niusouti.com

多选题Which two statements are true regarding L2TP? ()(Choose two.)ATunnels are initiated by the LACBTunnels are initiated by the LNSCBy default, subscriber authentication occurs on the LNSDBy default, subscriber authentication occurs on the LAC

题目
多选题
Which two statements are true regarding L2TP? ()(Choose two.)
A

Tunnels are initiated by the LAC

B

Tunnels are initiated by the LNS

C

By default, subscriber authentication occurs on the LNS

D

By default, subscriber authentication occurs on the LAC


相似考题
更多“多选题Which two statements are true regarding L2TP? ()(Choose two.)ATunnels are initiated by the LACBTunnels are initiated by the LNSCBy default, subscriber authentication occurs on the LNSDBy default, subscriber authentication occurs on the LAC”相关问题
  • 第1题:

    Which two statements are true regarding L2TP? ()(Choose two.)

    A. Tunnels are initiated by the LAC

    B. Tunnels are initiated by the LNS

    C. By default, subscriber authentication occurs on the LNS

    D. By default, subscriber authentication occurs on the LAC


    参考答案:A, C

  • 第2题:

    Which two statements regarding firewall user authentication client groups are true?() (Choose two.)

    • A、A client group is a list of clients associated with a group.
    • B、A client group is a list of groups associated with a client.
    • C、Client groups are referenced in security policy in the same manner in which individual clients are referenced.
    • D、Client groups are used to simplify configuration by enabling firewall user authentication without security policy.

    正确答案:B,C

  • 第3题:

    Which two statements are true regarding firewall user authentication?() (Choose two.)

    • A、When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.
    • B、When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.
    • C、If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .
    • D、If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.

    正确答案:B,C

  • 第4题:

    Regarding L2TP, in which two situations is a service module or service IOA required?() (Choose two.)

    • A、always for LNS
    • B、always for LAC
    • C、LAC with fragmentation in the tunnel
    • D、LNS when there are greater than 2000 sessions

    正确答案:A,C

  • 第5题:

    Which two statements are true with regard to policy ordering? ()(Choose two.)

    • A、The last policy is the default policy, which allows all traffic.
    • B、The order of policies is not important.
    • C、New policies are placed at the end of the policy list.
    • D、The insert command can be used to change the order.

    正确答案:C,D

  • 第6题:

    Which two statements are true about precedence values in policy?() (Choose two.)

    • A、1 is the default precedence.
    • B、A lower number is preferred.
    • C、A higher number is preferred.
    • D、100 is the default precedence.

    正确答案:B,D

  • 第7题:

    You have a durable subscriber, and the subscriber is down or not reachable when the message is  produced. Which two options regarding the expiry of these messages are true?()

    • A、after the subscriber is unavailable for 10 minutes
    • B、when the subscriber is available
    • C、after the subscriber is unavailable for after an hour
    • D、are available until the specified time elapses
    • E、are expired instantly

    正确答案:B,D

  • 第8题:

    多选题
    Which two statements are true with regard to policy ordering? ()(Choose two.)
    A

    The last policy is the default policy, which allows all traffic.

    B

    The order of policies is not important.

    C

    New policies are placed at the end of the policy list.

    D

    The insert command can be used to change the order.


    正确答案: C,D
    解析: 暂无解析

  • 第9题:

    多选题
    You have a durable subscriber, and the subscriber is down or not reachable when the message is  produced. Which two options regarding the expiry of these messages are true?()
    A

    after the subscriber is unavailable for 10 minutes

    B

    when the subscriber is available

    C

    after the subscriber is unavailable for after an hour

    D

    are available until the specified time elapses

    E

    are expired instantly


    正确答案: A,D
    解析: 暂无解析

  • 第10题:

    多选题
    Which two statements regarding firewall user authentication client groups are true?() (Choose two.)
    A

    A client group is a list of clients associated with a group.

    B

    A client group is a list of groups associated with a client.

    C

    Client groups are referenced in security policy in the same manner in which individual clients are referenced.

    D

    Client groups are used to simplify configuration by enabling firewall user authentication without security policy.


    正确答案: D,A
    解析: 暂无解析

  • 第11题:

    多选题
    Which two statements are true about precedence values in policy?() (Choose two.)
    A

    1 is the default precedence.

    B

    A lower number is preferred.

    C

    A higher number is preferred.

    D

    100 is the default precedence.


    正确答案: D,C
    解析: 暂无解析

  • 第12题:

    多选题
    Which two statements are true regarding the system-default security policy [edit security policies default-policy]?()(Choose two.)
    A

    Traffic is permitted from the trust zone to the untrust zone.

