Using an LDAP authentication server, what do you configure to validate certificate attributes?()
第1题:
Which two statements about the open and shared key wireless-authentication methods are true? ()
第2题:
Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.The Company.com employees use Microsoft Office Outlook 2007 to connect to their mailboxes.RPC over HTTP and Auto discover are configured on Microsoft Office Outlook 2007. A new Company.com security policy requires that the employees connected to the domain does not need authentication when using Outlook Anywhere.However, those not connected t the domain needs to be authentication when using Outlook Anywhere.The employees need to comply with the new Company.com security policy. What should you do?()
第3题:
A company is using RADIUS to authenticate login requests to its Juniper Networks routers. Usersshould still be able to authenticate using the local password database but only if the RADIUS server is unreachable. Which JUNOS software configuration accomplishes this goal?()
第4题:
Which statement about WSA user authentication is true?()
第5题:
Which two statements about the open and shared key wireless-authentication methods are true?()
第6题:
You work as a network administrator at, You have been asked to configure 802.1x port-based authentication. You notice that the client workstation is not compatible with 802.1x port-based authentication. What supported authentication server should be chosen?()
第7题:
Which activity supports the data integrity requirements of an application?()
第8题:
In your database,the LDAP_DIRECTORY_SYSAUTH initialization parameter has been set to YES and the users who need to access the database as DBAs have been granted SYSDBA enterprise role in Oracle Internet Directory (OID). SSL and the password file have been configured. A user SCOTT with the SYSDBA privilege tries to connect to the database instance from a remote machine using the command:$ SQLPLUS scott/tiger@DB01 AS SYSDBA where DB01 is the net service name. Which authentication method would be used first?()
第9题:
Using HTTPS as a protocol
Using an LDAP security realm
Using HTTP Basic authentication
Using forms-based authentication
第10题:
It specifies the login authentication method list named console-in using the local user database on the router
It specifies the login authorization method list named console-in using the local RADIUS username-password data base
It specifies the login authentication list named console-in using the local username- password data base on the router
It specifies the login authorization method list named console-in using the local username- password data base on the router
第11题:
1813
1645
1646
1812
第12题:
Shared key authentication is considered more secure than open authentication.
Shared key authentication is considered less secure than open authentication.
If the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer data.
If the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer data.
If the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data.
第13题:
When a client using the SERVER_ENCRYPT authentication type connects to a server using the SERVER authentication type, what happens?()
第14题:
What is the objective of the aaa authentication login console-in local command?()
第15题:
In a network using cisco autonomous access points running wds. What port is used for authentication by the local authentication service on an access point?()
第16题:
In a network using Cisco autonomous access points running WDS, what port is used for authentication by the local authentication service on an access point?()
第17题:
On a standalone access point, client association using EAP-Cisco Wireless (Cisco-LEAP) isfailing, but association using EAP-PEAP is functioning. What needs to be enabled on the standalone accesspoint to correct this issue?()
第18题:
An administrator is planning for a six node cluster but is concerned about the administration needed tomanage user accounts throughout the cluster. What PowerHA feature could the administrator use to reducethe administration overhead?()
第19题:
You are configuring an LDAP authentication server, and you want to configure role-mapping rules based on group membership. When you attempt to search for groups in the server catalog, no groups appear.Assuming the LDAP server is reachable and functioning properly, in the admin GUI. Which two parts of the configuration should you verify are correct?()
第20题:
Set up a certificate authentication server.
Configure the authentication realm to remember certificate information.
Configure the authentication realm to use a certificate server for authentication.
Configure a role mapping rule requiring certification information to map user to role.
第21题:
Finding user entries
Authentication required
LDAP Server Type
Determining group membership
第22题:
a shared key
network EAP
open authentication plus EAP
open authentication plus MAC
第23题:
a single WSA can have multiple LDAP realms
WSA supports LDAP but not NTLM
WSA supports NTLM but not LDAP
a single WSA can have up to two authentication realms: one for LDAP and for NTLM
第24题:
Use the is exactly or contains operators.
Create a user filter matching the dn of the certificate.
Verify that the certificate is issued by a publicly trusted cs.
Match the certificate type and value with an attribute from the ldap server.