PrepAway - Latest Free Exam Questions & Answers

What happens to the user?

Study the Rule base and Client Authentication Action properties screen

-After being authenticated by the Security Gateway, when a user starts an HTTP connection to a Web site, the user tries to FTP to another site using the command line. What happens to the user?
The:

PrepAway - Latest Free Exam Questions & Answers

A.
FTP connection is dropped by Rule 2.

B.
user is prompted from that FTP site only, and does not need to enter his username and
password for Client Authentication.

C.
user is prompted for authentication by the Security Gateway again.

D.
FTP data connection is dropped after the user is authenticated successfully.

Explanation:

3 Comments on “What happens to the user?

  1. imran says:

    “Required Sign On,” when set to “Standard,” means that once a user has
    authenticated one time, they are permitted to access all services, as long as they
    are allowed to do so according to the rule base.When set to “Specific,” users must
    authenticate again for each new service they attempt to access.
    “Sign-On Method” has the following five options:




    0



    0
  2. imran says:

    Manual Users must use either telnet to port 259 on the firewall, or use
    a Web browser to connect to port 900 on the firewall to authenticate
    before being granted access.
     Partially Automatic If user authentication is configured for the service
    the user is attempting to access and they pass this authentication, then no
    further client authentication is required. For example, if HTTP is permitted
    on a client authentication rule, the user will be able to transparently
    authenticate since FireWall-1 has a security server for HTTP.Then, if
    this setting is chosen, users will not have to manually authenticate for this
    connection. Note that this applies to all services for which FireWall-1 has
    built-in security servers (HTTP, FTP, telnet, and rlogin).
     Fully Automatic If the client has the session authentication agent
    installed, then no further client authentication is required (see session
    authentication below). For HTTP, FTP, telnet, or rlogin, the firewall will
    authenticate via user authentication, and then session authentication will
    be used to authenticate all other services.
    http://www.syngress.com
    Figure 6.19 Client Authentication Action Properties
    278 Chapter 6 • Authenticating Users
     Agent Automatic Sign On Uses session authentication agent to provide
    transparent authentication (see session authentication below).
     Single Sign-On System Used in conjunction with UserAuthority
    servers to provide enhanced application level security. Discussion of
    UserAuthority is beyond the scope of this book.




    0



    0

Leave a Reply