SSH
Telnet
ICMP
OSPF
HTTP
第1题:
Which two firewall user authentication objects can be referenced in a security policy?()
第2题:
Which two commands can be used to monitor firewall user authentication?()
第3题:
A user wants to establish an HTTP session to a server behind an SRX device but is being pointed to Web page on the SRX device for additional authentication.Which type of user authentication is configured?()
第4题:
Which statement describes the Authentication Proxy feature?()
第5题:
Which two statements regarding external authentication servers for firewall user authentication are true?() (Choose two.)
第6题:
Which statement accurately describes firewall user authentication?()
第7题:
Mark permitted traffic for firewall user authentication.
Mark permitted traffic for SCREEN options.
Associate permitted traffic with an IPsec tunnel.
Associate permitted traffic with a NAT rule.
Mark permitted traffic for IDP processing.
第8题:
Individual clients are configured under client groups in the configuration hierarchy.
Client groups are configured under individual clients in the configuration hierarchy.
Client groups are referenced in security policy in the same manner in which individual clients are referenced.
Client groups are used to simplify configuration by enabling firewall user authentication without security policy.
第9题:
When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.
When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.
If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .
If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.
第10题:
Up to three external authentication server types can be used simultaneously.
Only one external authentication server type can be used simultaneously.
If the local password database is not configured in the authentication order, and the configured authentication server bypassed.
If the local password database is not configured in the authentication order, and the configured authentication server authentication is rejected.
第11题:
access profile
client group
client
default profile
第12题:
show access firewall-authentication
show security firewall-authentication users
show security audit log
show security firewall-authentication history
第13题:
On which three traffic types does firewall pass-through authentication work? ()(Choose three.)
第14题:
Which two statements are true regarding firewall user authentication?() (Choose two.)
第15题:
Which two traffic types trigger pass-through firewall user authentication?()
第16题:
Which two external authentication server types are supported by JUNOS Software for firewall user authentication?()
第17题:
Which two statements are true regarding firewall user authentication?()
第18题:
SSH
Telnet
ICMP
OSPF
HTTP
第19题:
ping
FTP
Telnet
HTTP
HTTPS
第20题:
When configured for pass-through firewall user authentication, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.
When configured for Web firewall user authentication only, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.
If a JUNOS security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted to perform authentication.
If a JUNOS security device is configured for Web firewall user authentication, new sessions are automatically intercepted to perform authentication.
第21题:
A client group is a list of clients associated with a group.
A client group is a list of groups associated with a client.
Client groups are referenced in security policy in the same manner in which individual clients are referenced.
Client groups are used to simplify configuration by enabling firewall user authentication without security policy.
第22题:
Resource access policy on the MAG Series device
IPsec routing policy on the MAG Series device
General traffic policy blocking access through the firewall enforcer
Auth table entry on the firewall enforcer
第23题:
RADIUS
TACACS+
LDAP
IIS
第24题:
Mark permitted traffic for firewall user authentication.
Mark permitted traffic for SCREEN options.
Associate permitted traffic with an IPsec tunnel.
Associate permitted traffic with a NAT rule.
Mark permitted traffic for IDP processing.