单选题Under which configuration hierarchy is an access profile configured for firewall user authentication?()A[edit access]B[edit security access]C[edit firewall access]D[edit firewall-authentication]

单选题
Under which configuration hierarchy is an access profile configured for firewall user authentication?()
A

[edit access]

B

[edit security access]

C

[edit firewall access]

D

[edit firewall-authentication]


参考解析

解析: 暂无解析

相关考题:

You are modifying the default route preference under the [edit protocols] hierarchy. In which two routing information sources can you change the default preference value?() A. localB. OSPFC. directD. BGP

Which two login-class permissions could permit a user to view the system hierarchy of the active configuration?() A. system permissionB. view-configuration permissionC. network permissionD. super-user permission

Referring to the exhibit, you are unable to commit the configuration for the ge-0/0/1 interface. What must you do to commit the configuration?() A. You must set the vlan-tagging parameter under the [edit interfaces ge-0/0/1] hierarchy.B. You must use the rename command to change unit 100 to unit 0.C. You must set the encapsulation flexible-ethernet-services parameter under the [edit interfaces ge-0/0/1] hierarchy.D. You must set the encapsulation vlan-ccc parameter under the [edit interfaces ge-0/0/1 unit 100] hierarchy.

Which profile configuration command dynamically creates a host route in the routing table?() A.ip host routesB.ip access-routesC.host routes enabledD.access-routes enabled

You are moddifying the default route preference under the [edit protocols] hierarchy. In which two routing information sources can you change the default preference value?() A.localB.OSPFC.directD.BGP

Which three of the following protocols will be forwarded to a host specified by the ip helper - address interface configuration command if the configuration has not been modified by the ip forward - protocol udp global con figuration command?()A、BOOTPB、TFTPC、ARPD、DNSE、proxy - ARPF、FTP

Which profile configuration command dynamically creates a host route in the routing table?()A、ip host routesB、ip access-routesC、host routes enabledD、access-routes enabled

Which two firewall user authentication objects can be referenced in a security policy?()A、access profileB、client groupC、clientD、default profile

Which command is used to enable access to J-Web using HTTPS?()A、set system remote-access profile httpsB、set services remote-access profile j-web-httpsC、set system services web-management httpsD、set services web-management j-web-https

Which of the following can be used to re-deploy a system configuration in a disaster recovery scenario?()A、System planB、System profileC、Critical console dataD、VIO server partition profile

Under which configuration hierarchy is an access profile configured for firewall user authentication?()A、[edit access]B、[edit security access]C、[edit firewall access]D、[edit firewall-authentication]

In a Junos Pulse Access Control Service firewall enforcement configuration, what is the purpose of the source IP policy?()A、to specify the destination addresses to which access is permittedB、to specify the source address permitted to access the resourceC、to specify the services to which access is permittedD、to inform the enforcer to expect policy information from the Junos Pulse Access Control Service

How would an end user add both a Junos Pulse Access Control Service URL and a Junos Pulse Secure Access Service URL to the same Junos Pulse client?()A、By adding two separate connections in the connections dialog boxB、By adding two separate intranet Controllers under the configuration hierarchyC、By adding one intranet Controller and one SA under the configuration hierarchyD、By adding two URLs under a connection in the connections dialog box

Under which Junos hierarchy level are security policies configured?()A、[edit security]B、[edit protocols]C、[edit firewall]D、[edit policy-options]

单选题Which configuration command configures queue buffer allocation on the ERX Edge Router?()Aqos-profileBqueue-profileCscheduler-profileDtraffic-shape-profile

单选题Under which Junos hierarchy level are security policies configured?()A[edit security]B[edit protocols]C[edit firewall]D[edit policy-options]

单选题Which CLI command do you use to block MIME content at the [edit security utm feature-profile] hierarchy?()Aset content-filtering profile permit-command block-mimeBset content-filtering profile block-mimeCset content-filtering block-content-type block-mimeDset content-filtering notifications block-mime

单选题How would an end user add both a Junos Pulse Access Control Service URL and a Junos Pulse Secure Access Service URL to the same Junos Pulse client?()ABy adding two separate connections in the connections dialog boxBBy adding two separate intranet Controllers under the configuration hierarchyCBy adding one intranet Controller and one SA under the configuration hierarchyDBy adding two URLs under a connection in the connections dialog box

多选题You have three classes of users on your network: employee, contractor, and IT administrator. You configure the Junos Pulse Access Control Service to assign roles to each user class and require that a specific wireless SSID be preconfigured for the Odyssey Access Client based on the role. Which configuration method should you use to satisfy this scenario?()ACreate a Settings Update file in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under User Roles Agent Odyssey Settings Preconfigured Installer.BConfigure a wired adapter and assign the required SSID under User Roles Agent Odyssey Settings.CCreate a script in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under User Roles Agent Odyssey Settings Preconfigured Installer.DCreate a Preconfiguration file in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under User Roles Agent Odyssey Settings Preconfigured Installer.

单选题Which set of configuration commands illustrates the correct configuration steps for a PPP over ATM Interface?()Ainterface atm 5/1.1 atm pvc 1 0 101 aal5autoconfig profile ppp generic autoconfig ipBinterface atm 5/1.1 atm pvc 1 0 101 aal5snap encapsulation ppp ppp authentication pap ip unnumbered loopback 1 ip access-routesCinterface atm 5/1.1 atm pvc 1 0 101 aalmux ip encapsulation ppp ppp authentication pap ip unnumbered loopback 1 ip access-routesDinterface atm 5/1.1 atm pvc 1 01 101 aal5snap encapsulation pppoa ppp authentication chap ip profile generic

多选题Which two statements regarding firewall user authentication client groups are true?()AIndividual clients are configured under client groups in the configuration hierarchy.BClient groups are configured under individual clients in the configuration hierarchy.CClient groups are referenced in security policy in the same manner in which individual clients are referenced.DClient groups are used to simplify configuration by enabling firewall user authentication without security policy.

多选题Which two login-class permissions could permit a user to view the system hierarchy of the active configuration?()Asystem permissionBview-configuration permissionCnetwork permissionDsuper-user permission

多选题You are modifying the default route preference under the [edit protocols] hierarchy. In which two routing information sources can you change the default preference value?()AlocalBOSPFCdirectDBGP

多选题Which three of the following protocols will be forwarded to a host specified by the ip helper - address interface configuration command if the configuration has not been modified by the ip forward - protocol udp global con figuration command?()ABOOTPBTFTPCARPDDNSEproxy - ARPFFTP

单选题Which account is used to access a Junos device in factory-default configuration?()ArootBadminCjuniperDuser

单选题Which profile configuration command dynamically creates a host route in the routing table?()Aip host routesBip access-routesChost routes enabledDaccess-routes enabled