网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

When a client using the SERVER_ENCRYPT authentication type connects to a server using the SERVER authentication type, what happens?()

  • A、An error will occur.
  • B、Data passed between the client and the server is encrypted.
  • C、User IDs and passwords are passed to the server unencrypted.
  • D、User IDs and passwords are encrypted before they are passed to the server.

参考答案

更多 “When a client using the SERVER_ENCRYPT authentication type connects to a server using the SERVER authentication type, what happens?()A、An error will occur.B、Data passed between the client and the server is encrypted.C、User IDs and passwords are passed to the server unencrypted.D、User IDs and passwords are encrypted before they are passed to the server.” 相关考题
考题 A "trusted" client needs to communicate with a server that has been configured to use CLIENT authentication. Which of the following will be used to verify passwords?() A.User ID/password fileB.Communications layerC.Client applicationsD.Operating system

考题 When a client using the SERVER_ENCRYPT authentication type connects to a server using the SERVER authentication type, what happens?() A.An error will occur.B.Data passed between the client and the server is encrypted.C.User IDs and passwords are passed to the server unencrypted.D.User IDs and passwords are encrypted before they are passed to the server.

考题 Which three statements about the Cisco Easy VPN feature are true?()A、If the VPN server is configured for Xauth, the VPN client waits for a username / password challenge.B、The Cisco Easy VPN feature only supports transform sets that provide authentication and encryption.C、The VPN client initiates aggressive mode (AM) if a pre-shared key is used for authentication during the IKE phase 1 process.D、The VPN client verifies a server username/password challenge by using a AAA authentication server that supports TACACS+ or RADIUS.E、The VPN server can only be enabled on Cisco PIX Firewalls and Cisco VPN 3000 series concentrators.F、When connecting with a VPN client,the VPN server must be configured for ISAKMP group 1,2 or 5.

考题 Using FTP passive mode, after the client opens thecommand channel (port 21) to the FTP server and requests passive mode, what will be the next step? ()A、 The FTP server sends back an acknowledgment (ACK) to the clientB、 The FTP server allocates a port touse for the data channel and transmit that port number to the clientC、 The FTP server opens the data channel to the client using the port number indicated by the clientD、 The FTP client opens the data channel to the FTP server on Port 20E、 The FTP client opens the datachannel to the FTP server on Port 21

考题 Clients using cisco-leap and eap-fast authentication are having no problems logging on to The wireless network, but clients using peap are failing to log on. Which situation would result in this type of problem?()A、posture validation has not been enabled.B、the aaa server is set to accept both ms-chap v2 and gtc for peap authentication.C、clients and server are not using certificates.D、clients have been set to validate the server identity.

考题 pany has implemented 802.1X authentication as a security enhancement.  Which statement is  true about 802.1x port-based authentication?()A、 TACACS+ is the only supported authentication server type.B、 If a host initiates the authentication process and does not receive a response, it assumes it is  not authorized.C、 RADIUS is the only supported authentication server type.D、 Before transmitting data, an 802.1x host must determine the authorization state of the switch.E、 Hosts are required to havea 802.1x authentication client or utilize PPPoE.F、 None of the other alternatives apply.

考题 You review the Failed Attempts logs on an AAA server and find: "unknown network access servererror."  Which failure could produce this error?()A、failure of the wireless client and AAA server handshakeB、supplicant authentication failureC、AAA client and AAA server handshakeD、Wrong password used by the supplicant

考题 Using an LDAP authentication server, what do you configure to validate certificate attributes?()A、Use the "is exactly" or "contains" operators.B、Create a user filter matching thedn of the certificate.C、Verify that the certificate is issued by a publicly trusted cs.D、Match the certificate type and value with an attribute from theldap server.

考题 You design a Business Intelligence (BI) solution by using SQL Server 2008.  The solution includes a SQL Server 2008 Reporting Services (SSRS) infrastructure in a scale-out deployment. All reports use a SQL Server 2008 relational database as the data source. You implement row-level security. You need to ensure that all reports display only the expected data based on the user who is viewing the report. What should you do?()A、 Store the credential of a user in the data source.B、 Configure the infrastructure to support Kerberos authentication.C、 Configure the infrastructure to support anonymous authentication by using a custom authentication extension.D、 Ensure that all report queries add a filter that uses the User.UserID value as a hidden parameter.

