网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which of the following authentication protocols uses certificates to negotiate access to the network?()
A
PAP
B
CHAP
C
EAP-TLS
D
Kerberos
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which of the following authentication protocols uses certificates to negotiate access to the network?()A PAPB CHAPC EAP-TLSD Kerberos” 相关考题
考题
Kerberos is a form of user authentication that:()
A. Provides users access to network resources.B. Performs router commands after user authentication.C. Provides users with remote access only capabilities.D. Does not require an authentication server
考题
Which of the following authentication protocols uses certificates to negotiate access to the network?()
A.PAPB.CHAPC.EAP-TLSD.Kerberos
考题
The Testking network is implementing dialup services for their remote employees.Testking uses several different Layer 3 protocols on the network. Authentication ofthe users connecting to the network is required for security. Additionally, some employees will be dialing long distance and will need callback support.Which protocol is the best choice for these remote access services?()A.802.1B.FramerelayC.HDLCD.PPPE.SLIPF.PAP
考题
下面哪条命令是把PPP的验证方式设置为PAP().A、ppp papB、ppp chapC、ppp authentication-mode papD、ppp authentication-mode chap
考题
Which two primary port authentication protocols are used with VSANs?()A、SPAPB、CHAPC、DHCHAPD、ESP
考题
What is not a difference between VPN tunnel authentication and per-user authentication?()A、VPN tunnel authentication is part of the IKE specification. B、VPN tunnel authentication does not control which end user can use the IPSec SA (VPN tunnel).C、User authentication is used to control access for a specific user ID, and can be used with or without a VPN tunnel for network access authorization. D、802.1X with EAP-TLS (X.509 certificates) can be used to authenticate an IPSec tunnel.
考题
Which of the following authentication protocols uses certificates to negotiate access to the network?()A、PAPB、CHAPC、EAP-TLSD、Kerberos
考题
Client association using EAP-Cisco Wireless (LEAP) is failing, but EAP-PEAP is functioning on an autonomous access point. Which of the following needs to be enabled on the access point so EAP-Cisco Wireless (LEAP) is enabled?()A、open authentication plus MACB、open authentication plus EAPC、shared keyD、network EAP
考题
pany is implementing 802.1X in order to increase network security. In the use of 802.1X access control, which three protocols are allowed through the switch port before authentication takes place? ()A、 EAP-over-LANB、 EAP MD5C、 STPD、 protocols not filtered by an ACLE、 CDPF、 TACACS+
考题
Kerberos is a form of user authentication that:()A、Provides users access to network resources.B、Performs router commands after user authentication.C、Provides users with remote access only capabilities.D、Does not require an authentication server
考题
A technician installed a new wireless access point on an existing small office home office (SOHO) network with a selective security option enabled. All wireless computers connect to the new network except one computer that cannot connect to the wireless network. Which of the following is the cause?()A、The network uses MAC filteringB、The network uses WEPC、The network uses SSID broadcastD、The network uses WPA
考题
Which of the following is the MOST likely authentication scheme used in 802.1x?()A、CHAPB、RADIUSC、TACACS+D、Kerberos
考题
单选题A technician installed a new wireless access point on an existing small office home office (SOHO) network with a selective security option enabled. All wireless computers connect to the new network except one computer that cannot connect to the wireless network. Which of the following is the cause?()A
The network uses MAC filteringB
The network uses WEPC
The network uses SSID broadcastD
The network uses WPA
考题
单选题Which of the following protocols should be used to monitor network performance?()A
SNTPB
SMTPC
HTTPD
SNMP
考题
单选题Which of the following protocols is the LEAST secure and should be avoided on a wireless network?()A
WEPB
PEAPC
WPAD
TKIP
考题
单选题Which one of the following protocols uses both UDP and TCP ports for the transport layer operation?()A
FTPB
TFTPC
SMTPD
TelnetE
DNS
考题
单选题Kerberos is a form of user authentication that:()A
Provides users access to network resources.B
Performs router commands after user authentication.C
Provides users with remote access only capabilities.D
Does not require an authentication server
考题
单选题The Testking network is implementing dialup services for their remote employees.Testking uses several different Layer 3 protocols on the network. Authentication ofthe users connecting to the network is required for security. Additionally, some employees will be dialing long distance and will need callback support.Which protocol is the best choice for these remote access services?()A
802.1B
FramerelayC
HDLCD
PPPE
SLIPF
PAP
考题
单选题What is not a difference between VPN tunnel authentication and per-user authentication?()A
VPN tunnel authentication is part of the IKE specification. B
VPN tunnel authentication does not control which end user can use the IPSec SA (VPN tunnel).C
User authentication is used to control access for a specific user ID, and can be used with or without a VPN tunnel for network access authorization. D
802.1X with EAP-TLS (X.509 certificates) can be used to authenticate an IPSec tunnel.
考题
单选题Your network contains a single Active Directory domain. All domain controllers run Windows Server 2008 R2. There are 1,000 client computers that run Windows 7 and that are connected to managedswitches. You need to recommend a strategy for network access that meets the following requirements: èUsers are unable to bypass network access restrictions. èOnly client computers that have up-to-date service packs installed can access the network. èOnly client computers that have up-to-date anti-malware software installed can access the network. What should you recommend?()A
Implement Network Access Protection (NAP) that uses DHCP enforcement.B
Implement Network Access Protection (NAP) that uses 802.1x enforcement.C
Implement a Network Policy Server (NPS), and enable IPsec on the domain controllers.D
Implement a Network Policy Server (NPS), and enable Remote Authentication Dial-In User Service (RADIUS) authentication on the managed switches.
考题
单选题Which of the following authentication protocols uses certificates to negotiate access to the network?()A
PAPB
CHAPC
EAP-TLSD
Kerberos
考题
单选题Which of the following network protocols is used to ensure consistent time across network devices on the domain?()A
NTPB
FTPC
RTPD
IGMP
热门标签
最新试卷