单选题What is a function of a user role?()AIt defines the IPsec parameters for the role.BIt assigns access to resources.CIt associates the user with a RADIUS server.DIt defines the types of authentication methods available to the user

单选题
What is a function of a user role?()
A

It defines the IPsec parameters for the role.

B

It assigns access to resources.

C

It associates the user with a RADIUS server.

D

It defines the types of authentication methods available to the user


参考解析

解析: 暂无解析

相关考题:

What are two steps to configure user authentication for a Junos Pulse Access Control Service?() A. Configure an authentication policy as part of the user role definitions.B. Configure a Sign-in Policy.C. Configure authentication agents as part of the user role definitionsD. Configure an authentication policy as part of the authentication realm definition.

What is a function of a user role?() A. It defines the IPsec parameters for the role.B. It assigns access to resources.C. It associates the user with a RADIUS server.D. It defines the types of authentication methods available to the user

Click the Exhibit button.A customer configures the Junos Pulse Access Control Service with a Contractor role, an Employee role, and a Remediation role. A user logs in and is assigned the Remediation role. Referring to the exhibit, to which RADIUS Return Attributes Policy will the user be assigned?()A. CorporateVLANB. EmployeeVLANC. RemediationVLAND. GuestVLAN

A router has been configured with the settings shown below:[edit]user@host show system authentication-order authentication-order [ radius tacplus ];The router also has a local database that contains the user lab with password lab123. What would happen if both the RADIUS and the TACACS servers are not accessible?()A.The user lab will not be able to login.B.The user lab will be authenticated against the local database and will be able to login.C.The user lab will receive an error message indicating the router is unable to authenticate due to the authentication servers not responding.D.The user will be able to login only if tries to login as the root user.

Which user authentication methods are available in JUNOS?() A.MD5 and SHAB.RADIUS and TACACS onlyC.Local User DatabaseD.Local user Database, RADIUS, and TACACS+

In the fields of physical security and information security, access control is the selective restriction of access to a place or other resource. The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization (授权).An access control mechanism (71) between a user (or a process executing on behalf of a user) and system resources, such as applications, operating systems, firewalls, routers, files, and databases. The system must first authenticate(验证)a user seeking access. Typically the authentication function determines whether the user is (72) to access the system at all. Then the access control function determines if the specific requested access by this user is permitted. A security administrator maintains an authorization database that specifies what type of access to which resources is allowed for this user. The access control function consults this database to determine whether to(73)access. An auditing function monitors and keeps a record of user accesses to system resources.In practice, a number of(74)may cooperatively share the access control function. All operating systems have at least a rudimentary(基本的), and in many cases a quite robust, access control component. Add-on security packages can add to the(75)access control capabilities of the OS. Particular applications or utilities, such as a database management system, also incorporate access control functions. External devices, such as firewalls, can also provide access control services.A.open B.monitor C.grant D.seek

Which information is contained in a AAA authentication method list?()A、A pointer to the address where a RADIUS server can be locatedB、A sequential list of user authentication methodsC、A description of what a user can execute on a routerD、The setup for the authentication phase on a router

What is not a difference between VPN tunnel authentication and per-user authentication?()A、VPN tunnel authentication is part of the IKE specification. B、VPN tunnel authentication does not control which end user can use the IPSec SA (VPN tunnel).C、User authentication is used to control access for a specific user ID, and can be used with or without a VPN tunnel for network access authorization. D、802.1X with EAP-TLS (X.509 certificates) can be used to authenticate an IPSec tunnel.

What is a function of a user role?()A、It defines the IPsec parameters for the role.B、It assigns access to resources.C、It associates the user with a RADIUS server.D、It defines the types of authentication methods available to the user

What are two steps to configure user authentication for a Junos Pulse Access Control Service?()A、Configure an authentication policy as part of the user role definitions.B、Configure a Sign-in Policy.C、Configure authentication agents as part of the user role definitionsD、Configure an authentication policy as part of the authentication realm definition.

A router has been configured with the authentication order settings shown below: [edit] user@host# show system authentication-order authentication-order [radius tacplus password]; The router also has a local database that contains the user lab with password lab123. What would happen if both the RADIUS and the TACACS servers respond with a reject for user lab?()A、The user lab will not be able to login.B、The user lab will be authenticated against the local database and will be able to login.C、The user will be able to login only if tries to login as the root user.D、The user lab will receive an error message indicating the username and password provided could not be found on the radius and tacacs servers.

Chomsky defines “competence” as the ideal user’s k()of the rules of his language.

Which statement describes the Authentication Proxy feature?()A、All traffic is permitted from the inbound to the outbound interface upon successful authentication of the user.B、A specific access profile is retrieved from a TACACS+ or RADIUS server and applied to an IOS Firewall based on user provided credentials.C、Prior to responding to a proxy ARP,the router will prompt the user for a login and password which are authenticated based on the configured AAA policy.D、The proxy server capabilities of the IOS Firewall are enabled upon successful authentication of the user.