考题 A new employee needs access to a SQL Server 2005 database that is located on a server named SQL1. You create a login named ajones by using the following Transact-SQL statement. CREATE LOGIN ajones WITH PASSWORD = ’SQLServer$1’ The new employee reports that when he logs in, he receives the following error message: "Login failed. The user is not associated with a trusted SQL Server connection." You need to resolve the error and allow the new employee to gain access to SQL1. What should you do?()A、Change the SQL Server security mode from Windows Authentication mode to SQL Server and Windows authentication mode.B、Change the SQL Server security mode from SQL Server and Windows Authentication mode to Windows authentication mode.C、Ensure that the login name is created with square brackets ([]).D、Give the login access to a specific database by using the CREATE USER Transact-SQL statement.

考题 You review the failed attempts logs on an aaa server and find: "unknown network access server error."  Which failure could produce this error?()A、aaa client and aaa server handshake failureB、supplicant authentication failureC、wrong password used by the supplicantD、failure of the wireless client and aaa server handshake

考题 You review the failed attempts logs on an aaa server and find: "unknown network access server error." Which failure could produce this error?()A、failure of the wireless client and aaa server handshakeB、supplicant authentication failureC、aaa client and aaa server handshakeD、wrong password used by the supplicant

考题 You develop a Windows Communication Foundation (WCF) service that uses basic authentication for client credentials. This service is currently configured to use message security. The service is hosted on a server in workgroup mode.Users report that their passwords are stolen when they use public computers.You need to ensure that messages are secure and users are authenticated.You prevent the service from being called over HTTP through Microsoft Internet Information Services (IIS) configuration. What should you do next?()A、Use the transport security mode and specify None for transport client credential type.B、Use the transportWithMessageCredential security mode and specify Basic for the transport client credential type.C、Use the message security mode and specify Basic for the transport client credential type.D、Use the transportWithMessageCredential security mode and specify None for the transport client credential type.

考题 Which of the following commands configures the cisco 3845 integrated services router to allow eap-fast authentication using wds?()A、router (config)# wlccp authentication-server infrastructure eap group_1B、router (config)# wlccp authentication-server infrastructure eap-fast group_1C、router (config)# wlccp authentication-server client eap-fast group_1D、router (config)# wlccp authentication-server client eap group_1

考题 You review the Failed Attempts logs on an AAA server and find: "unknown network access server error." Which failure could produce this error?()A、failure of the wireless client and AAA server handshakeB、supplicant authentication failureB.AAA client and AAA server handshake failureC、wrong password used by the supplicant

考题 A "trusted" client needs to communicate with a server that has been configured to use CLIENT authentication. Which of the following will be used to verify passwords?()A、User ID/password fileB、Communications layerC、Client applicationsD、Operating system

考题 Which additional configuration must be completed when setting up role restrictions using certificates? ()A、Set up a certificate authentication server.B、Configure the authentication realm to remember certificate information.C、Configure the authentication realm to use a certificate server for authentication.D、Configure a role mapping rule requiring certification information to map user to role.

考题 Which two statements regarding external authentication servers for firewall user authentication are true?() (Choose two.)A、Up to three external authentication server types can be used simultaneously.B、Only one external authentication server type can be used simultaneously.C、If the local password database is not configured in the authentication order, and the configured authentication server bypassed.D、If the local password database is not configured in the authentication order, and the configured authentication server authentication is rejected.

考题 Your company infrastructure includes a Windows Server 2008 R2 file server and 1,000 Windows 7 Enterprise client computers.   The company wants to require a secure connection between client computers and the file server. You need to create and deploy a Group Policy object (GPO) that includes a rule for Windows Firewall with Advanced Security.   What should you do?()A、Create a Tunnel rule and specify Gateway-to-client as the tunnel type.B、Create a Server-to-server rule and specify the endpoints as Any IP address and the file server IP address.C、Create an Isolation rule and specify Request authentication for inbound and outbound connections.D、Create an Authentication exemption rule and add the file server IP address to the Exempt Computers list.

