更多“TACACS+ authentication uses whichthree packet types? ()”相关问题
  • 第1题:

    What are the two benefits of any intelligent network that uses a systems-level approach to integrate applications and services across an infrastructure?()

    • A、 reduce complexity
    • B、 reduced costs for all types of users
    • C、 packet inspection at wire speed
    • D、 QoS to the desktop
    • E、 LAN encryption services

    正确答案:A,B

  • 第2题:

    What are three types of packet delays that occur in a network? ()

    • A、timing
    • B、queuing
    • C、differential
    • D、serialization
    • E、packetization
    • F、propagation

    正确答案:B,D,F

  • 第3题:

    Which statement about OSPF authentication is true?()

    • A、To enable OSPF authentication in a network, OSPF area 0 authentications must be enabled first
    • B、The payload of OSPF version 3 packets contains no authentication information
    • C、OSPF version 3 supports Advanced Encryption Standard
    • D、OSPF version 3 uses router ID as a key to encrypt OSPF hello packets
    • E、OSPF MD5 authentication uses TCP, and Plan Test authentication uses UDP

    正确答案:B

  • 第4题:

    Which of the following are TACACS+ characteristics?(Choose all that apply.)()

    • A、Cisco proprietary
    • B、Standards-based protocol
    • C、Provides separate services for authentication, authorization, and accounting
    • D、Encrypts only the password
    • E、Uses UDP for a transport layer
    • F、Encrypts the entire packet

    正确答案:A,C,F

  • 第5题:

    Which three statements are true about TACACS+?()

    • A、It is a Cisco proprietary protocol.
    • B、It runs on TCP port 59. .
    • C、Authentication and authorization are done at different stages.
    • D、TACACS+ encrypts the entire body of the packet, but leaves a standard TACACS+ header.
    • E、It is an industry standard protocol.
    • F、TACACS+ encrypts both the entire body of the packet and the TACACS+ header.

    正确答案:A,C,D

  • 第6题:

    Which two external authentication servers are supported for administrative access to a Junos device?()

    • A、RADIUS
    • B、LDAP
    • C、ACE
    • D、TACACS+

    正确答案:A,D

  • 第7题:

    多选题
    When implementing WLAN security, what are three benefits of using the Temporal Key Integrity Protocol (TKIP) instead of WEP? ()
    A

    TKIP uses an advanced encryption scheme based on AES

    B

    TKIP provides authentication and integrity checking using Cipher Block Chaining Message Authentication Code (CBC-MAC)

    C

    TKIP provides per-packet keyingand a rekeying mechanism

    D

    TKIP provides message integrity check

    E

    TKIP reduces WEP’s vulnerabilities byusing different hardware encryption chipset

    F

    TKIP uses a 48 bit InitializationVector


    正确答案: E,F
    解析: 暂无解析

  • 第8题:

    多选题
    You are the network administrator for your company. A user is complaining that they are not able to access the network with the Junos Pulse client. You run a packet capture on the network interface to monitor the 802.1X authentication process. You notice that after the EAP- request/identity packet is received, and the supplicant responds with an EAP-response/identity packet, no further communication occurs for several seconds. What are three causes for this behavior? ()
    A

    The authenticator is not licensed to support Junos Pulse.

    B

    The authenticator did not receive the EAP-response/identity packet.

    C

    The authentication server is not receiving the RADIUS packet containing the EAP-response/identity data.

    D

    The authenticator is sending the request over its loopback interface.

    E

    The authentication server is sending back a RADIUS response packet, but the authenticator is not forwarding the response back to the supplicant.


    正确答案: D,C
    解析: 暂无解析

  • 第9题:

    多选题
    Which three statements are true about TACACS+?()
    A

    It is a Cisco proprietary protocol.

    B

    It runs on TCP port 59. .

    C

    Authentication and authorization are done at different stages.

    D

    TACACS+ encrypts the entire body of the packet, but leaves a standard TACACS+ header.

    E

    It is an industry standard protocol.

    F

    TACACS+ encrypts both the entire body of the packet and the TACACS+ header.


    正确答案: B,E
    解析: 暂无解析

  • 第10题:

    多选题
    Which of the following are TACACS+ characteristics?(Choose all that apply.)()
    A

    Cisco proprietary

    B

    Standards-based protocol

    C

    Provides separate services for authentication, authorization, and accounting

    D

    Encrypts only the password

    E

    Uses UDP for a transport layer

    F

    Encrypts the entire packet


    正确答案: A,C,F
    解析: 暂无解析

  • 第11题:

    单选题
    Which statement about OSPF authentication is true?()
    A

    To enable OSPF authentication in a network, OSPF area 0 authentications must be enabled first

    B

    The payload of OSPF version 3 packets contains no authentication information

    C

    OSPF version 3 supports Advanced Encryption Standard

    D

    OSPF version 3 uses router ID as a key to encrypt OSPF hello packets

    E

    OSPF MD5 authentication uses TCP, and Plan Test authentication uses UDP


    正确答案: A
    解析: 暂无解析

  • 第12题:

