An administrator needs to authenticate users to the network, authorize network activities, and account for activities done. Which of the following are services that will BEST meet these goals?()(Select TWO).A、TACACS+B、RADIUSC、KerberosD、802.1XE、RRAS

题目

An administrator needs to authenticate users to the network, authorize network activities, and account for activities done. Which of the following are services that will BEST meet these goals?()(Select TWO).

  • A、TACACS+
  • B、RADIUS
  • C、Kerberos
  • D、802.1X
  • E、RRAS

相似考题
更多“An administrator needs to authenticate users to the network, authorize network activities, and account for activities done. Which of the following are services that will BEST meet these goals?()(Select TWO).A、TACACS+B、RADIUSC、KerberosD、802.1XE、RRAS”相关问题
  • 第1题:

    Which of the following network topologies BEST describes a VPN? ()(Select TWO)

    A. Point to Point

    B. Point to Multipoint

    C. VLAN

    D. Ring

    E. Bus


    参考答案:A, B

  • 第2题:

    Which two actions, when taken in combination, will result in an effective network security solution?()

    • A、 develop a policy for securing the network
    • B、 monitor and test network activities for vulnerabilities
    • C、 implement reflexive access lists
    • D、 implement dynamic access lists
    • E、 select and implement a single comprehensive virus protection program

    正确答案:A,B

  • 第3题:

    An administrator has a single 14U rack.  The administrator needs to install fifteen servers; rack-mounted redundant uninterruptible power supplies (UPSs), a network switch, and a KVM.  Which of the following server types would be BEST suited for this scenario?()

    • A、Blade servers
    • B、Rackmount servers
    • C、Tower servers
    • D、Web servers

    正确答案:A

  • 第4题:

    An administrator replaced a router with a switch. End users are able to access network shares butare not able to access the Internet. Which of the following is the BEST explanation why the usersare unable to access the Internet?()

    • A、Router routes traffic between different networks and a switch does not
    • B、The new switch is faulty and needs to be replaced and configured correctly
    • C、The firewall needs to be setup to allow traffic to reach the Internet
    • D、The switch needs to be setup to forward data traffic to the Internet

    正确答案:A

  • 第5题:

    For added security, a network administrator has decided to lock down the wireless network. Which of the following are ways to accomplish this? ()(Select TWO).

    • A、Disable all 802.11 traffic
    • B、Disable the SSID from broadcasting
    • C、Disable WPA
    • D、Enable Bluetooth only communication
    • E、Change the default admin password
    • F、Disable WEP

    正确答案:B,E

  • 第6题:

    A network technician is installing a small wireless network. A requirement is that individual users must authenticate using usernames and passwords. Which of the following technologies would support users authenticating with encrypted usernames and passwords?()

    • A、WPA TLS
    • B、WPA PEAP
    • C、64-bit WEP
    • D、128-bit WEP

    正确答案:B

  • 第7题:

    An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?()

    • A、SSH
    • B、WEP
    • C、VPN
    • D、WPA

    正确答案:D

  • 第8题:

    A technician needs to troubleshoot connectivity between two devices located on the same network. Which of the following BEST describes the type of protocol being used?()

    • A、IGP
    • B、EIGRP
    • C、EGP
    • D、BGP

    正确答案:A

  • 第9题:

    Your corporate security policy requires that a user performing attacks must have limited network access and activities until an administrator can investigate.In the admin GUI, which sensor event policy action must you configure in "Configuration" > "Sensors" > "Sensor Event Policies" > [rule name] to accomplish this?()

    • A、Ignore
    • B、Replace users role
    • C、Terminate user session
    • D、Disable user account

    正确答案:B

  • 第10题:

    多选题
    An administrator needs to authenticate users to the network, authorize network activities, and account for activities done. Which of the following are services that will BEST meet these goals?()(Select TWO).
    A

    TACACS+

    B

    RADIUS

    C

    Kerberos

    D

    802.1X

    E

    RRAS


    正确答案: E,B
    解析: 暂无解析

  • 第11题:

    多选题
    Which of the following network topologies BEST describes a VPN? ()(Select TWO)
    A

    Point to Point

    B

    Point to Multipoint

    C

    VLAN

    D

    Ring

    E

    Bus


    正确答案: C,D
    解析: 暂无解析

  • 第12题:

