试题详情
- 单项选择题You are receiving reports of possible unauthorized access to resources protected by a firewall enforcer running the Junos OS. You want to verity which users are currently accessing resources through the enforcer.Which command should you use to verify user access on the enforcer?()
A、show services unified-access-control authentication-table
B、show auth table
C、show services unified-access-control policies
D、show services unified-access-control captive-portal
- A
关注下方微信公众号,在线模考后查看
热门试题
- Which operatio
- Which three statemen
- What are
- A user wants to esta
- Which statement is c
- Which two patented o
- Assume the&ens
- ARIPv1Responsemessag
- A Bridged 1483 netwo
- Given the regular ex
- You are not able to
- Which two protocols
- What is the primary
- What are two charact
- What are three chara
- Which statement is t
- You are experiencing
- Which two configurat
- Which two fields are
- Which configuration