考题 You need to design an authentication solution for the wireless network. Your solution must meet the security requirements. What should you do?()A、Create wireless VPNs using L2TP/IPSec between the client computers to the wireless access pointB、Configure IEEE 802.1x authentication with smart cardsC、Configure the wireless network to use Wired Equivalent Privacy (WEP)D、Install and configure an Internet Authentication Service (IAS) server

考题 Your network contains two Active Directory sites named Site1 and Site2. Only Site1 can be accessed from the Internet. You have an Exchange Server 2010 organization.  You deploy a Client Access server in Site1 and enable Windows Integrated Authentication for OutlookWeb App (OWA).  In Site2, you deploy a Mailbox server and a Client Access server.  You need to configure the Exchange organization to meet the following requirements: .Allow users to access their mailboxes from the Internet by using OWA  .Prevent authentication prompts from displaying when users connect to OWA by using domain- joinedcomputers that are connected to the internal network  What should you do?()A、Modify the Exchange virtual directory on the Client Access server in Site1.B、Modify the Exchange virtual directory on the Client Access server in Site2.C、Modify the OWA virtual directory on the Client Access server in Site1.D、Modify the OWA virtual directory on the Client Access server in Site2.

考题 Your network contains two Active Directory sites named Site1 and Site2. Only Site1 can be accessed from the Internet. You have an Exchange Server 2010 organization.  You deploy a Client Access server in Site1 and enable Windows Integrated Authentication for OutlookWeb App (OWA).  In Site2, you deploy a Mailbox server and a Client Access server.  You need to configure the Exchange organization to meet the following requirements: .Allow users to access their mailboxes from the Internet by using OWA  .Prevent authentication prompts from displaying when users connect to OWA by using domain- joined computers that are connected to the internal network  What should you do?()A、Modify the Exchange virtual directory on the Client Access server in Site1.B、Modify the Exchange virtual directory on the Client Access server in Site2.C、Modify the OWA virtual directory on the Client Access server in Site1.D、Modify the OWA virtual directory on the Client Access server in Site2.

考题 单选题Using FTP passive mode, after the client opens thecommand channel (port 21) to the FTP server and requests passive mode, what will be the next step? ()A  The FTP server sends back an acknowledgment (ACK) to the clientB  The FTP server allocates a port touse for the data channel and transmit that port number to the clientC  The FTP server opens the data channel to the client using the port number indicated by the clientD  The FTP client opens the data channel to the FTP server on Port 20E  The FTP client opens the datachannel to the FTP server on Port 21

考题 单选题Clients using cisco-leap and eap-fast authentication are having no problems logging on to The wireless network, but clients using peap are failing to log on. Which situation would result in this type of problem?()A posture validation has not been enabled.B the aaa server is set to accept both ms-chap v2 and gtc for peap authentication.C clients and server are not using certificates.D clients have been set to validate the server identity.

考题 多选题Which three statements about the Cisco Easy VPN feature are true?()AIf the VPN server is configured for Xauth, the VPN client waits for a username / password challenge.BThe Cisco Easy VPN feature only supports transform sets that provide authentication and encryption.CThe VPN client initiates aggressive mode (AM) if a pre-shared key is used for authentication during the IKE phase 1 process.DThe VPN client verifies a server username/password challenge by using a AAA authentication server that supports TACACS+ or RADIUS.EThe VPN server can only be enabled on Cisco PIX Firewalls and Cisco VPN 3000 series concentrators.FWhen connecting with a VPN client,the VPN server must be configured for ISAKMP group 1,2 or 5.

考题 单选题You review the Failed Attempts logs on an AAA server and find: "unknown network access server error." Which failure could produce this error?()A failure of the wireless client and AAA server handshakeB supplicant authentication failureB.AAA client and AAA server handshake failureC wrong password used by the supplicant

考题 单选题When a client using the SERVER_ENCRYPT authentication type connects to a server using the SERVER authentication type, what happens?()A An error will occur.B Data passed between the client and the server is encrypted.C User IDs and passwords are passed to the server unencrypted.D User IDs and passwords are encrypted before they are passed to the server.