Which three user authentication methods are supported by the Junos OS?()A、RADIUSB、CHAPC、local user databaseD、TACACS+E、PAP

题目

Which three user authentication methods are supported by the Junos OS?()

  • A、RADIUS
  • B、CHAP
  • C、local user database
  • D、TACACS+
  • E、PAP
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which three user authentication methods are supported by the Junos OS?()

A. RADIUS

B. CHAP

C. local user database

D. TACACS+

E. PAP


参考答案:A, C, D

第2题:

Which user authenticaton method is supported by the Junos OS as the last resort alternative?()

A. TACACS+

B. RADIUS

C. local user database

D. enable password


参考答案:C

第3题:

Which two external authentication methods are supported by the Junos OS for user authentication?()

A. RADIUS

B. KERBEROS

C. IPsec

D. TACACS+


参考答案:A, D

第4题:

Which two external authentication methods are supported by the Junos OS for user authentication?()

  • A、RADIUS
  • B、KERBEROS
  • C、IPsec
  • D、TACACS+

正确答案:A,D

第5题:

Whitch three user authentication methos are supported by the Junos OS?()

A. RADIUS

B. CHAP

C. local user database

D. tacacs+

E. PAP


参考答案:A, C, D

第6题:

Which two external authentication servers are supported for administrative access to a Junos device?()

A. RADIUS

B. LDAP

C. ACE

D. TACACS+


参考答案:A, D

第7题:

Which user authentication methods are available in JUNOS?()

A.MD5 and SHA

B.RADIUS and TACACS only

C.Local User Database

D.Local user Database, RADIUS, and TACACS+


参考答案:D

第8题:

Which user authentication method is supported by the Junos OS as a last resort alternative?()

A. TACACS+

B. RADIUS

C. local user database

D. enable password


参考答案:C

第9题:

Which two statements are true regarding firewall user authentication?() (Choose two.)

  • A、When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.
  • B、When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.
  • C、If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .
  • D、If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.

正确答案:B,C

第10题:

Which three authentication server types are supported for retrieving user attributes used in role- mapping rules?()

  • A、LDAP
  • B、S/Key
  • C、TACACS+
  • D、RADIUS
  • E、SiteMinder

正确答案:A,D,E

更多相关问题