多选题Which three authentication resources are grouped within an authentication realm?()AAuthentication enforcerBDirectory serverCCaptive authenticationDAuthentication policyERole-mapping rules
多选题
Which three authentication resources are grouped within an authentication realm?()
A
Authentication enforcer
B
Directory server
C
Captive authentication
D
Authentication policy
E
Role-mapping rules
参考解析
解析:
暂无解析
相关考题:
An authentication realm consists of which three authentication resources?() A. Authentication serverB. Session optionsC. Authentication policyD. End-point security policyE. Role-mapping rules
Which three authentication resources are grouped within an authentication realm?() A. Authentication enforcerB. Directory serverC. Captive authenticationD. Authentication policyE. Role-mapping rules
A company has completed two acquisitions over the previous year. Each of the acquired companies was allowed to keep its own independent authentication server. The network administrator has been asked to roll out the Junos Pulse Access Control Service to users within the original company along with each of the two acquired organizations.The administrator configures three authentication realms, one for each independent authentication server, and associates them all with a single sign-in policy. All of the client endpoints are running Junos Pulse on their Windows XP desktops.When a user signs in to the Junos Pulse Access Control Service, which statement is correct?()A. The first authentication realm that was added to the sign-in policy is used by default.B. The user is allowed to choose the correct authentication realm from a list presented by Junos Pulse.C. When Junos Pulse is initially installed on the desktop, it must be configured with the correct realm.D. This is not an allowed configuration; the administrator should configure separate sign-in policies for each realm.
Which three authentication server types are supported for retrieving user attributes used in role- mapping rules?() A. LDAPB. S/KeyC. TACACS+D. RADIUSE. SiteMinder
Which action is optional when adding an authentication realm for use on an Infranet Controller? () A. Modify sign-in policy.B. Configure role mapping.C. Assign authentication server.D. Configure authentication policy.
Which additional configuration must be completed when setting up role restrictions using certificates? () A. Set up a certificate authentication server.B. Configure the authentication realm to remember certificate information.C. Configure the authentication realm to use a certificate server for authentication.D. Configure a role mapping rule requiring certification information to map user to role.
An authentication realm consists of which three authentication resources?()A、Authentication serverB、Session optionsC、Authentication policyD、End-point security policyE、Role-mapping rules
Which security mechanism uses the concept of a realm?()A、AuthorizationB、Data integrityC、ConfidentialityD、Authentication
Which three authentication server types are supported for retrieving user attributes used in role- mapping rules?()A、LDAPB、S/KeyC、TACACS+D、RADIUSE、SiteMinder
Which action is optional when adding an authentication realm for use on an Infranet Controller? ()A、Modify sign-in policy.B、Configure role mapping.C、Assign authentication server.D、Configure authentication policy.
Which two statements regarding external authentication servers for firewall userauthentication are true?()A、Up to three external authentication server types can be used simultaneously.B、Only one external authentication server type can be used simultaneously.C、If the local password database is not configured in the authentication order, and the configured authentication server is unreachable, authentication is not performed.D、If the local password database is not configured in the authentication order, and the configured authentication server rejects the authentication request, authentication is not performed
Which additional configuration must be completed when setting up role restrictions using certificates? ()A、Set up a certificate authentication server.B、Configure the authentication realm to remember certificate information.C、Configure the authentication realm to use a certificate server for authentication.D、Configure a role mapping rule requiring certification information to map user to role.
Which three authentication resources are grouped within an authentication realm?()A、Authentication enforcerB、Directory serverC、Captive authenticationD、Authentication policyE、Role-mapping rules
Which two statements regarding external authentication servers for firewall user authentication are true?() (Choose two.)A、Up to three external authentication server types can be used simultaneously.B、Only one external authentication server type can be used simultaneously.C、If the local password database is not configured in the authentication order, and the configured authentication server bypassed.D、If the local password database is not configured in the authentication order, and the configured authentication server authentication is rejected.
多选题On which three traffic types does firewall pass-through authentication work? ()(Choose three.)ApingBFTPCTelnetDHTTPEHTTPS
多选题Which three authentication options does IS-IS support?()AMD5BDESCKerberosDUnauthenticatedESimple password
多选题Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)Aaccess profileBclient groupCclientDdefault profileEexternal
多选题Which three authentication server types are supported for retrieving user attributes used in role- mapping rules?()ALDAPBS/KeyCTACACS+DRADIUSESiteMinder
多选题Which two statements regarding external authentication servers for firewall userauthentication are true?()AUp to three external authentication server types can be used simultaneously.BOnly one external authentication server type can be used simultaneously.CIf the local password database is not configured in the authentication order, and the configured authentication server is unreachable, authentication is not performed.DIf the local password database is not configured in the authentication order, and the configured authentication server rejects the authentication request, authentication is not performed
多选题What are two steps to configure user authentication for a Junos Pulse Access Control Service?()AConfigure an authentication policy as part of the user role definitions.BConfigure a Sign-in Policy.CConfigure authentication agents as part of the user role definitionsDConfigure an authentication policy as part of the authentication realm definition.
多选题Which two statements regarding external authentication servers for firewall user authentication are true?() (Choose two.)AUp to three external authentication server types can be used simultaneously.BOnly one external authentication server type can be used simultaneously.CIf the local password database is not configured in the authentication order, and the configured authentication server bypassed.DIf the local password database is not configured in the authentication order, and the configured authentication server authentication is rejected.
多选题An authentication realm consists of which three authentication resources?()AAuthentication serverBSession optionsCAuthentication policyDEnd-point security policyERole-mapping rules
多选题Which three user authentication methods are supported by the Junos OS?()ARADIUSBCHAPClocal user databaseDTACACS+EPAP
单选题Which the security mechanism uses the concept of a realm?()A authorizationB data integrityC confidentialityD authentication
多选题Which of the following procedures are involved in the recommended three-step troubleshootingflow?(Choose the best three answers.)()AProblem reportBProblem collaborationCProblem diagnosisDProblem resolutionEProblem documentationFProbiem authentication
多选题Which two statements about using the CHAP authentication mechanism in a PPP link are true?()ACHAP uses a two-way handshakeBCHAP authentication periodically occurs after link establishmentCCHAP has no protection from playback attacksDCHAP authentication is performed only upon link establishmentECHAP uses a three-way handshakeFCHAP authentication passwords are sent in plaintext
多选题Which three advanced permit actions within security policies are valid?() (Choose three.)AMark permitted traffic for firewall user authentication.BMark permitted traffic for SCREEN options.CAssociate permitted traffic with an IPsec tunnel.DAssociate permitted traffic with a NAT rule.EMark permitted traffic for IDP processing.