niusouti.com

多选题Which two statements regarding firewall user authentication client groups are true?()AIndividual clients are configured under client groups in the configuration hierarchy.BClient groups are configured under individual clients in the configuration hiera

题目
多选题
Which two statements regarding firewall user authentication client groups are true?()
A

Individual clients are configured under client groups in the configuration hierarchy.

B

Client groups are configured under individual clients in the configuration hierarchy.

C

Client groups are referenced in security policy in the same manner in which individual clients are referenced.

D

Client groups are used to simplify configuration by enabling firewall user authentication without security policy.


相似考题
参考答案和解析
正确答案: D,A
解析: 暂无解析
更多“多选题Which two statements regarding firewall user authentication client groups are true?()AIndividual clients are configured under client groups in the configuration hierarchy.BClient groups are configured under individual clients in the configuration hiera”相关问题
  • 第1题:

    Which two statements regarding firewall user authentication client groups are true?() (Choose two.)

    • A、A client group is a list of clients associated with a group.
    • B、A client group is a list of groups associated with a client.
    • C、Client groups are referenced in security policy in the same manner in which individual clients are referenced.
    • D、Client groups are used to simplify configuration by enabling firewall user authentication without security policy.

    正确答案:B,C

  • 第2题:

    In Multicast VPN (MVPN) implementations, which two of the following statements are regarding the DefaultMDT Group?()

    • A、It is used for PIM control traffic
    • B、It is optionally configured for a high bandwidth multicast source to reduce multicast traffic replication to uninterested PE routers
    • C、Within the VPF configuration in the PE router, multiple Default MDT groups are configured so each VPF can support multiple multicast sources
    • D、There is a reduced multicast state in the MPLS core P routers
    • E、When multicast traffic exceeds a certain configured threshold, traffic from the Data MDT is switched to the Default MDT to conserve bandwidth

    正确答案:A,D

  • 第3题:

    Which two statements are true regarding firewall user authentication?() (Choose two.)

    • A、When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.
    • B、When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.
    • C、If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .
    • D、If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.

    正确答案:B,C

  • 第4题:

    Which two statements regarding firewall user authentication client groups are true?()

    • A、Individual clients are configured under client groups in the configuration hierarchy.
    • B、Client groups are configured under individual clients in the configuration hierarchy.
    • C、Client groups are referenced in security policy in the same manner in which individual clients are referenced.
    • D、Client groups are used to simplify configuration by enabling firewall user authentication without security policy.

    正确答案:B,C

  • 第5题:

    Which two statements regarding external authentication servers for firewall userauthentication are true?()

    • A、Up to three external authentication server types can be used simultaneously.
    • B、Only one external authentication server type can be used simultaneously.
    • C、If the local password database is not configured in the authentication order, and the configured authentication server is unreachable, authentication is not performed.
    • D、If the local password database is not configured in the authentication order, and the configured authentication server rejects the authentication request, authentication is not performed

    正确答案:B,D

  • 第6题:

    Which two statements are true regarding firewall user authentication?()

    • A、When configured for pass-through firewall user authentication, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.
    • B、When configured for Web firewall user authentication only, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.
    • C、If a JUNOS security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted to perform authentication.
    • D、If a JUNOS security device is configured for Web firewall user authentication, new sessions are automatically intercepted to perform authentication.

    正确答案:B,C

  • 第7题:

    多选题
    Which two statements regarding firewall user authentication client groups are true?()
    A

    Individual clients are configured under client groups in the configuration hierarchy.

    B

    Client groups are configured under individual clients in the configuration hierarchy.

    C

    Client groups are referenced in security policy in the same manner in which individual clients are referenced.

    D

    Client groups are used to simplify configuration by enabling firewall user authentication without security policy.


    正确答案: C,D
    解析: 暂无解析

  • 第8题:

    多选题
    Which two statements are true regarding firewall user authentication?()
    A

    When configured for pass-through firewall user authentication, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.

    B

    When configured for Web firewall user authentication only, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.

    C

    If a JUNOS security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted to perform authentication.

    D

    If a JUNOS security device is configured for Web firewall user authentication, new sessions are automatically intercepted to perform authentication.


    正确答案: B,C
    解析: 暂无解析

  • 第9题:

    多选题
    Which two statements regarding firewall user authentication client groups are true?() (Choose two.)
    A

    A client group is a list of clients associated with a group.

    B

    A client group is a list of groups associated with a client.

    C

    Client groups are referenced in security policy in the same manner in which individual clients are referenced.

    D

    Client groups are used to simplify configuration by enabling firewall user authentication without security policy.


    正确答案: D,A
    解析: 暂无解析

  • 第10题:

    多选题
    You need to configure the WLAN client utility on a new machine.  Which two of the following are true regarding this utility? ()
    A

    The Aironet Desktop Utility (ADU) can be used to enable or disable the adapter radio and to configure LEAP authentication with dynamic WEP.

    B

    In Windows XP environment, a client adapter can only be configured and managed with the Microsoft Configuration Manager.

    C

    The Microsoft Wireless Configuration Manager can be configured to display the Aironet System Tray Utility (ASTU) icon in the Windows system tray.

    D

    The Cisco Aironet Desktop Utility (ADU) and the Microsoft Wirelss Configuration Manager can both be enabled at the same time to setup WLAN client cards.


    正确答案: C,B
    解析: 暂无解析

  • 第11题:

    多选题
    Which two statements are true regarding interface properties? ()
    A

    MTU and speed must be configured under each unit.

    B

    Physical parameters such as MTU, duplex mode, and speed are configured under the interface name.

    C

    IP and IPv6 addresses are configured under a unit-number.

    D

    DLCI numbers, VPI/VCI values, and VLAN tags are physical parameters.


