网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
A company is using RADIUS to authenticate login requests to its Juniper Networks routers. Usersshould still be able to authenticate using the local password database but only if the RADIUS server is unreachable. Which JUNOS software configuration accomplishes this goal?()
A

authentication-order radius;

B

authentication-order password;

C

authentication-order [radius password];

D

authentication-order [password radius];


参考答案

参考解析
解析: 暂无解析
更多 “单选题A company is using RADIUS to authenticate login requests to its Juniper Networks routers. Usersshould still be able to authenticate using the local password database but only if the RADIUS server is unreachable. Which JUNOS software configuration accomplishes this goal?()A authentication-order radius;B authentication-order password;C authentication-order [radius password];D authentication-order [password radius];” 相关考题
考题 Which two client requests are captured during database replay Capture?() A. Flashback queriesB. Shared server requestsC. Login and logoff activities of sessionsD. Direct path load of data from external files by using utilities such as SQL *loaderE. Data definition language (DDL) and data manipulation language (DML) operations

考题 You use—login-path to access a MySQL server on a Linux installation.Which statement is true about the – login-path option that is created by using mysql_config_editor?() A.All system users have access to the MySQL server via—login path localB.login-path can be used only for MySQL servers running on a local machineC.login-path allows you to provide login credentials without passing clear text passwords on the command lineD.When using – login-path to connect to a remote MySQL server, the remote server version must be 5.6 or later

考题 Which two client requests are captured during database replay Capture?() (Choose two) A. Flashback queriesB. Shared server requestsC. Login and logoff activities of sessionsD. Direct path load of data from external files by using utilities such as SQL *loaderE. Data definition language (DDL) and data manipulation language (DML) operations

考题 When using RADIUS as an external authentication method for 802.1X authentication for the Junos Pulse Access Control Service, what must you do to ensure that the RADIUS authentication works properly?() A. Configure IP helper to forward the authentication requests from the clients to the external RADIUS serverB. Configure the supplicant as anexternal authentication serverC. Configure RADIUS proxy on the realmD. Specify the correct RADIUS port 389 on the Junos Pulse Access Control Service

考题 Which configuration command allows the router to utilize a RADIUS server to authenticate incoming Telnet users?() A.aaa new-modelB.aaa telnet loginC.telnet authentication loginD.authentication telnet login

考题 Which software process sorts client login requests and assigns them to a virtual router for RADIUS service?() A.PPPB.AAAC.LCPD.NCP

考题 A company is using RADIUS to authenticate login requests to its Juniper Networks routers. Usersshould still be able to authenticate using the local password database but only if the RADIUS server is unreachable. Which JUNOS software configuration accomplishes this goal?()A. authentication-order radius;B. authentication-order password;C. authentication-order [radius password];D. authentication-order [password radius];

考题 A router has been configured with the settings shown below:[edit]user@host show system authentication-order authentication-order [ radius tacplus ];The router also has a local database that contains the user lab with password lab123. What would happen if both the RADIUS and the TACACS servers are not accessible?()A.The user lab will not be able to login.B.The user lab will be authenticated against the local database and will be able to login.C.The user lab will receive an error message indicating the router is unable to authenticate due to the authentication servers not responding.D.The user will be able to login only if tries to login as the root user.

考题 The authentication order configuration on your M120 includes the settings tacplus and radius (in that order), but does not include the password parameter. You attempt to log in to the device, but the network containing the authentication servers is currently down. Which statement is true about your login attempt?()A、The login attempt is rejected.B、The login attempt is automatically accepted after the authentication servers’ timeout value is reached, since there are no other authentication methods available.C、The M120 automatically tries authenticating locally on the device after the authentication servers’ timeout value is reached.D、The M120 automatically tries authenticating locally on the device before using external authentication.

