A. When a router receives a failure response, it stops querying authentication methods.
B. When a router receives an error response, it stops querying authentication methods.
C. If the router receives a failure response from an authentication method, it queries the next method.
D. The router does not differentiate between failure and error responses; the authentication process is always interrupted.
E. If it receives no response from the authentication method, a router will determine the error condition on its own; the router also has the option to proceed to the next method in a list if configured accordingly.
第1题:
A. 1 is the default precedence.
B. A lower number is preferred.
C. A higher number is preferred.
D. 100 is the default precedence.
第2题:
第3题:
Which of the following statements about authentication responses and conditions is true? ()(Choosetwo.)
第4题:
Which two statements are true regarding firewall user authentication?() (Choose two.)
第5题:
Which of the following statements about authentication responses and conditions is true?()(Choose two.)
第6题:
Which two statements are true about pool-based source NAT? ()(Choose two.)
第7题:
Which two statements are true about the duplexing of the backups taken by RMAN? ()(Choose two.)
第8题:
Traffic is clear text
Traffic is encrypted
They are initiated by the LNS
They are initiated by the LAC
第9题:
AH provides data integrity.
AH is identified by IP protocol 50.
AH is identified by IP protocol 51.
AH cannot work in conjunction with ESP
第10题:
When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.
When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.
If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .
If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.
第11题:
It is necessary to forward ARP requests to remote hosts.
It is necessary when translated traffic belongs to the same subnet as the ingress interface.
It is not automatic and you must configure it.
It is enabled by default and you do not need to configure it.
第12题:
Static NAT can only be used with destination NAT.
Static NAT rules take precedence over overlapping dynamic NAT rules.
NAT rules take precedence over overlapping static NAT rules.
A reverse mapping is automatically created.
第13题:
A. Tunnels are initiated by the LAC
B. Tunnels are initiated by the LNS
C. By default, subscriber authentication occurs on the LNS
D. By default, subscriber authentication occurs on the LAC
第14题:
Which two statements regarding firewall user authentication client groups are true?() (Choose two.)
第15题:
Which two statements are true about L2TP tunnels?() (Choose two.)
第16题:
Which statements are true about EIGRP successor routes (Choose two.)()。
第17题:
Which two statements are true regarding L2TP? ()(Choose two.)
第18题:
Which two statements are true about precedence values in policy?() (Choose two.)
第19题:
You can assign a logical interface to multiple zones.
You cannot assign a logical interface to multiple zones.
You can assign a logical interface to multiple routing instances.
You cannot assign a logical interface to multiple routing instances.
第20题:
When a router receives a failure response, it stops querying authentication methods.
When a router receives an error response, it stops querying authentication methods.
If the router receives a failure response from an authentication method, it queries the next method.
The router does not differentiate between failure and error responses; the authentication process is always interrupted.
If it receives no response from the authentication method, a router will determine the error condition On its own; the router also has the option to proceed to the next method in a list if configured accordingly.
第21题:
Tunnels are initiated by the LAC
Tunnels are initiated by the LNS
By default, subscriber authentication occurs on the LNS
By default, subscriber authentication occurs on the LAC
第22题:
A client group is a list of clients associated with a group.
A client group is a list of groups associated with a client.
Client groups are referenced in security policy in the same manner in which individual clients are referenced.
Client groups are used to simplify configuration by enabling firewall user authentication without security policy.
第23题:
Up to three external authentication server types can be used simultaneously.
Only one external authentication server type can be used simultaneously.
If the local password database is not configured in the authentication order, and the configured authentication server bypassed.
If the local password database is not configured in the authentication order, and the configured authentication server authentication is rejected.
第24题:
PAT is not supported.
PAT is enabled by default.
It supports the address-persistent configuration option.
It supports the junos-global configuration option.