网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
If authentication is enabled,which statement is true?()
A
client reports will display authenticated usernames
B
client reports will display both the username and IP address of the clients
C
client reports are not affected by authentication
D
client reports will display the IP address of the authentication server
参考答案
参考解析
解析:
暂无解析
更多 “单选题If authentication is enabled,which statement is true?()A client reports will display authenticated usernamesB client reports will display both the username and IP address of the clientsC client reports are not affected by authenticationD client reports will display the IP address of the authentication server” 相关考题
考题
Which statement is true about the plan being loaded into the SQL baseline by the above command?()
A. It is loaded with the FIXED status.B. It is loaded with the ACCEPTED status.C. It is not loaded with the ENABLED status.D.It is not loaded with the ACCEPTED status.
考题
Which statement about the enabling of table compression in Oracle Database 11g is true?()
A. Compression can be enabled at the table, tablespace, or partition level for direct loads only.B. Compression can be enabled only at the table level for both direct loads and conventional DML.C. Compression can be enabled at the table, tablespace, or partition level for conventional DML only.D. Compression can be enabled at the table, tablespace, or partition level for both direct loads and conventional DML.
考题
Which statement about Remotely Triggered Black Hole (RTBH) is true?()A、Route tagging is one of the techniques used by RTBHB、It is used for BGP authenticationC、It cannot work with static routesD、It uses extended ACLs for blocking attacks by creating a black holeE、Before configuring RTBH LDP must be enabled on the interface
考题
Which statement about RIPng is true?()A、RIPng allows for routes with up to 30 hops.B、RIPng is enabled on each interface separately.C、RIPng uses broadcasts to exchange routes.D、There can be only one RIPng process per router.
考题
Which statement is true about the SDM QoS wizard and its ability to enable a QoS policy on router interfaces?()A、QoS can be enabled on interfaces used for Easy VPN clientsB、QoS can be enabled on IPsec VPN interfaces and tunnelsC、QoS can be enabled on interfaces with an existing QoS policyD、the QoS policy can be enabled for incoming and outgoing traffic on the interface
考题
Which statement about OSPF authentication is true?()A、To enable OSPF authentication in a network, OSPF area 0 authentications must be enabled firstB、The payload of OSPF version 3 packets contains no authentication informationC、OSPF version 3 supports Advanced Encryption StandardD、OSPF version 3 uses router ID as a key to encrypt OSPF hello packetsE、OSPF MD5 authentication uses TCP, and Plan Test authentication uses UDP
考题
Which statement describes the Authentication Proxy feature?()A、All traffic is permitted from the inbound to the outbound interface upon successful authentication of the user.B、A specific access profile is retrieved from a TACACS+ or RADIUS server and applied to an IOS Firewall based on user provided credentials.C、Prior to responding to a proxy ARP,the router will prompt the user for a login and password which are authenticated based on the configured AAA policy.D、The proxy server capabilities of the IOS Firewall are enabled upon successful authentication of the user.
考题
Which statement regarding 802.1X is true?()A、802.1X is simple to implement on any workstation.B、802.1X requires access-lists to allow IP voice traffic across.C、Authentication is initiated when the workstation connects to an Ethernet port.D、802.1X requires HTTP access to initiate authentication.
考题
Which statement about the ip classless router command is true?()A、The ip classless command is enabled by default in recent versions of IOS.B、The ip classless command should only be enabled when static routing is being used instead of a routing protocol.C、The ip classless command should be enabled by the network administrator whenever RIPv1 or IGRP is being used.D、The ip classless command should be enabled by the network administrator whenever OSPF, RIPv2, or EIGRP is being used.
考题
If authentication is enabled,which statement is true?()A、client reports will display authenticated usernamesB、client reports will display both the username and IP address of the clientsC、client reports are not affected by authenticationD、client reports will display the IP address of the authentication server
考题
Which statement about WSA user authentication is true?() A、 a single WSA can have multiple LDAP realmsB、 WSA supports LDAP but not NTLMC、 WSA supports NTLM but not LDAPD、 a single WSA can have up to two authentication realms: one for LDAP and for NTLM
考题
Which statement about HTTPS decryption on the WSA is true?() A、if enabled, all HTTPS traffic must be decryptedB、if WBRS is enabled, it can be used to determine whether the HTTPS traffic is to be decryptedC、decrypted HTTPS traffic is sent unencrypted across the enterprise intranetD、object size can be used to determine whether the HTTPS traffic is to be decrypted
考题
In the Junos OS, which statement is true?()A、vlan.0 belongs to the untrust zone.B、You must configure Web authentication to allow inbound traffic in the untrust zone.C、The zone name "untrust" has no special meaning.D、The untrust zone is not configurable.