考题 Which two client requests are captured during database replay Capture?()A、Flashback queriesB、Shared server requestsC、Login and logoff activities of sessionsD、Direct path load of data from external files by using utilities such as SQL *loaderE、Data definition language (DDL) and data manipulation language (DML) operations

考题 You are the network administrator for Company. Company’s network consists of 200 Windows 2000 Professional computers. CompanyW1 is a Windows 2000 Server computer that hosts Company’s intranet site. CompanyP1 is a computer running Microsoft Proxy Server that is used by all computers on the network to access the Internet. You discover that CompanyP1 is experiencing performance degradation due to large number of requests to authenticate with the proxy server. You want to minimize the number of authentication requests to the proxy server. What should you do on each computer?()A、Configure the proxy server settings to have a Secure proxy address of CompanyP1.B、Configure the proxy server settings to bypass the proxy server for local addresses.C、Add CompanyW1 to the Local intranet zone.D、Add the CompanyW1 to the list of trusted sites.

考题 What is the objective of the aaa authentication login console-in local command?()A、It specifies the login authentication method list named console-in using the local user database on the routerB、It specifies the login authorization method list named console-in using the local RADIUS username-password data baseC、It specifies the login authentication list named console-in using the local username- password data base on the routerD、It specifies the login authorization method list named console-in using the local username- password data base on the router

考题 In computer security, AAA stands for authentication, authorization and accounting. Which optionabout the AAA authentication enable default group radius enable command is correct?()A、If the radius server returns an error, the enable password will be usedB、If the radius server returns a ’failed’ message, the enable password will be usedC、The command login authentication group will associate the AM authentication to a specifiedinterfaceD、If the group database is unavailable, the radius server will be used

考题 Company.com has encountered a problem on the HMC, which requires access to the root shell on the HMC. Which of the following is necessary to access the root userid on the HMC?()A、Enable remote commands on the HMC Configuration menu,then use ssh to login to theHMC,enter su - rootB、Login to the HMC as hscpe and run pesh,using a temporary password from IBM Support,afterward, enter su - rootC、Login to the HMC as hscroot,then run pesh,using a temporary password from IBM Support, afterward,enter su - rootD、Enable remote commands on the HMC Configuration menu,then telnet in as hscroot,entersu - root

考题 Which software process sorts client login requests and assigns them to a virtual router for RADIUS service?()A、PPPB、AAAC、LCPD、NCP

考题 Which two client requests are captured during database replay Capture?() (Choose two)A、Flashback queriesB、Shared server requestsC、Login and logoff activities of sessionsD、Direct path load of data from external files by using utilities such as SQL *loaderE、Data definition language (DDL) and data manipulation language (DML) operations

考题 Your corporate network has a member server named RAS1 that runs Windows Server 2008 R2. You configure RAS1 to use the Routing and Remote Access Services (RRAS).The companys remote access policy allows members of the Domain Users group to dial in to RAS1. The company issues smart cards to all employees.You need to ensure that smart card users are able to connect to RAS1 by using a dial-up connection.What should you do?()A、Install the Network Policy Server (NPS) server role on RAS1.B、Create a remote access policy that requires users to authenticate by using SPAP.C、Create a remote access policy that requires users to authenticate by using EAP-TLS.D、Create a remote access policy that requires users to authenticate by using MS-CHAP v2.

考题 Your corporate network has a member server named RAS1 that runs Windows Server 2008. You configure RAS1 to use the Routing and Remote Access Service (RRAS) The companys remote access policy allows members of the Domain Users group to dial in to RAS1. The company issues smart cards to all employees. You need to ensure that smart card users are able to connect to RAS1 by using a dial-up connection. What should you do?()A、 Install the Network Policy Server (NPS) on the RAS1 serverB、 Create a remote access policy that requires users to authenticate by using SPAPC、 Create a remote access policy that requires users to authenticate by using EAP-TLSD、 Create a remote access policy that requires users to authenticate by using MS-CHAP v2