    B

    Intrazone traffic in the trust zone is permitted.

    C

    All traffic through the device is denied.

    D

    The policy is matched only when no other matching policies are found.


    正确答案: C,A
    解析: 暂无解析

  • 第13题:

    Which two statements about using the CHAP authentication mechanism in a PPP link are true?()

    A.CHAP uses a two-way handshake

    B.CHAP authentication periodically occurs after link establishment

    C.CHAP has no protection from playback attacks

    D.CHAP authentication is performed only upon link establishment

    E.CHAP uses a three-way handshake

    F.CHAP authentication passwords are sent in plaintext


    参考答案:B, E

  • 第14题:

    Which two statements are true about L2TP tunnels?() (Choose two.)

    • A、Traffic is clear text
    • B、Traffic is encrypted 
    • C、They are initiated by the LNS
    • D、They are initiated by the LAC

    正确答案:A,D

  • 第15题:

    Which two statements about using the CHAP authentication mechanism in a PPP link are true?()

    • A、CHAP uses a two-way handshake
    • B、CHAP authentication periodically occurs after link establishment
    • C、CHAP has no protection from playback attacks
    • D、CHAP authentication is performed only upon link establishment
    • E、CHAP uses a three-way handshake
    • F、CHAP authentication passwords are sent in plaintext

    正确答案:B,E

  • 第16题:

    Which two statements are true regarding L2TP? ()(Choose two.)

    • A、Tunnels are initiated by the LAC
    • B、Tunnels are initiated by the LNS
    • C、By default, subscriber authentication occurs on the LNS
    • D、By default, subscriber authentication occurs on the LAC

    正确答案:A,C

  • 第17题:

    Which two statements regarding external authentication servers for firewall user authentication are true?() (Choose two.)

    • A、Up to three external authentication server types can be used simultaneously.
    • B、Only one external authentication server type can be used simultaneously.
    • C、If the local password database is not configured in the authentication order, and the configured authentication server  bypassed.
    • D、If the local password database is not configured in the authentication order, and the configured authentication server authentication is rejected.

    正确答案:B,D

  • 第18题:

    Which two statements are true regarding the system-default security policy [edit security policies default-policy]?()(Choose two.)

    • A、Traffic is permitted from the trust zone to the untrust zone.
    • B、Intrazone traffic in the trust zone is permitted.
    • C、All traffic through the device is denied.
    • D、The policy is matched only when no other matching policies are found.

    正确答案:C,D

  • 第19题:

    多选题
    Which two statements are true about L2TP tunnels?() (Choose two.)
    A

    Traffic is clear text

    B

    Traffic is encrypted 

    C

    They are initiated by the LNS

    D

    They are initiated by the LAC


    正确答案: C,D
    解析: 暂无解析

  • 第20题:

    多选题
    Which two statements are true regarding L2TP? ()(Choose two.)
    A

    Tunnels are initiated by the LAC

    B

    Tunnels are initiated by the LNS

    C

    By default, subscriber authentication occurs on the LNS

    D

    By default, subscriber authentication occurs on the LAC


    正确答案: C,D
    解析: 暂无解析

  • 第21题:

    多选题
    Which two statements are true regarding firewall user authentication?() (Choose two.)
    A

    When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.

    B

    When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.

    C

    If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .

    D

    If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.


    正确答案: D,A
    解析: 暂无解析

  • 第22题:

    多选题
    Which two statements regarding external authentication servers for firewall user authentication are true?() (Choose two.)
    A

    Up to three external authentication server types can be used simultaneously.

    B

    Only one external authentication server type can be used simultaneously.

    C

    If the local password database is not configured in the authentication order, and the configured authentication server  bypassed.

    D

    If the local password database is not configured in the authentication order, and the configured authentication server authentication is rejected.


    正确答案: B,A
    解析: 暂无解析

  • 第23题:

    多选题
    Which two statements about using the CHAP authentication mechanism in a PPP link are true?()
    A

    CHAP uses a two-way handshake

    B

    CHAP authentication periodically occurs after link establishment

    C

    CHAP has no protection from playback attacks

    D

    CHAP authentication is performed only upon link establishment

    E

    CHAP uses a three-way handshake

    F

    CHAP authentication passwords are sent in plaintext


    正确答案: E,D
    解析: 暂无解析

  • 第24题:

    多选题
    Which two statements are true about pool-based source NAT? ()(Choose two.)
    A

    PAT is not supported.

    B

    PAT is enabled by default.

    C

    It supports the address-persistent configuration option.

    D

    It supports the junos-global configuration option.


    正确答案: C,B
    解析: 暂无解析