单项选择题
Under which configuration hierarchy is an access profile configured for firewall user authentication?()
A.[edit access]
B.[edit security access]
C.[edit firewall access]
D.[edit firewall-authentication]
相关考题
-
单项选择题
Whichstatementaccuratelydescribesfirewalluserauthentication?()
A.Firewall user authentication provides another layer of security in a network.
B.Firewall user authentication provides a means for accessing a JUNOS Software-based security device.
C.Firewall user authentication enables session-based forwarding.
D.Firewall user authentication is used as a last resort security method in a network. -
多项选择题
Whichtwostatementsaretrueregardingfirewalluserauthentication?()
A.When configured for pass-through firewall user authentication, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.
B.When configured for Web firewall user authentication only, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.
C.If a JUNOS security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted to perform authentication.
D.If a JUNOS security device is configured for Web firewall user authentication, new sessions are automatically intercepted to perform authentication. -
多项选择题
Whichtwotraffictypestriggerpass-throughfirewalluserauthentication?()
A.SSH
B.Telnet
C.ICMP
D.OSPF
E.HTTP