    多选题
    A network consultant is asked to set up a wireless network in a home. The home user wants the wireless network to be available in every comer of the house. Which of the following additional information will the technician need to determine the equipment for the installation? ()(Select TWO)
    A

    The length of the house

    B

    How many rooms are in the house

    C

    How many users will be using the wireless network

    D

    The building material of the house

    E

    The cost of the house


    正确答案: A,E
    解析: 暂无解析

  • 第13题:

    A network technician is installing a small wireless network. A requirement is that individual users must authenticate using usernames and passwords.Which of the following technologies would support users authenticating with encrypted usernames and passwords?()

    A.WPA TLS

    B.WPA PEAP

    C.64-bit WEP

    D.128-bit WEP


    参考答案:B

  • 第14题:

    An administrator wants to limit access of a wireless network without requiring authorized users to enter a password or network key. Which of the following methods would MOST likely be implemented on the wireless network?()

    • A、Disable SSID
    • B、WPA
    • C、MAC filtering
    • D、RAS

    正确答案:A

  • 第15题:

    A user reports they cannot access the network share folder, the users workstation is configured to use automatic IP. When the administrator checks the IP address the response returns as 169.254.0.5. Which of the following should the administrator verify?()

    • A、 That there are no DHCP relay servers
    • B、 That the user account on Active Directory is not locked
    • C、 That the network card driver is not installed incorrectly
    • D、 The network connection is functioning

    正确答案:D

  • 第16题:

    Which of the following network topologies BEST describes a VPN? ()(Select TWO)

    • A、Point to Point
    • B、Point to Multipoint
    • C、VLAN
    • D、Ring
    • E、Bus

    正确答案:A,B

  • 第17题:

    A network consultant is asked to set up a wireless network in a home. The home user wants the wireless network to be available in every comer of the house. Which of the following additional information will the technician need to determine the equipment for the installation? ()(Select TWO)

    • A、The length of the house
    • B、How many rooms are in the house
    • C、How many users will be using the wireless network
    • D、The building material of the house
    • E、The cost of the house

    正确答案:A,D

  • 第18题:

    A user in the accounting department reports that their office is able to connect to the network, but they are unable to connect to the Internet. Which of the following documentation would be the MOST useful to the administrator in diagnosing this issue?() (Select TWO).

    • A、Physical network diagram
    • B、Job log
    • C、Acceptable use policy
    • D、Baseline documentation
    • E、Wiring schematic

    正确答案:A,E

  • 第19题:

    A technician temporarily needs an additional network connection in their office to test a newworkstation. Which of the following is the BEST solution to add a temporary network connection?()

    • A、Install a small network switch
    • B、Use port mirroring on the switch
    • C、Split the pairs of the existing jack
    • D、Install a CSU/DSU

    正确答案:A

  • 第20题:

    Which of the following tools would an administrator BEST use to trace a network cable?()

    • A、Toner
    • B、Cable tester
    • C、Butt set
    • D、Multimeter

    正确答案:A

  • 第21题:

    多选题
    For added security, a network administrator has decided to lock down the wireless network. Which of the following are ways to accomplish this? ()(Select TWO).
    A

    Disable all 802.11 traffic

    B

    Disable the SSID from broadcasting

    C

    Disable WPA

    D

    Enable Bluetooth only communication

    E

    Change the default admin password

    F

    Disable WEP


    正确答案: B,E
    解析: 暂无解析

  • 第22题:

    单选题
    A user reports they cannot access the network share folder, the users workstation is configured to use automatic IP. When the administrator checks the IP address the response returns as 169.254.0.5. Which of the following should the administrator verify?()
    A

     That there are no DHCP relay servers

    B

     That the user account on Active Directory is not locked

    C

     That the network card driver is not installed incorrectly

    D

     The network connection is functioning


    正确答案: B
    解析: 暂无解析

  • 第23题:

    多选题
    An administrator needs to authenticate users to the network, authorize network activities, and account for activities done. Which of the following are services that will BEST meet these goals?()(Select TWO).
    A

    TACACS+

    B

    RADIUS

    C

    Kerberos

    D

    802.1X

    E

    RRAS


    正确答案: E,B
    解析: 暂无解析