网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
In computer security, AAA stands for authentication, authorization and accounting. Which optionabout the AAA authentication enable default group radius enable command is correct?()
A

If the radius server returns an error, the enable password will be used

B

If the radius server returns a ’failed’ message, the enable password will be used

C

The command login authentication group will associate the AM authentication to a specifiedinterface

D

If the group database is unavailable, the radius server will be used


参考答案

参考解析
解析: 暂无解析
更多 “单选题In computer security, AAA stands for authentication, authorization and accounting. Which optionabout the AAA authentication enable default group radius enable command is correct?()A If the radius server returns an error, the enable password will be usedB If the radius server returns a ’failed’ message, the enable password will be usedC The command login authentication group will associate the AM authentication to a specifiedinterfaceD If the group database is unavailable, the radius server will be used” 相关考题
考题 An authentication realm consists of which three authentication resources?() A. Authentication serverB. Session optionsC. Authentication policyD. End-point security policyE. Role-mapping rules

考题 Which configuration command allows the router to utilize a RADIUS server to authenticate incoming Telnet users?() A.aaa new-modelB.aaa telnet loginC.telnet authentication loginD.authentication telnet login

考题 The major technical areas of computer security are usually represented by the initials CIA(71),integrity,and authentication or availability.A.confidentialityB.confidentC.secretD.safety

考题 AAA不包括哪一项?()。 A.appendingB.authorizationC.accountingD.authentication

考题 Which information is contained in a AAA authentication method list?()A、A pointer to the address where a RADIUS server can be locatedB、A sequential list of user authentication methodsC、A description of what a user can execute on a routerD、The setup for the authentication phase on a router

考题 Which one of the following commands can be used to enable AAA authentication to determine if a user canaccess the privilege command level?()A、aaa authentication enable method defaultB、aaa authentication enable defaultC、aaa authentication enable levelD、aaa authentication enable default local

考题 AAA authentication login做什么用?

考题 Which two statements are true regarding firewall user authentication?() (Choose two.)A、When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.B、When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.C、If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .D、If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.

考题 An authentication realm consists of which three authentication resources?()A、Authentication serverB、Session optionsC、Authentication policyD、End-point security policyE、Role-mapping rules

考题 How do you define the authentication method that will be used with AAA?()A、With the method aaa commandB、With the method commandC、With a method listD、With a method statement

考题 In computer security, AAA stands for authentication, authorization and accounting. Which optionabout the AAA authentication enable default group radius enable command is correct?()A、If the radius server returns an error, the enable password will be usedB、If the radius server returns a ’failed’ message, the enable password will be usedC、The command login authentication group will associate the AM authentication to a specifiedinterfaceD、If the group database is unavailable, the radius server will be used

考题 AAA是验证,授权和记帐(Authentication,Authorization,Accounting)的简称。()

考题 Which two statements are true regarding firewall user authentication?()A、When configured for pass-through firewall user authentication, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.B、When configured for Web firewall user authentication only, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.C、If a JUNOS security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted to perform authentication.D、If a JUNOS security device is configured for Web firewall user authentication, new sessions are automatically intercepted to perform authentication.

考题 Which configuration command allows the router to utilize a RADIUS server to auth enticate in coming Telnet users?()A、aaa new-modelB、aaa telnet loginC、telnet authentication loginD、authentication telnet login

考题 Which configuration command allows the router to utilize a RADIUS server to authenticate incoming Telnet users?()A、aaa new-modelB、aaa telnet loginC、telnet authentication loginD、authentication telnet login

考题 Identify the two optional WebLogic security providers in an Oracle WebLogic security realm()A、 Authentication ProviderB、 Adjudication ProviderC、 Authorization ProviderD、 Auditing Provider

考题 You are a help desk technician for your company. Susan is an executive. Because Susan travels frequently, she uses a Windows XP Professional portable computer that has a smart card reader.  Susan asks you to configure her computer so that she can dial in to the company network when she is out of the office. Company security policy states that dial-in users must use a smart card when they connect to the network, and that the users must use the strongest form of data encryption possible. Company security policy also states that client computers must disconnect if the Routing and Remote Access server does not support both smart card authentication and the strongest possible authentication. You need to configure the dial-up connection properties on Susan’s computer to dial in to the company network. Your solution must ensure that company security policies are enforced.  Which three actions should you perform?() A、Select the Advanced (custom settings) security option.B、Select the Require data encryption check box. C、Select the Typical (recommended settings) security option. D、Select the Use smart card item from the Validate my identity as follows list.E、Select the Maximum strength encryption item from the Data encryption list.F、Select the Extensible Authentication Protocol (EAP) option, and select Smart Card or other Certificate from the EAP list.

考题 You are designing an authentication solution to meet the security needs of the network administrators. You install an enterprise certification authority (CA). Which three additional actions should you take?()A、Enroll each administrative account for a smart card authentication certificate.B、Configure autoenrollment for computer authentication certificates. C、Install a smart card reader on each server computer.  D、Install a smart card reader on each network administrator’s computer.  E、Configure each administrative account to require a smart card for interactive logon.F、Configure the Default Domain Policy GPO to require smart cards for interactive login.

考题 You upgrade your computer from Windows NT Workstation to a Windows 2000 Professional computer. Your computer is a member of justtalks.com domain. Prior to this upgrade your computer was configured by a system policy to require at-least a 12 alphanumeric character password. After the upgrade your computer will not apply security policy. What should you do?()A、Use secedit.exe to refresh the security policy.B、Use the local computer policy to configure the local security policy.C、Use security configuration and analysis to support the security files as a .pol file.D、Use computer management to configure the security policy setting.

考题 You need to recommend a security strategy for WebApp2 that meets the company’s applicaton  requirements.What should you include in the recommendation?()A、Basic authentication and connection security rulesB、Basic authentication and SSLC、Digest authentication and connection security rulesD、Digest authentication and SSL

考题 单选题Which statement accurately describes firewall user authentication?()A Firewall user authentication provides another layer of security in a network.B Firewall user authentication provides a means for accessing a JUNOS Software-based security device.C Firewall user authentication enables session-based forwarding.D Firewall user authentication is used as a last resort security method in a network.

考题 多选题Which two statements are true regarding firewall user authentication?()AWhen configured for pass-through firewall user authentication, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.BWhen configured for Web firewall user authentication only, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.CIf a JUNOS security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted to perform authentication.DIf a JUNOS security device is configured for Web firewall user authentication, new sessions are automatically intercepted to perform authentication.

考题 多选题Which two statements are true regarding firewall user authentication?() (Choose two.)AWhen configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.BWhen configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.CIf a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .DIf a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.

考题 单选题Which one of the following commands can be used to enable AAA authentication to determine if a user canaccess the privilege command level?()A aaa authentication enable method defaultB aaa authentication enable defaultC aaa authentication enable levelD aaa authentication enable default local

考题 问答题AAA authentication login做什么用?

考题 单选题How do you define the authentication method that will be used with AAA?()A With the method aaa commandB With the method commandC With a method listD With a method statement

考题 多选题Which two commands can be used to monitor firewall user authentication?()Ashow access firewall-authenticationBshow security firewall-authentication usersCshow security audit logDshow security firewall-authentication history