网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

Which two statements about login classes correctly define their usage within the JUNOS software?()

  • A、A different login class must be configured for each user.
  • B、Individual commands can be explicitly allowed or denied.
  • C、A user must be assigned to one of the default login classes.
  • D、Each login class is associated with one or more permissions flags.

参考答案

更多 “Which two statements about login classes correctly define their usage within the JUNOS software?()A、A different login class must be configured for each user.B、Individual commands can be explicitly allowed or denied.C、A user must be assigned to one of the default login classes.D、Each login class is associated with one or more permissions flags.” 相关考题
考题 Which of the following statements about ORACLE is (are) correct?Ⅰ.ORACLE follows SQL standardⅡ.ORACLE database defines two logical types: table and viewA.ⅠonlyB.Ⅱ onlyC.Ⅰ and ⅡD.none of the above

考题 Which two statements are true about pool-based source NAT? ()(Choose two.) A. PAT is not supported.B. PAT is enabled by default.C. It supports the address-persistent configuration option.D. It supports the junos-global configuration option.

考题 Which two statements are true about AH?() (Choose two.) A. AH provides data integrity.B. AH is identified by IP protocol 50.C. AH is identified by IP protocol 51.D. AH cannot work in conjunction with ESP

考题 Which two statements are true about precedence values in policy?() (Choose two.) A. 1 is the default precedence.B. A lower number is preferred.C. A higher number is preferred.D. 100 is the default precedence.

考题 Which two statements are true of login classes?() A. Users can be members of multiple login classes.B. Login classes define authorization parameters for a user.C. There are five system-defined login classes.D. Login class permission flags can be overridden for certain commands.

考题 Which two statements are correct about the aaa authentication login default grouptacacs+ localglobal configuration command? ()A、 this login authenticationmethod list is automaticallyapplied to all lines except those that have a named method list explicitly definedB、 If the user fails the TACACS+ authentication then the local database on the router will be used to authenticatethe userC、 if the tacacs+ server fails to respond then the local database on the router will be used to authenticate the user D、 "login" is the name of the method list being configuredE、 if the tacacs+ server is unavailable, authentication will succeed automaticallyby default

考题 Which two statements are true about L2TP tunnels?() (Choose two.)A、Traffic is clear textB、Traffic is encryptedC、They are initiated by the LNSD、They are initiated by the LAC

考题 Which two statements are true of login classes?()A、Users can be members of multiple login classes.B、Login classes define authorization parameters for a user.C、There are five system-defined login classes.D、Login class permission flags can be overridden for certain commands.

考题 Which two statements are true about traffic shaping?()A、Out-of-profile packets are queued.B、It causes TCP retransmits.C、Marking/remarking is not supported.D、It does not respond to BECN and ForeSight Messages.E、It uses a single/two-bucket mechanism for metering.

考题 Which two statements about the Cisco AutoSecure feature are true?()A、All passwords entered during the AutoSecure configuration must be a minimum of 8 characters in length.B、Cisco123 would be a valid password for both the enable password and the enable secret commands.C、The auto secure command can be used to secure the router login as well as the NTP and SSH protocols.D、For an interactive full session of AutoSecure, the auto secure login command should be used.E、If the SSH server was configured, the 1024 bit RSA keys are generated after the auto secure commandis enabled.

考题 Which two statements are true about pool-based source NAT? ()(Choose two.)A、PAT is not supported.B、PAT is enabled by default.C、It supports the address-persistent configuration option.D、It supports the junos-global configuration option.

考题 Which two statements are true about precedence values in policy?() (Choose two.)A、1 is the default precedence.B、A lower number is preferred.C、A higher number is preferred.D、100 is the default precedence.

考题 Which three statements are true about the privileged connection options available in Oracle9i?()A、The CONNECT INTERNAL is disallowed. B、The Server Manager tool is no longer supplied. C、The listener must be running to make a connection. D、The use of remote password login file (orapwsid) is unchanged.

