多选题Which two statements are true regarding firewall user authentication?()AWhen configured for pass-through firewall user authentication, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.BWhen configured for Web firewall user authentication only, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.CIf a JUNOS security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted to perform authentication.DIf a JUNOS security device is configured for Web firewall user authentication, new sessions are automatically intercepted to perform authentication.

多选题
Which two statements are true regarding firewall user authentication?()
A

When configured for pass-through firewall user authentication, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.

B

When configured for Web firewall user authentication only, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.

C

If a JUNOS security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted to perform authentication.

D

If a JUNOS security device is configured for Web firewall user authentication, new sessions are automatically intercepted to perform authentication.


参考解析

解析: 暂无解析

相关考题:

单选题Which statement is true about source NAT?()ASource NAT works only with source pools.BDestination NAT is required to translate the reply traffic.CSource NAT does not require a security policy to function.DThe egress interface IP address can be used for source NAT

单选题Prior to applying SCREEN options to drop traffic, you want to determine how your configuration will affect traffic. Which mechanism would you configure to achieve this objective?()Athe log option for the particular SCREEN optionBthe permit option for the particular SCREEN optionCthe SCREEN option, because it does not drop traffic by defaultDthe alarm-without-drop option for the particular SCREEN option

单选题Which command is needed to change this policy to a tunnel policy for a policy-based VPN?() [edit security policies from-zone trust to-zone untrust] user@host# show policy tunnel-traffic { match { source-address local-net; destination-address remote-net; application any; then { permit; } }Aset policy tunnel-traffic then tunnel remote-vpnBset policy tunnel-traffic then permit tunnel remote-vpnCset policy tunnel-traffic then tunnel ipsec-vpn remote-vpn permitDset policy tunnel-traffic then permit tunnel ipsec-vpn remote-vpn

单选题What is the functionality of redundant interfaces (reth) in a chassis cluster?()Areth interfaces are used only for VRRP.Breth interfaces are the same as physical interfaces.Creth interfaces are pseudo-interfaces that are considered the parent interface for two physical interfaces.DEach cluster member has a reth interface that can be used to share session state information with the other cluster members.

单选题By default, which condition would cause a session to be removed from the session table?()ARoute entry for the session changed.BSecurity policy for the session changed.CThe ARP table entry for the source IP address timed out.DNo traffic matched the session during the timeout period.

单选题What is the purpose of a zone in JUNOS Software?()AA zone defines a group of security devices with a common management.BA zone defines the geographic region in which the security device is deployed.CA zone defines a group of network segments with similar security requirements.DA zone defines a group of network segments with similar class-of-service requirements.