are referenced in security policy in the same manner in which individual clients are referenced.
Client groups are used to simplify configuration by enabling firewall user authentication without security policy.
第22题:
Resource access policy on the MAG Series device
IPsec routing policy on the MAG Series device
General traffic policy blocking access through the firewall enforcer
Auth table entry on the firewall enforcer
第23题:
RADIUS
TACACS+
LDAP
IIS