Tunnels are initiated by the LAC
Tunnels are initiated by the LNS
By default, subscriber authentication occurs on the LNS
By default, subscriber authentication occurs on the LAC
第1题:
A. Tunnels are initiated by the LAC
B. Tunnels are initiated by the LNS
C. By default, subscriber authentication occurs on the LNS
D. By default, subscriber authentication occurs on the LAC
第2题:
Which two statements regarding firewall user authentication client groups are true?() (Choose two.)
第3题:
Which two statements are true regarding firewall user authentication?() (Choose two.)
第4题:
Regarding L2TP, in which two situations is a service module or service IOA required?() (Choose two.)
第5题:
Which two statements are true with regard to policy ordering? ()(Choose two.)
第6题:
Which two statements are true about precedence values in policy?() (Choose two.)
第7题:
You have a durable subscriber, and the subscriber is down or not reachable when the message is produced. Which two options regarding the expiry of these messages are true?()
第8题:
The last policy is the default policy, which allows all traffic.
The order of policies is not important.
New policies are placed at the end of the policy list.
The insert command can be used to change the order.
第9题:
after the subscriber is unavailable for 10 minutes
when the subscriber is available
after the subscriber is unavailable for after an hour
are available until the specified time elapses
are expired instantly
第10题:
A client group is a list of clients associated with a group.
A client group is a list of groups associated with a client.
Client groups are referenced in security policy in the same manner in which individual clients are referenced.
Client groups are used to simplify configuration by enabling firewall user authentication without security policy.
第11题:
1 is the default precedence.
A lower number is preferred.
A higher number is preferred.
100 is the default precedence.
第12题:
Traffic is permitted from the trust zone to the untrust zone.
Intrazone traffic in the trust zone is permitted.
All traffic through the device is denied.
The policy is matched only when no other matching policies are found.
第13题:
A.CHAP uses a two-way handshake
B.CHAP authentication periodically occurs after link establishment
C.CHAP has no protection from playback attacks
D.CHAP authentication is performed only upon link establishment
E.CHAP uses a three-way handshake
F.CHAP authentication passwords are sent in plaintext
第14题:
Which two statements are true about L2TP tunnels?() (Choose two.)
第15题:
Which two statements about using the CHAP authentication mechanism in a PPP link are true?()
第16题:
Which two statements are true regarding L2TP? ()(Choose two.)
第17题:
Which two statements regarding external authentication servers for firewall user authentication are true?() (Choose two.)
第18题:
Which two statements are true regarding the system-default security policy [edit security policies default-policy]?()(Choose two.)
第19题:
Traffic is clear text
Traffic is encrypted
They are initiated by the LNS
They are initiated by the LAC
第20题:
Tunnels are initiated by the LAC
Tunnels are initiated by the LNS
By default, subscriber authentication occurs on the LNS
By default, subscriber authentication occurs on the LAC
第21题:
When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.
When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.
If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .
If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.
第22题:
Up to three external authentication server types can be used simultaneously.
Only one external authentication server type can be used simultaneously.
If the local password database is not configured in the authentication order, and the configured authentication server bypassed.
If the local password database is not configured in the authentication order, and the configured authentication server authentication is rejected.
第23题:
CHAP uses a two-way handshake
CHAP authentication periodically occurs after link establishment
CHAP has no protection from playback attacks
CHAP authentication is performed only upon link establishment
CHAP uses a three-way handshake
CHAP authentication passwords are sent in plaintext
第24题:
PAT is not supported.
PAT is enabled by default.
It supports the address-persistent configuration option.
It supports the junos-global configuration option.