niusouti.com

单选题Under which configuration hierarchy is an access profile configured for firewall user authentication?()A [edit access]B [edit security access]C [edit firewall access]D [edit firewall-authentication]

题目
单选题
Under which configuration hierarchy is an access profile configured for firewall user authentication?()
A

[edit access]

B

[edit security access]

C

[edit firewall access]

D

[edit firewall-authentication]


相似考题
参考答案和解析
正确答案: D
解析: 暂无解析
更多“单选题Under which configuration hierarchy is an access profile configured for firewall user authentication?()A [edit access]B [edit security access]C [edit firewall access]D [edit firewall-authentication]”相关问题
  • 第1题:

    You want to allow your device to establish OSPF adjacencies with a neighboring device connected to interface ge-0/0/3.0. Interface ge-0/0/3.0 is a member of the HR zone.Under which configuration hierarchy must you permit OSPF traffic?()

    A. [edit security policies from-zone HR to-zone HR]

    B. [edit security zones functional-zone management protocols]

    C. [edit security zones protocol-zone HR host-inbound-traffic]

    D. [edit security zones security-zone HR host-inbound-traffic protocols]


    参考答案:D

  • 第2题:

    Which action change the default editor for ALL users on the system from vi to edit()

    • A、Issue the command: export EDITOR=/usr/bin/edit edit each user .profile to change the EDITOR value to /usr/bin/edit
    • B、Modify /.profile and change the EDITOR variable to /usr/bin/edit
    • C、Modify /etc/environment and add EDITOR=/usr/bin/edit export EDITOR
    • D、Modify /etc/security/defaults and change the EDITOR value to /usr/bin/edit

    正确答案:C

  • 第3题:

    Which two commands can be used to monitor firewall user authentication?()

    • A、show access firewall-authentication
    • B、show security firewall-authentication users
    • C、show security audit log
    • D、show security firewall-authentication history

    正确答案:B,D

  • 第4题:

    You want to allow your device to establish OSPF adjacencies with a neighboring device connected tointerface ge-0/0/3.0. Interface ge-0/0/3.0 is a member of the HR zone.Under which configuration hierarchy must you permit OSPF traffic?()

    • A、[edit security policies from-zone HR to-zone HR]
    • B、[edit security zones functional-zone management protocols]
    • C、[edit security zones protocol-zone HR host-inbound-traffic]
    • D、[edit security zones security-zone HR host-inbound-traffic protocols]

    正确答案:D

  • 第5题:

    Under which configuration hierarchy is an access profile configured for firewall user authentication?()

    • A、[edit access]
    • B、[edit security access]
    • C、[edit firewall access]
    • D、[edit firewall-authentication]

    正确答案:A

  • 第6题:

    At which two levels of the Junos CLI hierarchy is the host-inbound-traffic command configured? ()(Choose two.)

    • A、[edit security idp]
    • B、[edit security zones security-zone trust interfaces ge-0/0/0.0]
    • C、[edit security zones security-zone trust]
    • D、[edit security screen]

    正确答案:B,C

  • 第7题:

    You have a firewall enforcer receiving resource access policies from a Junos Pulse Access Control Service. You are using Network and Security Manager (NSM) for configuration management on that firewall. The firewall can also be configured using its built-in command-line interface (CLI) or Web-based user interface (WebUI). To avoid conflicting configurations, which two interfaces must you use to configure the firewall enforcer?()

    • A、CLI
    • B、WebUI
    • C、NSM
    • D、Junos Pulse Access Control Service

    正确答案:C,D

  • 第8题:

    单选题
    In which hierarchy are routing policies defined?()
    A

    [edit policy-options]

    B

    [edit routing-options]

    C

    [edit forwarding-options]

    D

    [edit protocols]


    正确答案: D
    解析: 暂无解析

  • 第9题:

    单选题
    Which action change the default editor for ALL users on the system from vi to edit()
    A

    Issue the command: export EDITOR=/usr/bin/edit edit each user .profile to change the EDITOR value to /usr/bin/edit

    B

    Modify /.profile and change the EDITOR variable to /usr/bin/edit

    C

    Modify /etc/environment and add EDITOR=/usr/bin/edit export EDITOR

    D

    Modify /etc/security/defaults and change the EDITOR value to /usr/bin/edit


    正确答案: D
    解析: 暂无解析

  • 第10题:

    多选题
    At which two levels of the Junos CLI hierarchy is the host-inbound-traffic command configured? ()(Choose two.)
    A

    [edit security idp]

    B

    [edit security zones security-zone trust interfaces ge-0/0/0.0]

    C

    [edit security zones security-zone trust]

    D

    [edit security screen]


    正确答案: B,D
    解析: 暂无解析

  • 第11题:

    单选题
    Under which configuration hierarchy is an access profile configured for firewall user authentication?()
    A

    [edit access]

    B

    [edit security access]

    C

    [edit firewall access]

    D

    [edit firewall-authentication]