考题 多选题You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance which uses mixed authentication mode. The instance runs on a computer which has Windows Server 2003 installed. You must make sure that the SQL Server 2008 authenticated logins follow the same password complexity rules that are enforced by Windows Server 2003. Besides this, you must make sure that the password complexity rules continue to be enforced.  So what action should you perform to achieve this goal?()AYou should create an SQL Server Agent job. If a rule violation is detected, the job runs periodically to raise an alertBYou should modify all logins by using the ALTER LOGIN ... HASHED statement.CYou should modify all logins by using the ALTER LOGIN ... CHECK_POLICY = ON statement to.DYou should modify all logins by using the ALTER LOGIN ... CHECK_EXPIRATION = ON statement.EYou should create a policy by using Policy-Based Management. The policy prevents any violation of these rules

考题 单选题Your corporate network has a member server named RAS1 that runs Windows Server 2008 R2. You configure RAS1 to use the Routing and Remote Access Services (RRAS). The companyˉs remote access policy allows members of the Domain Users group to dial in to RAS1. The company issues smart cards to all employees. You need to ensure that smart card users are able to connect to RAS1 by using a dial-up connection. What should you do?()A Install the Network Policy Server (NPS) server role on RAS1.B Create a remote access policy that requires users to authenticate by using SPAP.C Create a remote access policy that requires users to authenticate by using EAP-TLS.D Create a remote access policy that requires users to authenticate by using MS-CHAP v2.

考题 单选题A router has been configured with the settings shown below: [edit] user@host# show system authentication-order authentication-order [ radius tacplus ]; The router also has a local database that contains the user lab with password lab123. What would happen if both the RADIUS and the TACACS servers are not accessible?()A The user lab will not be able to login.B The user lab will be authenticated against the local database and will be able to login.C The user lab will receive an error message indicating the router is unable to authenticate due to the authentication servers not responding.D The user will be able to login only if tries to login as the root user.

考题 单选题In computer security, AAA stands for authentication, authorization and accounting. Which optionabout the AAA authentication enable default group radius enable command is correct?()A If the radius server returns an error, the enable password will be usedB If the radius server returns a ’failed’ message, the enable password will be usedC The command login authentication group will associate the AM authentication to a specifiedinterfaceD If the group database is unavailable, the radius server will be used

考题 单选题The authentication order configuration on your M120 includes the settings tacplus and radius (in that order), but does not include the password parameter. You attempt to log in to the device, but the network containing the authentication servers is currently down. Which statement is true about your login attempt?()A The login attempt is rejected.B The login attempt is automatically accepted after the authentication servers’ timeout value is reached, since there are no other authentication methods available.C The M120 automatically tries authenticating locally on the device after the authentication servers’ timeout value is reached.D The M120 automatically tries authenticating locally on the device before using external authentication.

考题 单选题Which configuration command allows the router to utilize a RADIUS server to authenticate incoming Telnet users?()A aaa new-modelB aaa telnet loginC telnet authentication loginD authentication telnet login

考题 单选题What is the objective of the aaa authentication login console-in local command?()A It specifies the login authentication method list named console-in using the local user database on the routerB It specifies the login authorization method list named console-in using the local RADIUS username-password data baseC It specifies the login authentication list named console-in using the local username- password data base on the routerD It specifies the login authorization method list named console-in using the local username- password data base on the router

考题 单选题When using RADIUS as an external authentication method for 802.1X authentication for the Junos Pulse Access Control Service, what must you do to ensure that the RADIUS authentication works properly?()A Configure IP helper to forward the authentication requests from the clients to the external RADIUS serverB Configure the supplicant as anexternal authentication serverC Configure RADIUS proxy on the realmD Specify the correct RADIUS port 389 on the Junos Pulse Access Control Service

考题 单选题A router has been configured with the authentication order settings shown below: [edit] user@host# show system authentication-order authentication-order [radius tacplus password]; The router also has a local database that contains the user lab with password lab123. What would happen if both the RADIUS and the TACACS servers respond with a reject for user lab?()A The user lab will not be able to login.B The user lab will be authenticated against the local database and will be able to login.C The user will be able to login only if tries to login as the root user.D The user lab will receive an error message indicating the username and password provided could not be found on the radius and tacacs servers.