试题详情
单项选择题You are receiving reports of possible unauthorized access to resources protected by a firewall enforcer running the Junos OS. You want to verity which users are currently accessing resources through the enforcer.Which command should you use to verify user access on the enforcer?()

A、show services unified-access-control authentication-table

B、show auth table

C、show services unified-access-control policies

D、show services unified-access-control captive-portal

  • A
  • 关注下方微信公众号,在线模考后查看

热门试题