    正确答案: A
    解析: 暂无解析

  • 第12题:

    单选题
    You want to test a configured screen value prior to deploying.Which statement will allow you to accomplish this?()
    A

    [edit security screen] user@host# show ids-option untrust-screen { alarm-test-only; }

    B

    [edit security screen] user@host# show ids-option untrust-screen { alarm-without-drop; }

    C

    [edit security screen] user@host# show ids-option untrust-screen { alarm-no-drop; }

    D

    [edit security screen] user@host# show ids-option untrust-screen { test-without-drop; }


    正确答案: B
    解析: 暂无解析

  • 第13题:

    In which hierarchy are routing policies defined?()

    A. [edit policy-options]

    B. [edit routing-options]

    C. [edit forwarding-options]

    D. [edit protocols]


    参考答案:A

  • 第14题:

    Which two firewall user authentication objects can be referenced in a security policy?()

    • A、access profile
    • B、client group
    • C、client
    • D、default profile

    正确答案:B,C

  • 第15题:

    Which statement describes the Authentication Proxy feature?()

    • A、All traffic is permitted from the inbound to the outbound interface upon successful authentication of the user.
    • B、A specific access profile is retrieved from a TACACS+ or RADIUS server and applied to an IOS Firewall based on user provided credentials.
    • C、Prior to responding to a proxy ARP,the router will prompt the user for a login and password which are authenticated based on the configured AAA policy.
    • D、The proxy server capabilities of the IOS Firewall are enabled upon successful authentication of the user.

    正确答案:B

  • 第16题:

    Which two statements regarding firewall user authentication client groups are true?()

    • A、Individual clients are configured under client groups in the configuration hierarchy.
    • B、Client groups are configured under individual clients in the configuration hierarchy.
    • C、Client groups are referenced in security policy in the same manner in which individual clients are referenced.
    • D、Client groups are used to simplify configuration by enabling firewall user authentication without security policy.

    正确答案:B,C

  • 第17题:

    In which hierarchy are routing policies defined?()

    • A、[edit policy-options]
    • B、[edit routing-options]
    • C、[edit forwarding-options]
    • D、[edit protocols]

    正确答案:A

  • 第18题:

    Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)

    • A、access profile
    • B、client group
    • C、client
    • D、default profile
    • E、external

    正确答案:A,B,C

  • 第19题:

    Under which Junos hierarchy level are security policies configured?()

    • A、[edit security]
    • B、[edit protocols]
    • C、[edit firewall]
    • D、[edit policy-options]

    正确答案:A

  • 第20题:

    多选题
    Which two statements regarding firewall user authentication client groups are true?()
    A

    Individual clients are configured under client groups in the configuration hierarchy.

    B

    Client groups are configured under individual clients in the configuration hierarchy.

    C

    Client groups are referenced in security policy in the same manner in which individual clients are referenced.

    D

    Client groups are used to simplify configuration by enabling firewall user authentication without security policy.


    正确答案: C,D
    解析: 暂无解析

  • 第21题:

    单选题
    Under which Junos hierarchy level are security policies configured?()
    A

    [edit security]

    B

    [edit protocols]

    C

    [edit firewall]

    D

    [edit policy-options]


    正确答案: D
    解析: 暂无解析

  • 第22题:

    单选题
    You want to allow your device to establish OSPF adjacencies with a neighboring device connected to interface ge-0/0/3.0. Interface ge-0/0/3.0 is a member of the HR zone.Under which configuration hierarchy must you permit OSPF traffic?()
    A

    [edit security policies from-zone HR to-zone HR]

    B

    [edit security zones functional-zone management protocols]

    C

    [edit security zones protocol-zone HR host-inbound-traffic]

    D

    [edit security zones security-zone HR host-inbound-traffic protocols]


    正确答案: D
    解析: 暂无解析

  • 第23题:

    单选题
    Which statement describes the Authentication Proxy feature?()
    A

    All traffic is permitted from the inbound to the outbound interface upon successful authentication of the user.

    B

    A specific access profile is retrieved from a TACACS+ or RADIUS server and applied to an IOS Firewall based on user provided credentials.

    C

    Prior to responding to a proxy ARP,the router will prompt the user for a login and password which are authenticated based on the configured AAA policy.

    D

    The proxy server capabilities of the IOS Firewall are enabled upon successful authentication of the user.


    正确答案: C
    解析: 暂无解析

  • 第24题:

    单选题
    Which action changes the default editor for ALL users on the system from vi to edit?()
    A

    Issue the command:export EDITOR=/usr/bin/edit edit each users .profile to change the EDITOR value to /usr/bin/edit

    B

    Modify /.profile and change the EDITOR variable to /usr/bin/edit

    C

    Modify /etc/environment and add EDITOR=/usr/bin/edit export EDITOR

    D

    Modify /etc/security/defaults and change the EDITOR value to /usr/bin/edit


    正确答案: A
    解析: 暂无解析