网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
Which three authentication server types are supported for retrieving user attributes used in role- mapping rules?()
- A、LDAP
- B、S/Key
- C、TACACS+
- D、RADIUS
- E、SiteMinder
参考答案
更多 “Which three authentication server types are supported for retrieving user attributes used in role- mapping rules?()A、LDAPB、S/KeyC、TACACS+D、RADIUSE、SiteMinder” 相关考题
考题
An authentication realm consists of which three authentication resources?()
A. Authentication serverB. Session optionsC. Authentication policyD. End-point security policyE. Role-mapping rules
考题
Which three authentication resources are grouped within an authentication realm?()
A. Authentication enforcerB. Directory serverC. Captive authenticationD. Authentication policyE. Role-mapping rules
考题
On which three traffic types does firewall pass-through authentication work? ()(Choose three.)
A. pingB. FTPC. TelnetD. HTTPE. HTTPS
考题
Which three RIP features are supported on the WX or WXC device? ()(Choose three.)
A. SHA-1B. MD5 authenticationC. version 1 messagesD. version 2 messagesE. plain-text authentication
考题
Which three authentication options does OSPF support?()
A. DESB. MD5C. KerberosD. unauthenticatedE. simple password
考题
Which three are current small business needs for technology investments? ()A、be more productiveB、plan for todayC、work from anywhereD、reduce reliance on technologyE、serve customers betterF、minimize network investments
考题
Which of the following procedures are involved in the recommended three-step troubleshootingflow?(Choose the best three answers.)()A、Problem reportB、Problem collaborationC、Problem diagnosisD、Problem resolutionE、Problem documentationF、Probiem authentication
考题
On which three traffic types does firewall pass-through authentication work? ()(Choose three.)A、pingB、FTPC、TelnetD、HTTPE、HTTPS
考题
Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by ESP?() (Choose three.)A、data integrityB、data confidentialityC、data authenticationD、outer IP header confidentialityE、outer IP header authentication
考题
An authentication realm consists of which three authentication resources?()A、Authentication serverB、Session optionsC、Authentication policyD、End-point security policyE、Role-mapping rules
考题
Which two statements about using the CHAP authentication mechanism in a PPP link are true?()A、CHAP uses a two-way handshakeB、CHAP authentication periodically occurs after link establishmentC、CHAP has no protection from playback attacksD、CHAP authentication is performed only upon link establishmentE、CHAP uses a three-way handshakeF、CHAP authentication passwords are sent in plaintext
考题
Which three authentication resources are grouped within an authentication realm?()A、Authentication enforcerB、Directory serverC、Captive authenticationD、Authentication policyE、Role-mapping rules
考题
Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)A、access profileB、client groupC、clientD、default profileE、external
考题
Which three user authentication methods are supported by the Junos OS?()A、RADIUSB、CHAPC、local user databaseD、TACACS+E、PAP
考题
多选题On which three traffic types does firewall pass-through authentication work? ()(Choose three.)ApingBFTPCTelnetDHTTPEHTTPS
考题
多选题Which two statements about using the CHAP authentication mechanism in a PPP link are true?()ACHAP uses a two-way handshakeBCHAP authentication periodically occurs after link establishmentCCHAP has no protection from playback attacksDCHAP authentication is performed only upon link establishmentECHAP uses a three-way handshakeFCHAP authentication passwords are sent in plaintext
考题
多选题Which three RIP features are supported on the WX or WXC device? ()(Choose three.)ASHA-1BMD5 authenticationCversion 1 messagesDversion 2 messagesEplain-text authentication
考题
多选题Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by AH?() (Choose three.)Adata integrityBdata confidentialityCdata authenticationDouter IP header confidentialityEouter IP header authentication
考题
多选题Which two statements regarding external authentication servers for firewall userauthentication are true?()AUp to three external authentication server types can be used simultaneously.BOnly one external authentication server type can be used simultaneously.CIf the local password database is not configured in the authentication order, and the configured authentication server is unreachable, authentication is not performed.DIf the local password database is not configured in the authentication order, and the configured authentication server rejects the authentication request, authentication is not performed
考题
多选题Which two statements regarding external authentication servers for firewall user authentication are true?() (Choose two.)AUp to three external authentication server types can be used simultaneously.BOnly one external authentication server type can be used simultaneously.CIf the local password database is not configured in the authentication order, and the configured authentication server bypassed.DIf the local password database is not configured in the authentication order, and the configured authentication server authentication is rejected.
考题
多选题An authentication realm consists of which three authentication resources?()AAuthentication serverBSession optionsCAuthentication policyDEnd-point security policyERole-mapping rules
考题
多选题Which three authentication resources are grouped within an authentication realm?()AAuthentication enforcerBDirectory serverCCaptive authenticationDAuthentication policyERole-mapping rules
考题
多选题Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)Aaccess profileBclient groupCclientDdefault profileEexternal
考题
多选题Which three authentication options does OSPF support?()ADESBMD5CKerberosDUnauthenticatedESimple password
考题
多选题Which three configuration steps must be completed for a Cisco router in order to enable local AAA login authentication?() (Choose three.)AApply the method list to an interfaceBSpecify the default method list and apply it to the interfaceCEnable AAADDefine a method list
考题
多选题Which three user authentication methods are supported by the Junos OS?()ARADIUSBCHAPClocal user databaseDTACACS+EPAP
考题
多选题Which three authentication server types are supported for retrieving user attributes used in role- mapping rules?()ALDAPBS/KeyCTACACS+DRADIUSESiteMinder
热门标签
最新试卷