Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)
第1题:
A. Mark permitted traffic for firewall user authentication.
B. Mark permitted traffic for SCREEN options.
C. Associate permitted traffic with an IPsec tunnel.
D. Associate permitted traffic with a NAT rule.
E. Mark permitted traffic for IDP processing.
第2题:
Which two statements regarding firewall user authentication client groups are true?() (Choose two.)
第3题:
A. A client group is a list of clients associated with a group.
B. A client group is a list of groups associated with a client.
C. Client groups are referenced in security policy in the same manner in which individual clients are referenced.
D. Client groups are used to simplify configuration by enabling firewall user authentication without security policy.
第4题:
Which two statements are true regarding firewall user authentication?() (Choose two.)
第5题:
On which three traffic types does firewall pass-through authentication work? ()(Choose three.)
第6题:
A. access profile
B. client group
C. client
D. default profile
E. external
第7题:
Which two firewall user authentication objects can be referenced in a security policy?()
第8题:
A. mode
B. preshared key
C. external interface
D. security proposals
E. dead peer detection settings
第9题:
Which two commands can be used to monitor firewall user authentication?()
第10题:
Which two statements regarding firewall user authentication client groups are true?()