    正确答案: A,B
    解析: 暂无解析

  • 第12题:

    单选题
    Under which configuration hierarchy is an access profile configured for firewall user authentication?()
    A

    [edit access]

    B

    [edit security access]

    C

    [edit firewall access]

    D

    [edit firewall-authentication]


    正确答案: A
    解析: 暂无解析

  • 第13题:

    You need to configure the WLAN client utility on a new machine.  Which two of the following are true regarding this utility? ()

    • A、The Aironet Desktop Utility (ADU) can be used to enable or disable the adapter radio and to configure LEAP authentication with dynamic WEP.
    • B、In Windows XP environment, a client adapter can only be configured and managed with the Microsoft Configuration Manager.
    • C、The Microsoft Wireless Configuration Manager can be configured to display the Aironet System Tray Utility (ASTU) icon in the Windows system tray.
    • D、The Cisco Aironet Desktop Utility (ADU) and the Microsoft Wirelss Configuration Manager can both be enabled at the same time to setup WLAN client cards.

    正确答案:A,C

  • 第14题:

    Which two statements are true regarding interface properties? ()

    • A、MTU and speed must be configured under each unit.
    • B、Physical parameters such as MTU, duplex mode, and speed are configured under the interface name.
    • C、IP and IPv6 addresses are configured under a unit-number.
    • D、DLCI numbers, VPI/VCI values, and VLAN tags are physical parameters.

    正确答案:B,C

  • 第15题:

    You have configured router R1 with HSRP, using the standard defaults.  Which three statements  are true of a default HSRP configuration?()

    • A、 The Standby hello time is 2 seconds.
    • B、 Two HSRP groups are configured.
    • C、 The Standby track interface priority is 10.
    • D、 The Standby hold time is 10 seconds
    • E、 The Standby priority is 100.
    • F、 The Standby delay is 3 seconds.

    正确答案:C,D,E

  • 第16题:

    Under which configuration hierarchy is an access profile configured for firewall user authentication?()

    • A、[edit access]
    • B、[edit security access]
    • C、[edit firewall access]
    • D、[edit firewall-authentication]

    正确答案:A

  • 第17题:

    Which two statements regarding external authentication servers for firewall user authentication are true?() (Choose two.)

    • A、Up to three external authentication server types can be used simultaneously.
    • B、Only one external authentication server type can be used simultaneously.
    • C、If the local password database is not configured in the authentication order, and the configured authentication server  bypassed.
    • D、If the local password database is not configured in the authentication order, and the configured authentication server authentication is rejected.

    正确答案:B,D

  • 第18题:

    You are configuring an LDAP authentication server, and you want to configure role-mapping rules based on group membership. When you attempt to search for groups in the server catalog, no groups appear.Assuming the LDAP server is reachable and functioning properly, in the admin GUI. Which two parts of the configuration should you verify are correct?()

    • A、Finding user entries
    • B、Authentication required
    • C、LDAP Server Type
    • D、Determining group membership

    正确答案:B,D

  • 第19题:

    多选题
    In Multicast VPN (MVPN) implementations, which two of the following statements are regarding the DefaultMDT Group?()
    A

    It is used for PIM control traffic

    B

    It is optionally configured for a high bandwidth multicast source to reduce multicast traffic replication to uninterested PE routers

    C

    Within the VPF configuration in the PE router, multiple Default MDT groups are configured so each VPF can support multiple multicast sources

    D

    There is a reduced multicast state in the MPLS core P routers

    E

    When multicast traffic exceeds a certain configured threshold, traffic from the Data MDT is switched to the Default MDT to conserve bandwidth


    正确答案: E,C
    解析: 暂无解析

  • 第20题:

    多选题
    Which two statements are true regarding firewall user authentication?() (Choose two.)
    A

    When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.

    B

    When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.

    C

    If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .

    D

    If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.


    正确答案: D,A
    解析: 暂无解析

  • 第21题:

    多选题
    Which two statements regarding external authentication servers for firewall userauthentication are true?()
    A

    Up to three external authentication server types can be used simultaneously.

    B

    Only one external authentication server type can be used simultaneously.

    C

    If the local password database is not configured in the authentication order, and the configured authentication server is unreachable, authentication is not performed.

    D

    If the local password database is not configured in the authentication order, and the configured authentication server rejects the authentication request, authentication is not performed


    正确答案: B,A
    解析: 暂无解析

  • 第22题:

    多选题
    Which two statements regarding external authentication servers for firewall user authentication are true?() (Choose two.)
    A

    Up to three external authentication server types can be used simultaneously.

    B

    Only one external authentication server type can be used simultaneously.

    C

    If the local password database is not configured in the authentication order, and the configured authentication server  bypassed.

    D

    If the local password database is not configured in the authentication order, and the configured authentication server authentication is rejected.


    正确答案: B,A
    解析: 暂无解析

  • 第23题:

    多选题
    You have configured router R1 with HSRP, using the standard defaults.  Which three statements  are true of a default HSRP configuration?()
    A

    The Standby hello time is 2 seconds.

    B

    Two HSRP groups are configured.

    C

    The Standby track interface priority is 10.

    D

    The Standby hold time is 10 seconds

    E

    The Standby priority is 100.

    F

    The Standby delay is 3 seconds.


    正确答案: A,B
    解析: 暂无解析

  • 第24题:

    多选题
    Which two statements regarding configuring high availabily in the Cisco UCS is correct?()
    A

    High availability is enabled during the configuration of either HSRP or VRRP from global configuration  mode

    B

    High availability is configured during the initial setup of both Fabric interconnects

    C

    High availability can only be configured via the CMC

    D

    High availability is enabled during theinitial configuration of one of the Fabric  lnterconnects


    正确答案: A,D
    解析: 暂无解析