    多选题
    TACACS+ authentication uses whichthree packet types? ()
    A

    ACCESS REQUEST

    B

    ACCESS ACCEPT

    C

    CONTINUE

    D

    CHALLENGE

    E

    REPLY

    F

    START


    正确答案: A,D
    解析: 暂无解析

  • 第13题:

    TACACS+ authentication uses whichthree packet types? ()

    • A、 ACCESS REQUEST
    • B、 ACCESS ACCEPT
    • C、 CONTINUE
    • D、 CHALLENGE
    • E、 REPLY
    • F、 START

    正确答案:C,E,F

  • 第14题:

    What are the two advantages of any intelligent network that uses a systems-level approach?()

    • A、 improveQos
    • B、 reduced costs for all types of users
    • C、 packet inspection at wire speed
    • D、 reduced complexity

    正确答案:B,D

  • 第15题:

    A users Junos Pulse client uses 802.1X to access a wired network and is failing to authenticate. You run a packet capture from the users PC and notice that immediately after the client machine sends an EAPoL-start packet, an EAP-failure packet is returned. You review the RADIUS troubleshooting logs on the MAG Series device and do not see any authentication attempts from the user. Other users on the same Ethernet switch are successfully authenticating. Which device is sending the EAP-failure packet to the workstation?()

    • A、The RADIUS server
    • B、The EAPoL server
    • C、The workstation's network adapter
    • D、The Ethernet switch

    正确答案:D

  • 第16题:

    Which two statements about using the CHAP authentication mechanism in a PPP link are true?()

    • A、CHAP uses a two-way handshake
    • B、CHAP authentication periodically occurs after link establishment
    • C、CHAP has no protection from playback attacks
    • D、CHAP authentication is performed only upon link establishment
    • E、CHAP uses a three-way handshake
    • F、CHAP authentication passwords are sent in plaintext

    正确答案:B,E

  • 第17题:

    Which two external authentication methods are supported by the Junos OS for user authentication?()

    • A、RADIUS
    • B、KERBEROS
    • C、IPsec
    • D、TACACS+

    正确答案:A,D

  • 第18题:

    多选题
    Which two statements about using the CHAP authentication mechanism in a PPP link are true?()
    A

    CHAP uses a two-way handshake

    B

    CHAP authentication periodically occurs after link establishment

    C

    CHAP has no protection from playback attacks

    D

    CHAP authentication is performed only upon link establishment

    E

    CHAP uses a three-way handshake

    F

    CHAP authentication passwords are sent in plaintext


    正确答案: B,D
    解析: 暂无解析

  • 第19题:

    多选题
    What are three types of packet delays that occur in a network? ()
    A

    timing

    B

    queuing

    C

    differential

    D

    serialization

    E

    packetization

    F

    propagation


    正确答案: F,C
    解析: 暂无解析

  • 第20题:

    单选题
    EIGRP uses five generic packet types (hello, updates, queries, replies, acknowledgements). If youwished to view the statistics for these packets, which IOS command should you use?()
    A

    debug eigrp packets

    B

    show ip eigrp traffic

    C

    show ip eigrp topology

    D

    show ip eigrp neighbors


    正确答案: C
    解析: 暂无解析

  • 第21题:

    单选题
    A users Junos Pulse client uses 802.1X to access a wired network and is failing to authenticate. You run a packet capture from the users PC and notice that immediately after the client machine sends an EAPoL-start packet, an EAP-failure packet is returned. You review the RADIUS troubleshooting logs on the MAG Series device and do not see any authentication attempts from the user. Other users on the same Ethernet switch are successfully authenticating. Which device is sending the EAP-failure packet to the workstation?()
    A

    The RADIUS server

    B

    The EAPoL server

    C

    The workstation's network adapter

    D

    The Ethernet switch


    正确答案: D
    解析: 暂无解析

  • 第22题:

    多选题
    Which two statements are correct about the aaa authentication login default grouptacacs+ localglobal configuration command? ()
    A

    this login authenticationmethod list is automaticallyapplied to all lines except those that have a named method list explicitly defined

    B

    If the user fails the TACACS+ authentication then the local database on the router will be used to authenticatethe user

    C

    if the tacacs+ server fails to respond then the local database on the router will be used to authenticate the user

    D

    login is the name of the method list being configured

    E

    if the tacacs+ server is unavailable, authentication will succeed automaticallyby default


    正确答案: A,C
    解析: 暂无解析

  • 第23题:

    单选题
    Which user authentication methods are available in JUNOS?()
    A

    MD5 and SHA

    B

    RADIUS and TACACS only

    C

    Local User Database

    D

    Local user Database, RADIUS, and TACACS+


    正确答案: A
    解析: 暂无解析

  • 第24题:

    多选题
    Which two external authentication server types are supported by JUNOS Software for firewall user authentication?()
    A

    RADIUS

    B

    TACACS+

    C

    LDAP

    D

    IIS


    正确答案: A,D
    解析: 暂无解析