Whitch three user authentication methos are supported by the Junos OS?() A. RADIUSB. CHAPC. local user databaseD. tacacs+E. PAP

Whitch three user authentication methos are supported by the Junos OS?()

A. RADIUS

B. CHAP

C. local user database

D. tacacs+

E. PAP


相关考题:

[A] nominated [B] selected [C] appointed [D] supported

Giventheconfigurationshownintheexhibit,whichconfigurationobjectwouldbeusedtoassociatebothNancyandWalterwithfirewalluserauthenticationwithinasecuritypolicy?()profileftp-users{clientnancy{firewall-user{password$9$lJ8vLNdVYZUHKMi.PfzFcyrvX7;SECRET-DATA}}clientwalter{firewall-user{password$9$a1UqfTQnApB36pBREKv4aJUk.5QF;SECRET-DATA}}session-options{client-groupftp-group;}}firewall-authentication{pass-through{default-profileftp-users;ftp{banner{loginJUNOSRocks!;}}}}A.ftp-groupB.ftp-usersC.firewall-userD.nancyandwalter

Assumethedefault-policyhasnotbeenconfigured.Giventheconfigurationshownintheexhibit,whichtwostatementsabouttrafficfromhost_aintheHRzonetohost_binthetrustzonearetrue?()[editsecuritypoliciesfrom-zoneHRto-zonetrust]user@hostshowpolicyone{match{source-addressany;destination-addressany;application[junos-httpjunos-ftp];}then{permit;}}policytwo{match{source-addresshost_a;destination-addresshost_b;application[junos-httpjunos-smtp];}then{deny;}}A.DNStrafficisdenied.B.HTTPtrafficisdenied.C.FTPtrafficispermitted.D.SMTPtrafficispermitted.

Giventheconfigurationshownintheexhibit,whichstatementistrueabouttrafficfromhost_atohost_b?()[editsecuritypoliciesfrom-zoneHRto-zonetrust]user@hostshowpolicytwo{match{source-addresssubnet_a;destination-addresshost_b;application[junos-telnetjunos-ping];}then{reject;}}policyone{match{source-addresshost_a;destination-addresssubnet_b;applicationany;}then{permit;}}host_aisinsubnet_aandhost_bisinsubnet_b.A.DNStrafficisdenied.B.Telnettrafficisdenied.C.SMTPtrafficisdenied.D.Pingtrafficispermitted

Intheconfigurationshownintheexhibit,youdecidedtoeliminatethejunos-ftpapplicationfromthematchconditionofthepolicyMyTraffic.[editsecuritypolicies]user@hostlshowfrom-zonePrivateto-zoneExternal{policyMyTraffic{match{source-addressmyHosts;destination-addressExtServers;application[junos-ftpjunos-bgp];}then{permit{tunnel{ipsec-vpnvpnTunnel;}}}}}policy-rematch;WhatwillhappentotheexistingFTPandBGPsessions?()A.TheexistingFTPandBGPsessionswillcontinue.B.TheexistingFTPandBGPsessionswillbere-evaluatedandonlyFTPsessionswillbedropped.C.TheexistingFTPandBGPsessionswillbere-evaluatedandallsessionswillbedropped.D.TheexistingFTPsessionswillcontinueandonlytheexistingBGPsessionswillbedropped.

Intheexhibit,youdecidedtochangemyHostsaddresses.[editsecuritypolicies]user@hostshowfrom-zonePrivateto-zoneExternal{policyMyTraffic{match{source-addressmyHosts;destination-addressExtServers;application[junos-ftpjunos-bgp];}then{permit{tunnel{ipsec-vpnvpnTunnel;}}}}}policy-rematch;Whatwillhappentothenewsessionsmatchingthepolicyandin-progresssessionsthathadalreadymatchedthepolicy?()A.Newsessionswillbeevaluated.In-progresssessionswillbere-evaluated.B.Newsessionswillbeevaluated.Allin-progresssessionswillcontinue.C.Newsessionswillbeevaluated.Allin-progresssessionswillbedropped.D.Newsessionswillhaltuntilallin-progresssessionsarere-evaluated.In-progresssessionswillbere-evaluatedandpossiblydropped.

A company is using RADIUS to authenticate login requests to its Juniper Networks routers. Usersshould still be able to authenticate using the local password database but only if the RADIUS server is unreachable. Which JUNOS software configuration accomplishes this goal?()A. authentication-order radius;B. authentication-order password;C. authentication-order [radius password];D. authentication-order [password radius];

CiscoNX-OSSoftwaresupportsSNMPv1,SNMPv2c,andSNMPv3.BothSNMPv1andSNMPv2cuseacommunity-basedformofsecurity.SNMPv3providessecureaccesstodevicesbyacombinationofauthenticatingandencryptingframesoverthenetwork.WhichsecurityfeaturesareprovidedinCiscoNX-OSSNMPv3?()A.encryption—scramblesthepacketcontentstopreventthemfrombeingseenbyunauthorizedsourcesB.password—apassword(communitystring)sentincleartextbetweenamanagerandagentforaddedprotectionC.authentication—determinesthatthemessageisfromavalidsourceD.messageintegrity—ensuresthatapackethasnotbeentamperedwithwhileitwasintransitE.user—todetermineifuserauthenticationisusedinsteadofcommunitystrings

He demolished my argument in minutes.A:disprovedB:acceptedC:disputedD:supported

He demolished my argument in minutes.A:disproved B:disputedC:acceptedD:supported