niusouti.com

When using RADIUS as an external authentication method for 802.1X authentication for the Junos Pulse Access Control Service, what must you do to ensure that the RADIUS authentication works properly?()A. Configure IP helper to forward the authentication re

题目
When using RADIUS as an external authentication method for 802.1X authentication for the Junos Pulse Access Control Service, what must you do to ensure that the RADIUS authentication works properly?()

A. Configure IP helper to forward the authentication requests from the clients to the external RADIUS server

B. Configure the supplicant as anexternal authentication server

C. Configure RADIUS proxy on the realm

D. Specify the correct RADIUS port 389 on the Junos Pulse Access Control Service


相似考题
更多“When using RADIUS as an external authentication method for 802.1X authentication for the Junos Pulse Access Control Service, what must you do to ensure that the RADIUS authentication works properly?() ”相关问题
  • 第1题:

    Whichsecuritymechanismusestheconceptofarealm?()

    A.Authorization

    B.Dataintegrity

    C.Confidentiality

    D.Authentication


    参考答案:D

  • 第2题:

    Which two commands are used during the password recovery process?()

    A. clear system login

    B. boot -s

    C. recovery

    D. delete system root-authentication


    参考答案:B, C

  • 第3题:

    Which component of VPN technology ensures that data can be read only by its intended recipient?()

    A. data integrity

    B. encryption

    C. key exchange

    D. authentication


    参考答案:D

  • 第4题:

    A company is using RADIUS to authenticate login requests to its Juniper Networks routers. Usersshould still be able to authenticate using the local password database but only if the RADIUS server is unreachable. Which JUNOS software configuration accomplishes this goal?()

    A. authentication-order radius;

    B. authentication-order password;

    C. authentication-order [radius password];

    D. authentication-order [password radius];


    参考答案:A

  • 第5题:

    A common technique used to prevent the unauthorized network devices from sending trafficacross a network is port()

    A.spanning

    B.address translation

    C.mirroring

    D.authentication


    参考答案:D

  • 第6题:

    【单选题】通过Console口配置路由器,只需要密码验证需要配置身份验证模式为()。

    A.[R1-ui-console0]authentication-mode password

    B.[R1-ui-console0]authentication-mode aaa

    C.[R1-ui-console0]authentication-mode Radius

    D.[R1-ui-console0]authentication-mode scheme


    C