多项选择题
Which two firewall user authentication objects can be referenced in a security policy?()
A.access profile
B.client group
C.client
D.default profile
相关考题
-
单项选择题
Underwhichconfigurationhierarchyisanaccessprofileconfiguredforfirewalluserauthentication?()
A.[edit access]
B.[edit security access]
C.[edit firewall access]
D.[edit firewall-authentication] -
单项选择题
Whichstatementaccuratelydescribesfirewalluserauthentication?()
A.Firewall user authentication provides another layer of security in a network.
B.Firewall user authentication provides a means for accessing a JUNOS Software-based security device.
C.Firewall user authentication enables session-based forwarding.
D.Firewall user authentication is used as a last resort security method in a network. -
多项选择题
Whichtwostatementsaretrueregardingfirewalluserauthentication?()
A.When configured for pass-through firewall user authentication, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.
B.When configured for Web firewall user authentication only, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.
C.If a JUNOS security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted to perform authentication.
D.If a JUNOS security device is configured for Web firewall user authentication, new sessions are automatically intercepted to perform authentication.
