What are two roles of the authenticator as described in the 802.1X standard? ()
第1题:
A. an ACE server
B. a wireless network
C. an Ethernet switch
D. Odyssey Access Client
第2题:
In an IEEE 802.1x deployment,between which two devices EAPOL messages typically are sent?()
第3题:
What are two steps to configure user authentication for a Junos Pulse Access Control Service?()
第4题:
You must configure access to the corporate network for employees using a client access method. Users require IPsec tunneling to protected resources and an 802.1X supplicant. Users will access the network using Windows platforms.Which two client access methods would support these requirements?()
第5题:
You are using ADU and are authenticated and associated to an access point. You are unable toobtain an IP address. Which of the following will cause this problem?()
第6题:
When using RADIUS as an external authentication method for 802.1X authentication for the Junos Pulse Access Control Service, what must you do to ensure that the RADIUS authentication works properly?()
第7题:
What will serve as a RADIUS Client to the Infranet Controller for 802.1x authentication? ()
第8题:
You need to design a method of communication between the IT and HR departments. Your solution must meet business requirements. What should you do?()
第9题:
guest-vlan
auth-fail-vlan
server-reject-vlan
server-fail-vlan
第10题:
It proxies the authentication information between the supplicant and the authentication server.
It controls physical access to the network.
It communicates with the authentication server only.
It is responsible for verifying the identity of the supplicant through the use of an internal database.
第11题:
VPN tunnel authentication is part of the IKE specification.
VPN tunnel authentication does not control which end user can use the IPSec SA (VPN tunnel).
User authentication is used to control access for a specific user ID, and can be used with or without a VPN tunnel for network access authorization.
802.1X with EAP-TLS (X.509 certificates) can be used to authenticate an IPSec tunnel.
第12题:
A
B
C
D
E
第13题:
What is not a difference between VPN tunnel authentication and per-user authentication?()
第14题:
Which two pieces of information are needed when declaring the web resource collection in the deployment descriptor?()
第15题:
The database instance has the following parameter setting: OS_AUTHENT_PREFIX = OPS$ OS_ROLES = FALSE REMOTE_OS_AUTHENT = FALSE REMOTE_OS_ROLES = FALSE TIMED_OS_STATISTICS = 0 You have a local operating system user SKD. You create a database user OPS$SKD, and then assignexternal authentication. The user OPS$SKD has the CREATE SESSION privilege. What would youachieve by the above process()
第16题:
Which statement regarding 802.1X is true?()
第17题:
You are the network administrator for your company. A user is complaining that they are not able to access the network with the Junos Pulse client. You run a packet capture on the network interface to monitor the 802.1X authentication process. You notice that after the EAP- request/identity packet is received, and the supplicant responds with an EAP-response/identity packet, no further communication occurs for several seconds. What are three causes for this behavior?()
第18题:
Which additional configuration must be completed when setting up role restrictions using certificates? ()
第19题:
You need to design an authentication solution for the wireless network. Your solution must meet the security requirements. What should you do?()
第20题:
an ACE server
a wireless network
an Ethernet switch
Odyssey Access Client
第21题:
the URL pattern that requires authorization
the HTTP methods that require authorization
the users allowed access to the web resource
the J2EE roles allowed access to the web resource
the authentication mechanism required by the web resource
第22题:
Between the supplicant and the authenticator
Between the authenticator and the authentication server
Between the supplicant and the authentication server
Between the RADIUS server and the authenticator
第23题:
The database user OPS$SKD will be able to administer the database.
The authentication detail for the database user OPS$SKD is recorded in the password file.
The local operating system user SKD will be able to access the database instance without specifying the username and password.
The database user OPS$SKD has to login with the password of the local operating system user SKD to access the database instance.