Which three firewall user authentication objects can be refe

题目
多选题
Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)
A

access profile

B

client group

C

client

D

default profile

E

external

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which information is contained in a AAA authentication method list?()

  • A、A pointer to the address where a RADIUS server can be located
  • B、A sequential list of user authentication methods
  • C、A description of what a user can execute on a router
  • D、The setup for the authentication phase on a router

正确答案:B

第2题:

Which two statements are true regarding firewall user authentication?() (Choose two.)

  • A、When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.
  • B、When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.
  • C、If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .
  • D、If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.

正确答案:B,C

第3题:

Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)

A. access profile

B. client group

C. client

D. default profile

E. external


参考答案:A, B, C

第4题:

Under which configuration hierarchy is an access profile configured for firewall user authentication?()

  • A、[edit access]
  • B、[edit security access]
  • C、[edit firewall access]
  • D、[edit firewall-authentication]

正确答案:A

第5题:

Which statement describes the Authentication Proxy feature?()

  • A、All traffic is permitted from the inbound to the outbound interface upon successful authentication of the user.
  • B、A specific access profile is retrieved from a TACACS+ or RADIUS server and applied to an IOS Firewall based on user provided credentials.
  • C、Prior to responding to a proxy ARP,the router will prompt the user for a login and password which are authenticated based on the configured AAA policy.
  • D、The proxy server capabilities of the IOS Firewall are enabled upon successful authentication of the user.

正确答案:B

第6题:

On which three traffic types does firewall pass-through authentication work? ()(Choose three.)

  • A、ping
  • B、FTP
  • C、Telnet
  • D、HTTP
  • E、HTTPS

正确答案:B,C,D

第7题:

Which two traffic types trigger pass-through firewall user authentication?()

  • A、SSH
  • B、Telnet
  • C、ICMP
  • D、OSPF
  • E、HTTP

正确答案:B,E

第8题:

On which three traffic types does firewall pass-through authentication work? ()(Choose three.)

A. ping

B. FTP

C. Telnet

D. HTTP

E. HTTPS


参考答案:B, C, D

第9题:

What are three different integrated UTM components available on the branch SRX Series devices?() (Choose three.)

  • A、antivirus (full AV, express AV)
  • B、antivirus (desktop AV)
  • C、Web filtering
  • D、antispam
  • E、firewall user authentication

正确答案:A,C,D

第10题:

Which two statements are true regarding firewall user authentication?()

  • A、When configured for pass-through firewall user authentication, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.
  • B、When configured for Web firewall user authentication only, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.
  • C、If a JUNOS security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted to perform authentication.
  • D、If a JUNOS security device is configured for Web firewall user authentication, new sessions are automatically intercepted to perform authentication.

正确答案:B,C

更多相关问题