What is the default session timeout for UDP sessions?()
A.30 seconds
B. 1 minute
C. 5 minutes
D. 30 minutes
A.30 seconds
B. 1 minute
C. 5 minutes
D. 30 minutes
第1题
added to the Active Directory and placed into the Domain Users group and the SW_DEV group. The Domain Users group has access to the company‘s intranet website and time card system. The SW_DEV group has access to the source code library server. You have created roles that correspond to each Active Directory group. The user calls the help desk stating that they cannot access the source code library server.Which two troubleshooting tools would you use on the Junos Pulse Access Control Service to resolve the issue?()
A. Perform a policy trace for the specific user and review the output to isolate the problem.
B. Review the Events log.
C. Review the Admin Access log to verify that the user has the correct permissions to access the SVVJDEV resource.
D. Review the User Access log to verify that the user is getting mapped to both the Domain User role and the SW_DEV role.
第2题
A. In the DH key exchange process, the session key is never passed across the network.
B. In the DH key exchange process, the public and private keys are mathematically related using the DH algorithm.
C. In the DH key exchange process, the session key is passed across the network to the peer for confirmation.
D. In the DH key exchange process, the public and private keys are not mathematically related, ensuring higher security
第3题
ilding of your campus has been configured for a different VLAN. During implementation of the Junos Pulse Access Control Service, you must configure a RADIUS return attribute policy to apply a role representing a group of authenticated users that frequently transport their laptops from building to building and floor to floor.In the admin GUI, which policy element would you enable to accommodate these users?()
A. Add Session-Timeout attribute with value equal to the session lifetime
B. Add Termination-Action attribute with value equal 1
C. VLAN
D. Open port
第4题
A. [edit security screen] user@host# show ids-option protectFromFlood { ip { loose-source-route-option; strict-source-route-option; } }
B. [edit security screen] user@host# show ids-option protectFromFlood { ip { source-route-option; } }
C. [edit security screen] user@host# show ids-option protectFromFlood { ip { record-route-option; security-option; } }
D. [edit security screen] user@host# show ids-option protectFromFlood { ip { strict-source-route-option; record-route-option; } }
第5题
A. zone objects
B. policy objects
C. attack objects
D. alert and notify objects
E. network and address objects
第6题
A. sign-in policy
B. authentication realms
C. role restrictions
D. policy realms
E. routing policy
第7题
A.0
B.1
C.4
D.8
第8题
A. It proxies the authentication information between the supplicant and the authentication server.
B. It controls physical access to the network.
C. It communicates with the authentication server only.
D. It is responsible for verifying the identity of the supplicant through the use of an internal database.
第9题
A. If the destination address of the outer IP header of the ESP packet matches the IP address of the ingress interface, it will
B. If the destination IP address in the outer IP header of ESP does not match the IP address of the ingress interface, it will
C. If the destination address of the outer IP header of the ESP packet matches the IP address of the ingress interface, based packet.
D. If the destination address of the outer IP header of the ESP packet matches the IP address of the ingress interface, based of inner header, it will decrypt the packet.
第10题
A. Select "Require and Enforce" for the Host Checker Policy in the realm authentication policy.
B. Select "Evaluate Policies" for the Host Checker policy in the realm authentication policy.
C. Configure the Host Checker policy as a role restriction for the Employee role.
D. Configure the Host Checker policy as a resource access policy for the Employee role.
为了保护您的账号安全,请在“上学吧”公众号进行验证,点击“官网服务”-“账号验证”后输入验证码“”完成验证,验证成功后方可继续查看答案!