system permission
view-configuration permission
network permission
super-user permission
单选题Which one of the following is a counterexample to the statement “If two angles are supplementary, then they are right angles?”A If two angles are complementary, then they are not right angles.B If two angles are fight angles, then they are supplementary.C If two angles are not supplementary, then they are not right angles.D If two angles are supplementary, then one could measure 100° and one could measure 80°.E If two angles are not fight angles, then they are not supplementary.
点击查看答案
单选题Which of the following is the BEST way to ensure that all users receive a mapping to multiple shared drives?()AConfigure individual user accountsBLogon scriptsCLocal policyDSet NTFS permissions
多选题Which two are benefits of using remote AAA services for Cisco Nexus products? ()AThey make it easier to manage user logins and passwords across devices.BThey enable automated configuration backup for devices.CThey centrally manage user attributes and permissions.DLocal console access is never included in AAA and can be used for access when the AAA servers are down.
多选题Which two login-class permissions could permit a user to view the system hierarchy of the active configuration?()Asystem permissionBview-configuration permissionCnetwork permissionDsuper-user permission
多选题Which two external authentication methods are supported by the Junos OS for user authentication?()ARADIUSBKERBEROSCLDAPDTACACS+
单选题A user cannot access files on /deps/it directory, the administrator verifies permissions are set rw-------for the directory. Which of the following actions need to be performed to only grant read access to the user on the IT directory?()ASet folder permissions to 760.BSet folder permissions to 770.CSet folder permissions to modify.DSet folder permissions to full control.
多选题Which two statements about login classes correctly define their usage within the JUNOS software?()AA different login class must be configured for each user.BIndividual commands can be explicitly allowed or denied.CA user must be assigned to one of the default login classes.DEach login class is associated with one or more permissions flags.