更多"Which user authentication methods a"的相关试题:
[多项选择]Which three user authentication methods are supported by the Junos OS?()
A. RADIUS
B. CHAP
C. local user database
D. TACACS+
E. PAP
[多项选择]Which two external authentication methods are supported by the Junos OS for user authentication?()
A. RADIUS
B. KERBEROS
C. IPsec
D. TACACS+
[单项选择]Which user authentication method is supported by the Junos OS as a last resort alternative?()
A. TACACS+
B. RADIUS
C. local user database
D. enable password
[多项选择]Which two methods of authentication are used by the Infranet Controller for IPSec enforcement?()
A. dial-up VPN
B. IKE authentication
C. XAuth authentication
D. shared IKE authentication
[多项选择]Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)
A. access profile
B. client group
C. client
D. default profile
E. external
[多项选择]An authentication realm consists of which three authentication resources?()
A. Authentication server
B. Session options
C. Authentication policy
D. End-point security policy
E. Role-mapping rules
[单项选择]Which PPP subprotocol negotiates authentication options?()
A. NCP
B. LCP
C. ISDN
D. DLCI
E. SLIP
[单项选择]Which user authenticaton method is supported by the Junos OS as the last resort alternative?()
A. TACACS+
B. RADIUS
C. local user database
D. enable password
[多项选择]Which three authentication options does OSPF support?()
A. DES
B. MD5
C. Kerberos
D. unauthenticated
E. simple password
[多项选择]Which three authentication resources are grouped within an authentication realm?()
A. Authentication enforcer
B. Directory server
C. Captive authentication
D. Authentication policy
E. Role-mapping rules
[多项选择]Which three authentication server types are supported for retrieving user attributes used in role- mapping rules?()
A. LDAP
B. S/Key
C. TACACS+
D. RADIUS
E. SiteMinder
[多项选择]Which two external authentication servers are supported for administrative access to a Junos device?()
A. RADIUS
B. LDAP
C. ACE
D. TACACS+
[单项选择]Which of the following authentication protocols uses certificates to negotiate access to the network?()
A. PAP
B. CHAP
C. EAP-TLS
D. Kerberos
[单项选择]Which command displays the CHAP authentication process as it occurs between two routers?()
A. debug authentication
B. debug chap ppp
C. debug chap authentication
D. debug ppp authentication