单选题Which statement describes the Authentication Proxy feature?()AAll traffic is permitted from the inbound to the outbound interface upon successful authentication of the user.BA specific access profile is retrieved from a TACACS+ or RADIUS server and applied to an IOS Firewall based on user provided credentials.CPrior to responding to a proxy ARP,the router will prompt the user for a login and password which are authenticated based on the configured AAA policy.DThe proxy server capabilities of the IOS Firewall are enabled upon successful authentication of the user.

单选题
Which statement describes the Authentication Proxy feature?()
A

All traffic is permitted from the inbound to the outbound interface upon successful authentication of the user.

B

A specific access profile is retrieved from a TACACS+ or RADIUS server and applied to an IOS Firewall based on user provided credentials.

C

Prior to responding to a proxy ARP,the router will prompt the user for a login and password which are authenticated based on the configured AAA policy.

D

The proxy server capabilities of the IOS Firewall are enabled upon successful authentication of the user.


参考解析

解析: 暂无解析

相关考题:

Which statement describes the UTM licensing model?() A. Install the license key and all UTM features will be enabled for the life of the productB. Install one license key per feature and the license key will be enabled for the life of the product.C. Install one UTM license key, which will activate all UTM features; the license will need to be renewed when it expires.D. Install one UTM license key per UTM feature; the licenses will need to be renewed when they expire.

Which statement about the S-Series native FTP proxy is not true?() A、 both active and passive modes FTP are supportedB、 by default the FTP proxy uses port 8021C、 access polices may apply to native FTP trafficD、 data loss prevention policies may apply to native FTP trafficE、 authentication is supported in transparent mode

Which integrated security feature is not provided by the Cisco Business Ready Teleworker solution?()A、Stateful Inspection FirewallB、Intrusion Detection SystemC、Spam Filtering D、802.1-based AuthenticationE、Proxy AuthenticationF、URL Filtering

One of the most important characteristics of OSPF is Multiple areas. Which statement best describes why this feature is such an important enhancement to earlier routing protocols?()A、The network domain, when divided into areas, allows for the use of both IANA classful addressing and private addressing.B、The use of multiple areas allows for the use of prioritization.C、All computation is kept within the area, with minimum communication between the areas,allowing the network to scale to larger sizes.D、It is easier to implement security.

What are three features of the Cisco IOS Firewall feature set?()A、network-based application recognition (NBAR)B、authentication proxyC、stateful packet filteringD、AAA servicesE、proxy serverF、IPS

Which statement about OSPF authentication is true?()A、To enable OSPF authentication in a network, OSPF area 0 authentications must be enabled firstB、The payload of OSPF version 3 packets contains no authentication informationC、OSPF version 3 supports Advanced Encryption StandardD、OSPF version 3 uses router ID as a key to encrypt OSPF hello packetsE、OSPF MD5 authentication uses TCP, and Plan Test authentication uses UDP

Which statement is true regarding proxy ARP?()A、Proxy ARP is enabled by default on stand-alone JUNOS security devices.B、Proxy ARP is enabled by default on chassis clusters.C、JUNOS security devices can forward ARP requests to a remote device when proxy ARP is enabled.D、JUNOS security devices can reply to ARP requests intended for a remote device when proxy ARP is enabled

Which statement best describes the Turbo ACL feature? ()A、The Turbo ACL feature processes ACLs into lookup tables for greater efficiencyB、The Turbo ACL feature leads to increased latency, because the time it takes to match the packet isvariableC、The Turbo ACL feature leads to reduced latency, because the time it takes to match the packet is fixedand consistentD、Turbo ACLs increase the CPU load by matching the packet to a predetermined list

In the wireless Advanced Feature Set using lightweight access points, a virtual interface is used when supporting which of the following features?()A、PSK authenticationB、EAP authenticationC、WPA authenticationD、Web authentication

Which statement describes the Authentication Proxy feature?()A、All traffic is permitted from the inbound to the outbound interface upon successful authentication of the user.B、A specific access profile is retrieved from a TACACS+ or RADIUS server and applied to an IOS Firewall based on user provided credentials.C、Prior to responding to a proxy ARP,the router will prompt the user for a login and password which are authenticated based on the configured AAA policy.D、The proxy server capabilities of the IOS Firewall are enabled upon successful authentication of the user.

If authentication is enabled,which statement is true?()A、client reports will display authenticated usernamesB、client reports will display both the username and IP address of the clientsC、client reports are not affected by authenticationD、client reports will display the IP address of the authentication server

Which statement best describes what is depicted in the show command output?()A、 IGMP snooping is not active for VLAN 120 because the IGMP feature has not been enabled on the switch with the feature igmp command.B、 The IGMP snooping querier for VLAN 120 is not in a running state because the Loopback interface configured with 1.1.1.1/32 is currently in a down state.C、 IGMP snooping has been disabled on the VLAN 120 SVI.D、 IGMP snooping has been disabled for VLAN 120 in VLAN configuration mode.E、 IGMP snooping is not active for VLAN 120 because VLAN 120 does not exist in the VLAN database.

