网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
Authentication for user data traffic is important, but so is authentication for IP voice traffic. The Cisco 830 802.1 feature provides an easier method for allowing IP voice traffic through the VPN, because it().
- A、requires access lists to identify the voice traffic
- B、can allow traffic from a device without 802.1X authentication, by MAC address
- C、can allow traffic from Cisco IP phones by listening to their CDP advertisements
- D、allows all packets marked with a ToS of 5 to bypass authentication
- E、allows all IP voice packets to bypass authentication via stateful inspection
参考答案
更多 “Authentication for user data traffic is important, but so is authentication for IP voice traffic. The Cisco 830 802.1 feature provides an easier method for allowing IP voice traffic through the VPN, because it().A、requires access lists to identify the voice traffic B、can allow traffic from a device without 802.1X authentication, by MAC addressC、can allow traffic from Cisco IP phones by listening to their CDP advertisementsD、allows all packets marked with a ToS of 5 to bypass authenticationE、allows all IP voice packets to bypass authentication via stateful inspection” 相关考题
考题
An authentication realm consists of which three authentication resources?()
A. Authentication serverB. Session optionsC. Authentication policyD. End-point security policyE. Role-mapping rules
考题
What are two steps to configure user authentication for a Junos Pulse Access Control Service?()
A. Configure an authentication policy as part of the user role definitions.B. Configure a Sign-in Policy.C. Configure authentication agents as part of the user role definitionsD. Configure an authentication policy as part of the authentication realm definition.
考题
Which three authentication resources are grouped within an authentication realm?()
A. Authentication enforcerB. Directory serverC. Captive authenticationD. Authentication policyE. Role-mapping rules
考题
Which profile configurations allows either PAP or CHAP to be used for authentication?()
A.ppp authentication chap papB.pppoe authentication chap papC.ppp authentication chap ppp authentication papD.pppoe authentication chap pppoe authentication pap
考题
which command is used to enable CHAP authentication whit PAP as the fallback method on a serial interface?()A、(config-if)#authentication ppp chap fallback pppB、(config-if)#authentication ppp chap papC、(config-if)#ppp authentication chap papD、(config-if)#ppp authentication chap fallback ppp
考题
Which two statements about the open and shared key wireless-authentication methods are true? ()A、 Shared key authentication is considered more secure than open authentication.B、 Shared key authentication is considered less secure than open authentication.C、 If the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer data.D、 If the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer data.E、 If the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data.
考题
Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.The Company.com employees use Microsoft Office Outlook 2007 to connect to their mailboxes.RPC over HTTP and Auto discover are configured on Microsoft Office Outlook 2007. A new Company.com security policy requires that the employees connected to the domain does not need authentication when using Outlook Anywhere.However, those not connected t the domain needs to be authentication when using Outlook Anywhere.The employees need to comply with the new Company.com security policy. What should you do?()A、You should consider using Basic authentication on Outlook Anywhere and set up only Basic authentication on the RPC virtual directory.B、You should consider using NTLM authentication on Outlook Anywhere and set up Basic authentication and NTLM authentication on the RPC virtual directory.C、You should consider using NTLM authentication on Outlook Anywhere and set up only Basic authentication on the RPC virtual directory.D、You should consider using Basic authentication on Outlook Anywhere and set up Basic authentication and NTLM authentication on the RPC virtual directory.
考题
What are the three OSPF authentication methods supported on the ERX Edge Router?()A、 null passwordB、 simple passwordC、 message digest 5D、 Password Authentication ProtocolE、 Challenge Handshake Authentication Protocol
考题
An authentication realm consists of which three authentication resources?()A、Authentication serverB、Session optionsC、Authentication policyD、End-point security policyE、Role-mapping rules
考题
which command is used to enable CHAP authentication whit PAP as the fallback method on a serialinterface?()A、(config-if)#authentication ppp chap fallback pppB、(config-if)#authentication ppp chap papC、(config-if)#ppp authentication chap papD、(config-if)#ppp authentication chap fallback ppp
考题
How is authentication handled with OSPFv3?()A、OSPFv3 for IPv6 authen tication is supported by IPv6 IPsec.B、OSPFv3 for IPv6 authentication is supported by MD5 authentication.C、OSPFv3 for IPv6 authentication is supported by IPv4 IPsec.D、OSPFv3 for IPv6 authentication is supported by SHA - 1 authentication.
