Which three authentication resources are grouped within an authentication realm?()A、Authentication enforcerB、Directory serverC、Captive authenticationD、Authentication policyE、Role-mapping rules
Which three authentication resources are grouped within an authentication realm?()
- A、Authentication enforcer
- B、Directory server
- C、Captive authentication
- D、Authentication policy
- E、Role-mapping rules
相关考题:
Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by ESP?() (Choose three.) A. data integrityB. data confidentialityC. data authenticationD. outer IP header confidentialityE. outer IP header authentication
An authentication realm consists of which three authentication resources?() A. Authentication serverB. Session optionsC. Authentication policyD. End-point security policyE. Role-mapping rules
Which three authentication resources are grouped within an authentication realm?() A. Authentication enforcerB. Directory serverC. Captive authenticationD. Authentication policyE. Role-mapping rules
On which three traffic types does firewall pass-through authentication work? ()(Choose three.) A. pingB. FTPC. TelnetD. HTTPE. HTTPS
Which three RIP features are supported on the WX or WXC device? ()(Choose three.) A. SHA-1B. MD5 authenticationC. version 1 messagesD. version 2 messagesE. plain-text authentication
Which three authentication options does OSPF support?() A. DESB. MD5C. KerberosD. unauthenticatedE. simple password
Which of the following procedures are involved in the recommended three-step troubleshootingflow?(Choose the best three answers.)()A、Problem reportB、Problem collaborationC、Problem diagnosisD、Problem resolutionE、Problem documentationF、Probiem authentication
On which three traffic types does firewall pass-through authentication work? ()(Choose three.)A、pingB、FTPC、TelnetD、HTTPE、HTTPS
Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by ESP?() (Choose three.)A、data integrityB、data confidentialityC、data authenticationD、outer IP header confidentialityE、outer IP header authentication
An authentication realm consists of which three authentication resources?()A、Authentication serverB、Session optionsC、Authentication policyD、End-point security policyE、Role-mapping rules
Which two statements about using the CHAP authentication mechanism in a PPP link are true?()A、CHAP uses a two-way handshakeB、CHAP authentication periodically occurs after link establishmentC、CHAP has no protection from playback attacksD、CHAP authentication is performed only upon link establishmentE、CHAP uses a three-way handshakeF、CHAP authentication passwords are sent in plaintext
Which three authentication server types are supported for retrieving user attributes used in role- mapping rules?()A、LDAPB、S/KeyC、TACACS+D、RADIUSE、SiteMinder
Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)A、access profileB、client groupC、clientD、default profileE、external
Which three user authentication methods are supported by the Junos OS?()A、RADIUSB、CHAPC、local user databaseD、TACACS+E、PAP
多选题On which three traffic types does firewall pass-through authentication work? ()(Choose three.)ApingBFTPCTelnetDHTTPEHTTPS
多选题Which two statements about using the CHAP authentication mechanism in a PPP link are true?()ACHAP uses a two-way handshakeBCHAP authentication periodically occurs after link establishmentCCHAP has no protection from playback attacksDCHAP authentication is performed only upon link establishmentECHAP uses a three-way handshakeFCHAP authentication passwords are sent in plaintext
多选题Which three RIP features are supported on the WX or WXC device? ()(Choose three.)ASHA-1BMD5 authenticationCversion 1 messagesDversion 2 messagesEplain-text authentication
多选题Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by AH?() (Choose three.)Adata integrityBdata confidentialityCdata authenticationDouter IP header confidentialityEouter IP header authentication
多选题Which two statements regarding external authentication servers for firewall userauthentication are true?()AUp to three external authentication server types can be used simultaneously.BOnly one external authentication server type can be used simultaneously.CIf the local password database is not configured in the authentication order, and the configured authentication server is unreachable, authentication is not performed.DIf the local password database is not configured in the authentication order, and the configured authentication server rejects the authentication request, authentication is not performed
多选题Which two statements regarding external authentication servers for firewall user authentication are true?() (Choose two.)AUp to three external authentication server types can be used simultaneously.BOnly one external authentication server type can be used simultaneously.CIf the local password database is not configured in the authentication order, and the configured authentication server bypassed.DIf the local password database is not configured in the authentication order, and the configured authentication server authentication is rejected.
多选题An authentication realm consists of which three authentication resources?()AAuthentication serverBSession optionsCAuthentication policyDEnd-point security policyERole-mapping rules
多选题Which three authentication resources are grouped within an authentication realm?()AAuthentication enforcerBDirectory serverCCaptive authenticationDAuthentication policyERole-mapping rules
多选题Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)Aaccess profileBclient groupCclientDdefault profileEexternal
多选题Which three authentication options does OSPF support?()ADESBMD5CKerberosDUnauthenticatedESimple password
多选题Which three configuration steps must be completed for a Cisco router in order to enable local AAA login authentication?() (Choose three.)AApply the method list to an interfaceBSpecify the default method list and apply it to the interfaceCEnable AAADDefine a method list
多选题Which three user authentication methods are supported by the Junos OS?()ARADIUSBCHAPClocal user databaseDTACACS+EPAP
多选题Which three authentication server types are supported for retrieving user attributes used in role- mapping rules?()ALDAPBS/KeyCTACACS+DRADIUSESiteMinder