单选题Which statement describes the Authentication Proxy feature?()A All traffic is permitted from the inbound to the outbound interface upon successful authentication of the user.B A specific access profile is retrieved from a TACACS+ or RADIUS server and a

题目
单选题
Which statement describes the Authentication Proxy feature?()
A

All traffic is permitted from the inbound to the outbound interface upon successful authentication of the user.

B

A specific access profile is retrieved from a TACACS+ or RADIUS server and applied to an IOS Firewall based on user provided credentials.

C

Prior to responding to a proxy ARP,the router will prompt the user for a login and password which are authenticated based on the configured AAA policy.

D

The proxy server capabilities of the IOS Firewall are enabled upon successful authentication of the user.

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which CLI command ensures that RADIUS packets are being sent to and received from the RADIUS server?()

A. show radius

B. show aaa domain-map

C. show aaa statistics

D. show radius authentication server


参考答案:C

第2题:

A new employee needs access to a SQL Server 2005 database that is located on a server named SQL1. You create a login named ajones by using the following Transact-SQL statement. CREATE LOGIN ajones WITH PASSWORD = ’SQLServer$1’ The new employee reports that when he logs in, he receives the following error message: "Login failed. The user is not associated with a trusted SQL Server connection." You need to resolve the error and allow the new employee to gain access to SQL1. What should you do?()

  • A、Change the SQL Server security mode from Windows Authentication mode to SQL Server and Windows authentication mode.
  • B、Change the SQL Server security mode from SQL Server and Windows Authentication mode to Windows authentication mode.
  • C、Ensure that the login name is created with square brackets ([]).
  • D、Give the login access to a specific database by using the CREATE USER Transact-SQL statement.

正确答案:A

第3题:

When using RADIUS as an external authentication method for 802.1X authentication for the Junos Pulse Access Control Service, what must you do to ensure that the RADIUS authentication works properly?()

A. Configure IP helper to forward the authentication requests from the clients to the external RADIUS server

B. Configure the supplicant as anexternal authentication server

C. Configure RADIUS proxy on the realm

D. Specify the correct RADIUS port 389 on the Junos Pulse Access Control Service


参考答案:C

第4题:

Authentication for user data traffic is important, but so is authentication for IP voice traffic. The Cisco 830 802.1 feature provides an easier method for allowing IP voice traffic through the VPN, because it().

  • A、requires access lists to identify the voice traffic 
  • B、can allow traffic from a device without 802.1X authentication, by MAC address
  • C、can allow traffic from Cisco IP phones by listening to their CDP advertisements
  • D、allows all packets marked with a ToS of 5 to bypass authentication
  • E、allows all IP voice packets to bypass authentication via stateful inspection

正确答案:B,C

第5题:

Which CLI command ensures that RADIUS packets are being sent to and received from the RADIUS server?()

  • A、show radius
  • B、show aaa domain-map
  • C、show aaa statistics
  • D、show radius authentication server

正确答案:C

第6题:

On the serial interface of a router, an inbound access list is configured to deny all traffic from UDP and TCP ports 21, 23, and 25. All other traffic is permitted. Based on this information, which types of traffic will be allowed through this interface?()

A.SMTP

B.DNS

C.FTP

D.Telnet

E.HTTP

F.POP3


参考答案:B, E, F

第7题:

Which statement describes the behavior of a security policy?()

  • A、The implicit default security policy permits all traffic.
  • B、Traffic destined to the device itself always requires a security policy.
  • C、Traffic destined to the device’s incoming interface does not require a security policy.
  • D、The factory-default configuration permits all traffic from all interfaces.

正确答案:C

第8题:

Click the Exhibit button.What is the cause of the error shown in the exhibit?()

A. A RADIUS request is being received from a device that is not configured on the RADIUS Client page.

B. A user entered an incorrect password during RADIUS authentication.

C. A RADIUS proxy attempt failed to reach the configured proxy server.

D. The RADIUS shared secret is incorrect.


参考答案:A

第9题:

Which statement describes the Authentication Proxy feature?()

  • A、All traffic is permitted from the inbound to the outbound interface upon successful authentication of the user.
  • B、A specific access profile is retrieved from a TACACS+ or RADIUS server and applied to an IOS Firewall based on user provided credentials.
  • C、Prior to responding to a proxy ARP,the router will prompt the user for a login and password which are authenticated based on the configured AAA policy.
  • D、The proxy server capabilities of the IOS Firewall are enabled upon successful authentication of the user.

正确答案:B

第10题:

You are installing a new deployment of the Junos Pulse Access Control Service. You have an existing RADIUS server that has a populated user file. You are considering using the RADIUS proxy feature.Which consideration must you take into account?()

  • A、Your RADIUS server database must be replicated onto another device for redundancy.
  • B、Inner proxy creates a tunnel between the supplicant and the external server.
  • C、RADIUS proxy causes the role assignment process to be skipped.
  • D、Outer proxy configuration passes authentication data to the external RADIUS server in clear text.

正确答案:C

更多相关问题