Which user authentication methods are available in JUNOS?()A、MD5 and SHAB、RADIUS and TACACS onlyC、Local User DatabaseD、Local user Database, RADIUS, and TACACS+

You manage Hyper-V host servers and virtual machines (VMs) by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You grant a user the Delegated Administrator user role. You need to provide the user with the ability to manage VMs through the VMM Self-Service Portal. What should you do?()A、In VMM, grant the user the Self-Service user role.B、In VMM, grant the user the Administrator user role.C、Enable the Integrated Windows Authentication option for the VMM Self-Service Portal.D、Enable the Single sign-on for Terminal Services option for the VMM Self-Service Portal.

Your company has a single Active Directory directory service domain. All servers in your environment run Windows Server 2003. You have a stand-alone server that serves as a Stand-alone root certification authority (CA). You need to ensure that a specific user can back up the CA and configure the audit parameters on the CA.  What should you do?()A、 Assign the user account to the CA Admin role.B、 Add the user account to the local Administrators group.C、 Grant the user the Back up files and directories user right.D、 Grant the user the Manage auditing and security log user right.

单选题Click the Exhibit button. What is the cause of the error shown in the exhibit?()A A RADIUS request is being received from a device that is not configured on the RADIUS Client page.B A user entered an incorrect password during RADIUS authentication.C A RADIUS proxy attempt failed to reach the configured proxy server.D The RADIUS shared secret is incorrect.

多选题Which three authentication server types are supported for retrieving user attributes used in role- mapping rules?()ALDAPBS/KeyCTACACS+DRADIUSESiteMinder

单选题What is a function of a user role?()AIt defines the IPsec parameters for the role.BIt assigns access to resources.CIt associates the user with a RADIUS server.DIt defines the types of authentication methods available to the user

单选题A router has been configured with the authentication order settings shown below: [edit] user@host# show system authentication-order authentication-order [radius tacplus password]; The router also has a local database that contains the user lab with password lab123. What would happen if both the RADIUS and the TACACS servers respond with a reject for user lab?()AThe user lab will not be able to login.BThe user lab will be authenticated against the local database and will be able to login.CThe user will be able to login only if tries to login as the root user.DThe user lab will receive an error message indicating the username and password provided could not be found on the radius and tacacs servers.

单选题A router has been configured with the settings shown below: [edit] user@host# show system authentication-order authentication-order [ radius tacplus ]; The router also has a local database that contains the user lab with password lab123. What would happen if both the RADIUS and the TACACS servers are not accessible?()AThe user lab will not be able to login.BThe user lab will be authenticated against the local database and will be able to login.CThe user lab will receive an error message indicating the router is unable to authenticate due to the authentication servers not responding.DThe user will be able to login only if tries to login as the root user.

单选题Which information is contained in a AAA authentication method list?()AA pointer to the address where a RADIUS server can be locatedBA sequential list of user authentication methodsCA description of what a user can execute on a routerDThe setup for the authentication phase on a router

单选题Which backup option defines a user-defined name for a backup? ()AFORMATBNAMECTAGDFORMAT U%

单选题Which statement describes the Authentication Proxy feature?()AAll traffic is permitted from the inbound to the outbound interface upon successful authentication of the user.BA specific access profile is retrieved from a TACACS+ or RADIUS server and applied to an IOS Firewall based on user provided credentials.CPrior to responding to a proxy ARP,the router will prompt the user for a login and password which are authenticated based on the configured AAA policy.DThe proxy server capabilities of the IOS Firewall are enabled upon successful authentication of the user.

单选题What is not a difference between VPN tunnel authentication and per-user authentication?()AVPN tunnel authentication is part of the IKE specification. BVPN tunnel authentication does not control which end user can use the IPSec SA (VPN tunnel).CUser authentication is used to control access for a specific user ID, and can be used with or without a VPN tunnel for network access authorization. D802.1X with EAP-TLS (X.509 certificates) can be used to authenticate an IPSec tunnel.

多选题Which three user authentication methods are supported by the Junos OS?()ARADIUSBCHAPClocal user databaseDTACACS+EPAP

单选题Which user authentication methods are available in JUNOS?()AMD5 and SHABRADIUS and TACACS onlyCLocal User DatabaseDLocal user Database, RADIUS, and TACACS+

单选题Your company has a single Active Directory directory service domain. All servers in your environment run Windows Server 2003. You have a stand-alone server that serves as a Stand-alone root certification authority (CA). You need to ensure that a specific user can back up the CA and configure the audit parameters on the CA.  What should you do?()A Assign the user account to the CA Admin role.B Add the user account to the local Administrators group.C Grant the user the Back up files and directories user right.D Grant the user the Manage auditing and security log user right.