A company is using RADIUS to authenticate login requests to its Juniper Networks routers. Usersshould still be able to authenticate using the local password database but only if the RADIUS server is unreachable. Which JUNOS software configuration accomplishes this goal?()
第1题:
A.PPP
B.AAA
C.LCP
D.NCP
第2题:
A router has been configured with the settings shown below:[edit]user@host show system authentication-order authentication-order [ radius tacplus ];The router also has a local database that contains the user lab with password lab123. What would happen if both the RADIUS and the TACACS servers are not accessible?()
A.The user lab will not be able to login.
B.The user lab will be authenticated against the local database and will be able to login.
C.The user lab will receive an error message indicating the router is unable to authenticate due to the authentication servers not responding.
D.The user will be able to login only if tries to login as the root user.
第3题:
A. Configure IP helper to forward the authentication requests from the clients to the external RADIUS server
B. Configure the supplicant as anexternal authentication server
C. Configure RADIUS proxy on the realm
D. Specify the correct RADIUS port 389 on the Junos Pulse Access Control Service
第4题:
What is the objective of the aaa authentication login console-in local command?()
第5题:
Which two statements are correct about the aaa authentication login default grouptacacs+ localglobal configuration command? ()
第6题:
A company is using RADIUS to authenticate login requests to its Juniper Networks routers. Usersshould still be able to authenticate using the local password database but only if the RADIUS server is unreachable. Which JUNOS software configuration accomplishes this goal?()
A. authentication-order radius;
B. authentication-order password;
C. authentication-order [radius password];
D. authentication-order [password radius];
第7题:
A.MD5 and SHA
B.RADIUS and TACACS only
C.Local User Database
D.Local user Database, RADIUS, and TACACS+
第8题:
A.aaa new-model
B.aaa telnet login
C.telnet authentication login
D.authentication telnet login
第9题:
Which two statements about the open and shared key wireless-authentication methods are true? ()
第10题:
Your corporate network has a member server named RAS1 that runs Windows Server 2008 R2. You configure RAS1 to use the Routing and Remote Access Services (RRAS). The companyˉs remote access policy allows members of the Domain Users group to dial in to RAS1. The company issues smart cards to all employees. You need to ensure that smart card users are able to connect to RAS1 by using a dial-up connection. What should you do?()