A company is using RADIUS to authenticate login requests to its Juniper Networks routers. Usersshould still be able to authenticate using the local password database but only if the RADIUS server is unreachable. Which JUNOS software configuration accompli

题目

A company is using RADIUS to authenticate login requests to its Juniper Networks routers. Usersshould still be able to authenticate using the local password database but only if the RADIUS server is unreachable. Which JUNOS software configuration accomplishes this goal?()

  • A、authentication-order radius;
  • B、authentication-order password;
  • C、authentication-order [radius password];
  • D、authentication-order [password radius];
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which software process sorts client login requests and assigns them to a virtual router for RADIUS service?()

A.PPP

B.AAA

C.LCP

D.NCP


参考答案:B

第2题:

A router has been configured with the settings shown below:[edit]user@host show system authentication-order authentication-order [ radius tacplus ];The router also has a local database that contains the user lab with password lab123. What would happen if both the RADIUS and the TACACS servers are not accessible?()

A.The user lab will not be able to login.

B.The user lab will be authenticated against the local database and will be able to login.

C.The user lab will receive an error message indicating the router is unable to authenticate due to the authentication servers not responding.

D.The user will be able to login only if tries to login as the root user.


参考答案:B

第3题:

When using RADIUS as an external authentication method for 802.1X authentication for the Junos Pulse Access Control Service, what must you do to ensure that the RADIUS authentication works properly?()

A. Configure IP helper to forward the authentication requests from the clients to the external RADIUS server

B. Configure the supplicant as anexternal authentication server

C. Configure RADIUS proxy on the realm

D. Specify the correct RADIUS port 389 on the Junos Pulse Access Control Service


参考答案:C

第4题:

What is the objective of the aaa authentication login console-in local command?()

  • A、It specifies the login authentication method list named console-in using the local user database on the router
  • B、It specifies the login authorization method list named console-in using the local RADIUS username-password data base
  • C、It specifies the login authentication list named console-in using the local username- password data base on the router
  • D、It specifies the login authorization method list named console-in using the local username- password data base on the router

正确答案:A

第5题:

Which two statements are correct about the aaa authentication login default grouptacacs+ localglobal configuration command? ()

  • A、 this login authenticationmethod list is automaticallyapplied to all lines except those that have a named method list explicitly defined
  • B、 If the user fails the TACACS+ authentication then the local database on the router will be used to authenticatethe user
  • C、 if the tacacs+ server fails to respond then the local database on the router will be used to authenticate the user 
  • D、 "login" is the name of the method list being configured
  • E、 if the tacacs+ server is unavailable, authentication will succeed automaticallyby default

正确答案:A,C

第6题:

A company is using RADIUS to authenticate login requests to its Juniper Networks routers. Usersshould still be able to authenticate using the local password database but only if the RADIUS server is unreachable. Which JUNOS software configuration accomplishes this goal?()

A. authentication-order radius;

B. authentication-order password;

C. authentication-order [radius password];

D. authentication-order [password radius];


参考答案:A

第7题:

Which user authentication methods are available in JUNOS?()

A.MD5 and SHA

B.RADIUS and TACACS only

C.Local User Database

D.Local user Database, RADIUS, and TACACS+


参考答案:D

第8题:

Which configuration command allows the router to utilize a RADIUS server to authenticate incoming Telnet users?()

A.aaa new-model

B.aaa telnet login

C.telnet authentication login

D.authentication telnet login


参考答案:A

第9题:

Which two statements about the open and shared key wireless-authentication methods are true? ()

  • A、 Shared key authentication is considered more secure than open authentication.
  • B、 Shared key authentication is considered less secure than open authentication.
  • C、 If the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer data.
  • D、 If the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer data.
  • E、 If the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data.

正确答案:B,D

第10题:

Your corporate network has a member server named RAS1 that runs Windows Server 2008 R2. You configure RAS1 to use the Routing and Remote Access Services (RRAS). The companyˉs remote access policy allows members of the Domain Users group to dial in to RAS1. The company issues smart cards to all employees. You need to ensure that smart card users are able to connect to RAS1 by using a dial-up connection. What should you do?()

  • A、Install the Network Policy Server (NPS) server role on RAS1.
  • B、Create a remote access policy that requires users to authenticate by using SPAP.
  • C、Create a remote access policy that requires users to authenticate by using EAP-TLS.
  • D、Create a remote access policy that requires users to authenticate by using MS-CHAP v2.

正确答案:C

更多相关问题