考题
Which three authentication resources are grouped within an authentication realm?()A、Authentication enforcerB、Directory serverC、Captive authenticationD、Authentication policyE、Role-mapping rules
考题
You need to recommend a strategy to ensure that the administration of AD LDS is encrypted. What should you include in the recommendation?()A、a server authentication certificateB、client authentication certificatesC、Digest authenticationD、Windows Integrated authentication
考题
You need to recommend a security strategy for WebApp2 that meets the company’s applicaton requirements.What should you include in the recommendation?()A、Basic authentication and connection security rulesB、Basic authentication and SSLC、Digest authentication and connection security rulesD、Digest authentication and SSL
考题
单选题You need to implement an authentication method on SQL4. The TravelOnline database will be accessed through a Web services application. You need to make the authentication method as secure as possible.What should you do?()A
Create an HTTP endpoint with NTLM authentication, and create a service principal name (SPN).B
Create an HTTP endpoint with digest authentication, and create a service principal name (SPN).C
Create an HTTP endpoint with integrated authentication, and create a service principal name (SPN).D
Create an HTTP endpoint with Kerberos authentication.
考题
单选题How is authentication handled with OSPFv3?()A
OSPFv3 for IPv6 authen tication is supported by IPv6 IPsec.B
OSPFv3 for IPv6 authentication is supported by MD5 authentication.C
OSPFv3 for IPv6 authentication is supported by IPv4 IPsec.D
OSPFv3 for IPv6 authentication is supported by SHA - 1 authentication.
考题
单选题Which statement accurately describes firewall user authentication?()A
Firewall user authentication provides another layer of security in a network.B
Firewall user authentication provides a means for accessing a JUNOS Software-based security device.C
Firewall user authentication enables session-based forwarding.D
Firewall user authentication is used as a last resort security method in a network.
考题
单选题You need to recommend a strategy to ensure that the administration of AD LDS is encrypted. What should you include in the recommendation?()A
a server authentication certificateB
client authentication certificatesC
Digest authenticationD
Windows Integrated authentication
考题
多选题Which two statements about authentication settings for DCNM-LAN are true? ()AIf none of the authentication servers that are configured for the current authentication mode responds to an authentication request, the DCNM-LAN server falls back to localauthentication.BDCNM-LAN only supports TACACS+.CEach DCNM-LAN server will have the same device credentials.DAdministering DCNM-LAN authentication settings requires an authentication license.EDCNM-LAN server users are local to the DCNM-LAN server.
考题
多选题Which two statements regarding external authentication servers for firewall userauthentication are true?()AUp to three external authentication server types can be used simultaneously.BOnly one external authentication server type can be used simultaneously.CIf the local password database is not configured in the authentication order, and the configured authentication server is unreachable, authentication is not performed.DIf the local password database is not configured in the authentication order, and the configured authentication server rejects the authentication request, authentication is not performed
考题
单选题Which IS-IS authentication method is supported on the ERX Edge Router?()A
simple passwordB
HMAC message digest 5C
Password Authentication ProtocolD
Challenge Handshake Authentication Protocol
考题
多选题Which two statements regarding external authentication servers for firewall user authentication are true?() (Choose two.)AUp to three external authentication server types can be used simultaneously.BOnly one external authentication server type can be used simultaneously.CIf the local password database is not configured in the authentication order, and the configured authentication server bypassed.DIf the local password database is not configured in the authentication order, and the configured authentication server authentication is rejected.
考题
单选题Which profile configurations allows either PAP or CHAP to be used for authentication?()A
ppp authentication chap papB
pppoe authentication chap papC
ppp authentication chap ppp authentication papD
pppoe authentication chap pppoe authentication pap
考题
单选题When using RADIUS as an external authentication method for 802.1X authentication for the Junos Pulse Access Control Service, what must you do to ensure that the RADIUS authentication works properly?()A
Configure IP helper to forward the authentication requests from the clients to the external RADIUS serverB
Configure the supplicant as anexternal authentication serverC
Configure RADIUS proxy on the realmD
Specify the correct RADIUS port 389 on the Junos Pulse Access Control Service
考题
单选题Which one of the following commands can be used to enable AAA authentication to determine if a user canaccess the privilege command level?()A
aaa authentication enable method defaultB
aaa authentication enable defaultC
aaa authentication enable levelD
aaa authentication enable default local
考题
多选题What are the three OSPF authentication methods supported on the ERX Edge Router?()Anull passwordBsimple passwordCmessage digest 5DPassword Authentication ProtocolEChallenge Handshake Authentication Protocol
考题
多选题Which two statements about the open and shared key wireless-authentication methods are true? ()AShared key authentication is considered more secure than open authentication.BShared key authentication is considered less secure than open authentication.CIf the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer data.DIf the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer data.EIf the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data.
考题
单选题which command is used to enable CHAP authentication whit PAP as the fallback method on a serialinterface?()A
(config-if)#authentication ppp chap fallback pppB
(config-if)#authentication ppp chap papC
(config-if)#ppp authentication chap papD
(config-if)#ppp authentication chap fallback ppp
热门标签
最新试卷