多选题An authentication realm consists of which three authentication resources?()AAuthentication serverBSession optionsCAuthentication policyDEnd-point security policyERole-mapping rules

题目
多选题
An authentication realm consists of which three authentication resources?()
A

Authentication server

B

Session options

C

Authentication policy

D

End-point security policy

E

Role-mapping rules

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which three authentication resources are grouped within an authentication realm?()

A. Authentication enforcer

B. Directory server

C. Captive authentication

D. Authentication policy

E. Role-mapping rules


参考答案:B, D, E

第2题:

Which action is optional when adding an authentication realm for use on an Infranet Controller? ()

A. Modify sign-in policy.

B. Configure role mapping.

C. Assign authentication server.

D. Configure authentication policy.


参考答案:D

第3题:

An authentication realm consists of which three authentication resources?()

A. Authentication server

B. Session options

C. Authentication policy

D. End-point security policy

E. Role-mapping rules


参考答案:A, C, E

第4题:

An authentication realm consists of which three authentication resources?()

  • A、Authentication server
  • B、Session options
  • C、Authentication policy
  • D、End-point security policy
  • E、Role-mapping rules

正确答案:A,C,E

第5题:

Which security mechanism is employed only on the server-side to limit access to resources or components?()

  • A、 authorization
  • B、 data integrity
  • C、 confidentiality
  • D、 authentication

正确答案:A

第6题:

Which three authentication server types are supported for retrieving user attributes used in role- mapping rules?()

A. LDAP

B. S/Key

C. TACACS+

D. RADIUS

E. SiteMinder


参考答案:A, D, E

第7题:

Which additional configuration must be completed when setting up role restrictions using certificates? ()

A. Set up a certificate authentication server.

B. Configure the authentication realm to remember certificate information.

C. Configure the authentication realm to use a certificate server for authentication.

D. Configure a role mapping rule requiring certification information to map user to role.


参考答案:B

第8题:

Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)

A. access profile

B. client group

C. client

D. default profile

E. external


参考答案:A, B, C

第9题:

Which two commands can be used to monitor firewall user authentication?()

  • A、show access firewall-authentication
  • B、show security firewall-authentication users
  • C、show security audit log
  • D、show security firewall-authentication history

正确答案:B,D

第10题:

Which security mechanism uses the concept of a realm?()

  • A、Authorization
  • B、Data integrity
  • C、Confidentiality
  • D、Authentication

正确答案:D

更多相关问题