搜题
用户您好, 请在下方输入框内搜索其它题目:
搜题
题目内容 (请给出正确答案)
提问人:网友 发布时间:
【单选题】

Which user authenticaton method is supported by the Junos OS as the last resort alternative?()

A、TACACS+

B、RADIUS

C、local user database

D、enable password

更多“Which user authenticaton method is supported by the Junos OS as the last resort alternative?()”相关的问题
第1题

A、When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.  B、When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.  C、If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .  D、If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.  

点击查看答案
第2题

A、Firewall userauthentication provides another layer of security in a network.  B、Firewall userauthentication provides a means for accessing a JUNOS Software-based security device.  C、Firewall userauthentication enables session-based forwarding.  D、Firewall userauthentication is used as a last resort security method in a network.  

点击查看答案
第5题

A、aaa new-model  B、aaa telnet login  C、telnet authentication login  D、authentication telnet login  

点击查看答案
第6题

A、show access firewall-authentication  B、show security firewall-authentication users  C、show security audit log  D、show security firewall-authentication history  

点击查看答案
第7题

A、MD5 and SHA  B、RADIUS and TACACS only  C、Local User Database  D、Local user Database, RADIUS, and TACACS+  

点击查看答案
第8题

A、The user will be instructed to call the network administrator.  B、The user will fail authentication.  C、The user will be prompted to install a new device certificate on the MAG Series device.  D、The user will successfully authenticate and have full network access.  

点击查看答案
第10题

A、Dynamic auth table mapping is not enabled.  B、A successful authentication attempt will result in a new authentication table entry, which will be delivered only to the Junos enforcer protecting the network from which the user has authenticated.  C、To create a static auth table mapping, you must delete the default policy.  D、The default policy applies only to the factory-default role User.  

点击查看答案
客服
TOP

请使用微信扫码支付

订单号:
遇到问题请联系在线客服