niusouti.com
参考答案和解析
正确答案: B,C
解析: 暂无解析
更多“多选题An authentication realm consists of which three authentication resources?()AAuthentication serverBSession optionsCAuthentication policyDEnd-point security policyERole-mapping rules”相关问题
  • 第1题:

    Which action is optional when adding an authentication realm for use on an Infranet Controller? ()

    A. Modify sign-in policy.

    B. Configure role mapping.

    C. Assign authentication server.

    D. Configure authentication policy.


    参考答案:D

  • 第2题:

    Which security mechanism is employed only on the server-side to limit access to resources or components?()

    • A、 authorization
    • B、 data integrity
    • C、 confidentiality
    • D、 authentication

    正确答案:A

  • 第3题:

    An authentication realm consists of which three authentication resources?()

    • A、Authentication server
    • B、Session options
    • C、Authentication policy
    • D、End-point security policy
    • E、Role-mapping rules

    正确答案:A,C,E

  • 第4题:

    Which three authentication server types are supported for retrieving user attributes used in role- mapping rules?()

    • A、LDAP
    • B、S/Key
    • C、TACACS+
    • D、RADIUS
    • E、SiteMinder

    正确答案:A,D,E

  • 第5题:

    Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by AH?() (Choose three.)

    • A、data integrity
    • B、data confidentiality
    • C、data authentication
    • D、outer IP header confidentiality
    • E、outer IP header authentication

    正确答案:A,C,E

  • 第6题:

    Which three authentication resources are grouped within an authentication realm?()

    • A、Authentication enforcer
    • B、Directory server
    • C、Captive authentication
    • D、Authentication policy
    • E、Role-mapping rules

    正确答案:B,D,E

  • 第7题:

    Which statement accurately describes firewall user authentication?()

    • A、Firewall user authentication provides another layer of security in a network.
    • B、Firewall user authentication provides a means for accessing a JUNOS Software-based security device.
    • C、Firewall user authentication enables session-based forwarding.
    • D、Firewall user authentication is used as a last resort security method in a network.

    正确答案:A

  • 第8题:

    多选题
    Identify the two optional WebLogic security providers in an Oracle WebLogic security realm()
    A

    Authentication Provider

    B

    Adjudication Provider

    C

    Authorization Provider

    D

    Auditing Provider


    正确答案: C,D
    解析: 暂无解析

  • 第9题:

    单选题
    Which security mechanism is employed only on the server-side to limit access to resources or components?()
    A

     authorization

    B

     data integrity

    C

     confidentiality

    D

     authentication


    正确答案: A
    解析: 暂无解析

  • 第10题:

    多选题
    Which three authentication server types are supported for retrieving user attributes used in role- mapping rules?()
    A

    LDAP

    B

    S/Key

    C

    TACACS+

    D

    RADIUS

    E

    SiteMinder


    正确答案: C,E
    解析: 暂无解析

  • 第11题:

    多选题
    An authentication realm consists of which three authentication resources?()
    A

    Authentication server

    B

    Session options

    C

    Authentication policy

    D

    End-point security policy

    E

    Role-mapping rules


    正确答案: B,D
    解析: 暂无解析

  • 第12题:

    单选题
    Which the security mechanism uses the concept of a realm?()
    A

     authorization

    B

     data integrity

    C

     confidentiality

    D

     authentication


    正确答案: A
    解析: 暂无解析

  • 第13题:

    Which additional configuration must be completed when setting up role restrictions using certificates? ()

    A. Set up a certificate authentication server.

    B. Configure the authentication realm to remember certificate information.

    C. Configure the authentication realm to use a certificate server for authentication.

    D. Configure a role mapping rule requiring certification information to map user to role.


    参考答案:B

  • 第14题:

    Which two commands can be used to monitor firewall user authentication?()

    • A、show access firewall-authentication
    • B、show security firewall-authentication users
    • C、show security audit log
    • D、show security firewall-authentication history

    正确答案:B,D

  • 第15题:

    Which security mechanism uses the concept of a realm?()

    • A、Authorization
    • B、Data integrity
    • C、Confidentiality
    • D、Authentication

    正确答案:D

  • 第16题:

    Which action is optional when adding an authentication realm for use on an Infranet Controller? ()

    • A、Modify sign-in policy.
    • B、Configure role mapping.
    • C、Assign authentication server.
    • D、Configure authentication policy.

    正确答案:D

  • 第17题:

    Which additional configuration must be completed when setting up role restrictions using certificates? ()

    • A、Set up a certificate authentication server.
    • B、Configure the authentication realm to remember certificate information.
    • C、Configure the authentication realm to use a certificate server for authentication.
    • D、Configure a role mapping rule requiring certification information to map user to role.

    正确答案:B

  • 第18题:

    Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)

    • A、access profile
    • B、client group
    • C、client
    • D、default profile
    • E、external

    正确答案:A,B,C

  • 第19题:

    Identify the two optional WebLogic security providers in an Oracle WebLogic security realm()

    • A、 Authentication Provider
    • B、 Adjudication Provider
    • C、 Authorization Provider
    • D、 Auditing Provider

    正确答案:B,D

  • 第20题:

    多选题
    Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)
    A

    access profile

    B

    client group

    C

    client

    D

    default profile

    E

    external


    正确答案: A,C
    解析: 暂无解析

  • 第21题:

    多选题
    Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by AH?() (Choose three.)
    A

    data integrity

    B

    data confidentiality

    C

    data authentication

    D

    outer IP header confidentiality

    E

    outer IP header authentication


    正确答案: A,B
    解析: 暂无解析

  • 第22题:

    多选题
    Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by AH?()
    A

    data integrity

    B

    data confidentiality

    C

    data authentication

    D

    outer IP header confidentiality

    E

    outer IP header authentication


    正确答案: C,E
    解析: 暂无解析

  • 第23题:

    多选题
    Which three authentication resources are grouped within an authentication realm?()
    A

    Authentication enforcer

    B

    Directory server

    C

    Captive authentication

    D

    Authentication policy

    E

    Role-mapping rules


    正确答案: E,C
    解析: 暂无解析

  • 第24题:

    多选题
    Which two commands can be used to monitor firewall user authentication?()
    A

    show access firewall-authentication

    B

    show security firewall-authentication users

    C

    show security audit log

    D

    show security firewall-authentication history


    正确答案: C,D
    解析: 暂无解析