考题 Which two statements are true about standard database auditing()A、DDL statements can be audited.B、Statements that refer to stand-alone procedure can be audited.C、Operations by the users logged on as SYSDBA cannot be audited.D、Only one audit record is ever created for a session per audited statement even though it is executedmore than once.

考题 Which two statements are true about record groups?()A、They are stored in the database. B、They are stored in local Forms memory. C、The type is specified explicitly at design time. D、The type is implied by when and how it is created.

考题 Which two statements about creating constraints are true?()A、Constraint names must start with SYS_CB、All constraints must be defines at the column levelC、Constraints can be created after the table is createdD、Constraints can be created at the same time the table is createdE、Information about constraints is found in the VIEW_CONSTRAINTS dictionary view

考题 多选题Which two statements are true about L2TP tunnels?() (Choose two.)ATraffic is clear textBTraffic is encryptedCThey are initiated by the LNSDThey are initiated by the LAC

考题 多选题Which three statements are true about the privileged connection options available in Oracle9i?()AThe CONNECT INTERNAL is disallowed.BThe Server Manager tool is no longer supplied.CThe listener must be running to make a connection.DThe use of remote password login file (orapwsid) is unchanged.

考题 多选题By default, which two statements are true about export routing polices?()AExport polices can evaluate only active routesBExport polices can evaluate all routesCExport polices can be applied to the forwarding tableDExport polices can be applied to interfaces

考题 多选题Which two statements are true about AH?() (Choose two.)AAH provides data integrity.BAH is identified by IP protocol 50.CAH is identified by IP protocol 51.DAH cannot work in conjunction with ESP

考题 多选题Which two statements about creating constraints are true?()AConstraint names must start with SYS_CBAll constraints must be defines at the column levelCConstraints can be created after the table is createdDConstraints can be created at the same time the table is createdEInformation about constraints is found in the VIEW_CONSTRAINTS dictionary view

考题 多选题Which two statements about SCSI are true? ()AThe bus is limited to 32 devicesBIt is a full duplex serial standardCIt is a half-duplex serial standardDIt allows up to 320 MB/s of shared channel bandwidth

考题 多选题Which two statements about the Cisco AutoSecure feature are true?()AAll passwords entered during the AutoSecure configuration must be a minimum of 8 characters in length.BCisco123 would be a valid password for both the enable password and the enable secret commands.CThe auto secure command can be used to secure the router login as well as the NTP and SSH protocols.DFor an interactive full session of AutoSecure, the auto secure login command should be used.EIf the SSH server was configured, the 1024 bit RSA keys are generated after the auto secure commandis enabled.

考题 多选题Which two statements are true of login classes?()AUsers can be members of multiple login classes.BLogin classes define authorization parameters for a user.CThere are five system-defined login classes.DLogin class permission flags can be overridden for certain commands.

考题 多选题Which two statements are correct about the aaa authentication login default grouptacacs+ localglobal configuration command? ()Athis login authenticationmethod list is automaticallyapplied to all lines except those that have a named method list explicitly definedBIf the user fails the TACACS+ authentication then the local database on the router will be used to authenticatethe userCif the tacacs+ server fails to respond then the local database on the router will be used to authenticate the userDlogin is the name of the method list being configuredEif the tacacs+ server is unavailable, authentication will succeed automaticallyby default

考题 多选题Which two statements are true about traffic shaping?()AOut-of-profile packets are queued.BIt causes TCP retransmits.CMarking/remarking is not supported.DIt does not respond to BECN and ForeSight Messages.EIt uses a single/two-bucket mechanism for metering.

考题 多选题Which two statements about login classes correctly define their usage within the JUNOS software?()AA different login class must be configured for each user.BIndividual commands can be explicitly allowed or denied.CA user must be assigned to one of the default login classes.DEach login class is associated with one or more permissions flags.