When using RADIUS as an external authentication method for 8

题目
单选题
When using RADIUS as an external authentication method for 802.1X authentication for the Junos Pulse Access Control Service, what must you do to ensure that the RADIUS authentication works properly?()
A

Configure IP helper to forward the authentication requests from the clients to the external RADIUS server

B

Configure the supplicant as anexternal authentication server

C

Configure RADIUS proxy on the realm

D

Specify the correct RADIUS port 389 on the Junos Pulse Access Control Service

参考答案和解析
正确答案: C
解析: 暂无解析
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

You are installing a new deployment of the Junos Pulse Access Control Service. You have an existing RADIUS server that has a populated user file. You are considering using the RADIUS proxy feature.Which consideration must you take into account?()

A. Your RADIUS server database must be replicated onto another device for redundancy.

B. Inner proxy creates a tunnel between the supplicant and the external server.

C. RADIUS proxy causes the role assignment process to be skipped.

D. Outer proxy configuration passes authentication data to the external RADIUS server in clear text.


参考答案:C

第2题:

A company is using RADIUS to authenticate login requests to its Juniper Networks routers. Usersshould still be able to authenticate using the local password database but only if the RADIUS server is unreachable. Which JUNOS software configuration accomplishes this goal?()

A. authentication-order radius;

B. authentication-order password;

C. authentication-order [radius password];

D. authentication-order [password radius];


参考答案:A

第3题:

Consider the Mysql Enterprise Audit plugin. Which statement is true when you identify a connection event that has used external authentication?()

A.The attribute "STATUS" is set to the string EXTERNAL_AUTH

B.The attribute "PRIV_USER" contains the username

C.The event type that is given in the attribute "NAME" is EXTERNAL_AUTH

D.There is no differentiation between native and external authentication events

E.External authentication is managed through external auditing logs

F.The "PROXY_PRIV" user shows a username if external authentication is used


参考答案:E

第4题:

The authentication order configuration on your M120 includes the settings tacplus and radius (in that order), but does not include the password parameter. You attempt to log in to the device, but the network containing the authentication servers is currently down. Which statement is true about your login attempt?()

  • A、The login attempt is rejected.
  • B、The login attempt is automatically accepted after the authentication servers’ timeout value is reached, since there are no other authentication methods available.
  • C、The M120 automatically tries authenticating locally on the device after the authentication servers’ timeout value is reached.
  • D、The M120 automatically tries authenticating locally on the device before using external authentication.

正确答案:C

第5题:

Which of the following statements about authentication responses and conditions is true? ()(Choosetwo.)

  • A、When a router receives a failure response, it stops querying authentication methods.
  • B、When a router receives an error response, it stops querying authentication methods.
  • C、If the router receives a failure response from an authentication method, it queries the next method.
  • D、The router does not differentiate between failure and error responses; the authentication process is always interrupted.
  • E、If it receives no response from the authentication method, a router will determine the error condition On its own; the router also has the option to proceed to the next method in a list if configured accordingly.

正确答案:A,E

第6题:

How can you control which local IP address the ERX uses when communicating with a RADIUS server?()

A. radius update-source-address

B. radius calling-station-format

C. radius accounting server 10.13.7.55

D. radius authentication server 10.13.7.55


参考答案:A

第7题:

Which information is contained in a AAA authentication method list?()

  • A、A pointer to the address where a RADIUS server can be located
  • B、A sequential list of user authentication methods
  • C、A description of what a user can execute on a router
  • D、The setup for the authentication phase on a router

正确答案:B

第8题:

When using RADIUS as an external authentication method for 802.1X authentication for the Junos Pulse Access Control Service, what must you do to ensure that the RADIUS authentication works properly?()

A. Configure IP helper to forward the authentication requests from the clients to the external RADIUS server

B. Configure the supplicant as anexternal authentication server

C. Configure RADIUS proxy on the realm

D. Specify the correct RADIUS port 389 on the Junos Pulse Access Control Service


参考答案:C

第9题:

Which two statements about the open and shared key wireless-authentication methods are true? ()

  • A、 Shared key authentication is considered more secure than open authentication.
  • B、 Shared key authentication is considered less secure than open authentication.
  • C、 If the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer data.
  • D、 If the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer data.
  • E、 If the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data.

正确答案:B,D

第10题:

How can you control which local IP address the ERX uses when communicating with a RADIUS server?()

  • A、radius update-source-address
  • B、radius calling-station-format
  • C、radius accounting server 10.13.7.55
  • D、radius authentication server 10.13.7.55

正确答案:A

更多相关问题