考题
Which statement is true regarding the Network Time Protocol (NTP) on Junos devices?()A、MD5 authentication is supported by the Junos OSB、Server mode is not supported by the Junos OSC、The Junos OS can provide a primary time referenceD、The Junos OS does not support the use of a boot server
考题
You navigate to "UAC" "Infranet Enforcer" "Auth Table Mapping" in the admin GUI. You see one policy, which is the unmodified, original default policy.Which statement is true?()A、Dynamic auth table mapping is not enabled.B、A successful authentication attempt will result in a new authentication table entry, which will be delivered only to the Junos enforcer protecting the network from which the user has authenticated.C、To create a static auth table mapping, you must delete the default policy.D、The default policy applies only to the factory-default role User.
考题
Consider the Mysql Enterprise Audit plugin. Which statement is true when you identify a connection event that has used external authentication?()A、The attribute "STATUS" is set to the string EXTERNAL_AUTHB、The attribute "PRIV_USER" contains the usernameC、The event type that is given in the attribute "NAME" is EXTERNAL_AUTHD、There is no differentiation between native and external authentication eventsE、External authentication is managed through external auditing logsF、The "PROXY_PRIV" user shows a username if external authentication is used
考题
单选题Which statement is true when logging in using the WebUI? ()A
Port 80 for HTTP is enabled by default.B
Port 443 for HTTPS is enabled by default.C
Port 8090 for HTTP is enabled by default.D
Both HTTP and HTTPS are enabled using their standard port values.
考题
单选题Which statement is true when you enable SSL for the WebUI?()A
SSL is enabled for the WebUI by default.B
You must address the WebUI using HTTPS://.C
You must change the WebUI port when enabling SSL.D
The demokey and democert are applied to the WebUI by default.
考题
单选题Which statement is true regarding the Network Time Protocol (NTP) on Junos devices?()A
MD5 authentication is supported by the Junos OSB
Server mode is not supported by the Junos OSC
The Junos OS can provide a primary time referenceD
The Junos OS does not support the use of a boot server
考题
单选题In the Junos OS, which statement is true?()A
vlan.0 belongs to the untrust zone.B
You must configure Web authentication to allow inbound traffic in the untrust zone.C
The zone name untrust has no special meaning.D
The untrust zone is not configurable.
考题
单选题Which statement about HTTPS decryption on the WSA is true?()A
if enabled, all HTTPS traffic must be decryptedB
if WBRS is enabled, it can be used to determine whether the HTTPS traffic is to be decryptedC
decrypted HTTPS traffic is sent unencrypted across the enterprise intranetD
object size can be used to determine whether the HTTPS traffic is to be decrypted
考题
单选题Which statement about RIPng is true?()A
RIPng allows for routes with up to 30 hops.B
RIPng is enabled on each interface separately.C
RIPng uses broadcasts to exchange routes.D
There can be only one RIPng process per router.
考题
单选题Consider the Mysql Enterprise Audit plugin. Which statement is true when you identify a connection event that has used external authentication?()A
The attribute STATUS is set to the string EXTERNAL_AUTHB
The attribute PRIV_USER contains the usernameC
The event type that is given in the attribute NAME is EXTERNAL_AUTHD
There is no differentiation between native and external authentication eventsE
External authentication is managed through external auditing logsF
The PROXY_PRIV user shows a username if external authentication is used
考题
单选题You navigate to "UAC" "Infranet Enforcer" "Auth Table Mapping" in the admin GUI. You see one policy, which is the unmodified, original default policy.Which statement is true?()A
Dynamic auth table mapping is not enabled.B
A successful authentication attempt will result in a new authentication table entry, which will be delivered only to the Junos enforcer protecting the network from which the user has authenticated.C
To create a static auth table mapping, you must delete the default policy.D
The default policy applies only to the factory-default role User.
考题
单选题Which statement is true regarding syslog on Junos devices?()A
No logging is enabled by defaultB
By default the information is stored in all file named eventsC
Only the message severity level must be configuredD
You can configure the router to send log messages to the console
考题
单选题Which statement about OSPF authentication is true?()A
To enable OSPF authentication in a network, OSPF area 0 authentications must be enabled firstB
The payload of OSPF version 3 packets contains no authentication informationC
OSPF version 3 supports Advanced Encryption StandardD
OSPF version 3 uses router ID as a key to encrypt OSPF hello packetsE
OSPF MD5 authentication uses TCP, and Plan Test authentication uses UDP
考题
单选题Which statement about WSA user authentication is true?()A
a single WSA can have multiple LDAP realmsB
WSA supports LDAP but not NTLMC
WSA supports NTLM but not LDAPD
a single WSA can have up to two authentication realms: one for LDAP and for NTLM
考题
单选题Which statement is true regarding proxy ARP?()A
Proxy ARP is enabled by default on stand-alone JUNOS security devices.B
Proxy ARP is enabled by default on chassis clusters.C
JUNOS security devices can forward ARP requests to a remote device when proxy ARP is enabled.D
JUNOS security devices can reply to ARP requests intended for a remote device when proxy ARP is enabled
热门标签
最新试卷