Which statement about WSA user authentication is true?() A、 a single WSA can have multiple LDAP realmsB、 WSA supports LDAP but not NTLMC、 WSA supports NTLM but not LDAPD、 a single WSA can have up to two authentication realms: one for LDAP and for NTLM

Which statement about SNMP is true?()A、SNMP version 2 uses a proxy agent to forward GetNext message to SNMP version 3.B、SNMP version 2 supports message integrity to ensure that a packet has not been tampered withC、Proxy agents were used only in SNMP version 1.D、SNMP version 3 supports encryption and SNMP version 2 support authentication.E、GetBulk messages are converted to GetNext messages by the proxy agent and are then forwarded to the SNMP version 1 agent.

What is the S-Series Proxy Bypass List?() A、a list of proxy servers that are to be bypassedB、a list of clients and destinations that will bypass the proxy in transparent modeC、a list of clients and destinations that will bypass the proxy in explicit forward modeD、a list of user agents exempt from authentication

Which of the following best describes Simultaneous Multi-threading (SMT)?()A、A POWER5 microprocessor feature that allocates two processors to each applicationB、A Workload Manager feature that allows two processing threads to be executing on a single processorC、An AIX v5.2 feature that allows two processing threads to be executing on a single processor concurrentlyD、A POWER5 microprocessor feature that allows two processing threads to be executing on a single processor concurrently

Which statement describes the UTM licensing model?()A、Install the license key and all UTM features will be enabled for the life of the productB、Install one license key per feature and the license key will be enabled for the life of the product.C、Install one UTM license key, which will activate all UTM features; the license will need to be renewed when it expires.D、Install one UTM license key per UTM feature; the licenses will need to be renewed when they expire.

Consider the Mysql Enterprise Audit plugin. Which statement is true when you identify a connection event that has used external authentication?()A、The attribute "STATUS" is set to the string EXTERNAL_AUTHB、The attribute "PRIV_USER" contains the usernameC、The event type that is given in the attribute "NAME" is EXTERNAL_AUTHD、There is no differentiation between native and external authentication eventsE、External authentication is managed through external auditing logsF、The "PROXY_PRIV" user shows a username if external authentication is used

多选题Which statement best describes the Turbo ACL feature? ()AThe Turbo ACL feature processes ACLs into lookup tables for greater efficiencyBThe Turbo ACL feature leads to increased latency, because the time it takes to match the packet isvariableCThe Turbo ACL feature leads to reduced latency, because the time it takes to match the packet is fixedand consistentDTurbo ACLs increase the CPU load by matching the packet to a predetermined list

单选题Which statement accurately describes firewall user authentication?()AFirewall user authentication provides another layer of security in a network.BFirewall user authentication provides a means for accessing a JUNOS Software-based security device.CFirewall user authentication enables session-based forwarding.DFirewall user authentication is used as a last resort security method in a network.

单选题Consider the Mysql Enterprise Audit plugin. Which statement is true when you identify a connection event that has used external authentication?()AThe attribute STATUS is set to the string EXTERNAL_AUTHBThe attribute PRIV_USER contains the usernameCThe event type that is given in the attribute NAME is EXTERNAL_AUTHDThere is no differentiation between native and external authentication eventsEExternal authentication is managed through external auditing logsFThe PROXY_PRIV user shows a username if external authentication is used

单选题You are installing a new deployment of the Junos Pulse Access Control Service. You have an existing RADIUS server that has a populated user file. You are considering using the RADIUS proxy feature.Which consideration must you take into account?()AYour RADIUS server database must be replicated onto another device for redundancy.BInner proxy creates a tunnel between the supplicant and the external server.CRADIUS proxy causes the role assignment process to be skipped.DOuter proxy configuration passes authentication data to the external RADIUS server in clear text.

单选题A user issues a SELECT command against the Oracle database. Which of the following choices describes a step that Oracle will execute in support of this statement?()AAcquire locks on table queried BGenerate redo for statement CFetch data from disk into memory DWrite changes to disk

单选题Which of the following best describes Simultaneous Multi-threading (SMT)?()AA POWER5 microprocessor feature that allocates two processors to each applicationBA Workload Manager feature that allows two processing threads to be executing on a single processorCAn AIX v5.2 feature that allows two processing threads to be executing on a single processor concurrentlyDA POWER5 microprocessor feature that allows two processing threads to be executing on a single processor concurrently

单选题Which statement about WSA user authentication is true?()A a single WSA can have multiple LDAP realmsB WSA supports LDAP but not NTLMC WSA supports NTLM but not LDAPD a single WSA can have up to two authentication realms: one for LDAP and for NTLM

单选题Which statement about SNMP is true?()ASNMP version 2 uses a proxy agent to forward GetNext message to SNMP version 3.BSNMP version 2 supports message integrity to ensure that a packet has not been tampered withCProxy agents were used only in SNMP version 1.DSNMP version 3 supports encryption and SNMP version 2 support authentication.EGetBulk messages are converted to GetNext messages by the proxy agent and are then forwarded to the SNMP version 1 agent.

单选题Which statement is true regarding proxy ARP?()AProxy ARP is enabled by default on stand-alone JUNOS security devices.BProxy ARP is enabled by default on chassis clusters.CJUNOS security devices can forward ARP requests to a remote device when proxy ARP is enabled.DJUNOS security devices can reply to ARP requests intended for a remote device when proxy ARP is enabled

单选题Which statement about the S-Series native FTP proxy is not true?()A both active and passive modes FTP are supportedB by default the FTP proxy uses port 8021C access polices may apply to native FTP trafficD data loss prevention policies may apply to native FTP trafficE authentication is supported in transparent mode