ACCESS REQUEST
ACCESS ACCEPT
CONTINUE
CHALLENGE
REPLY
START
第1题:
What are the two benefits of any intelligent network that uses a systems-level approach to integrate applications and services across an infrastructure?()
第2题:
What are three types of packet delays that occur in a network? ()
第3题:
Which statement about OSPF authentication is true?()
第4题:
Which of the following are TACACS+ characteristics?(Choose all that apply.)()
第5题:
Which three statements are true about TACACS+?()
第6题:
Which two external authentication servers are supported for administrative access to a Junos device?()
第7题:
TKIP uses an advanced encryption scheme based on AES
TKIP provides authentication and integrity checking using Cipher Block Chaining Message Authentication Code (CBC-MAC)
TKIP provides per-packet keyingand a rekeying mechanism
TKIP provides message integrity check
TKIP reduces WEP’s vulnerabilities byusing different hardware encryption chipset
TKIP uses a 48 bit InitializationVector
第8题:
The authenticator is not licensed to support Junos Pulse.
The authenticator did not receive the EAP-response/identity packet.
The authentication server is not receiving the RADIUS packet containing the EAP-response/identity data.
The authenticator is sending the request over its loopback interface.
The authentication server is sending back a RADIUS response packet, but the authenticator is not forwarding the response back to the supplicant.
第9题:
It is a Cisco proprietary protocol.
It runs on TCP port 59. .
Authentication and authorization are done at different stages.
TACACS+ encrypts the entire body of the packet, but leaves a standard TACACS+ header.
It is an industry standard protocol.
TACACS+ encrypts both the entire body of the packet and the TACACS+ header.
第10题:
Cisco proprietary
Standards-based protocol
Provides separate services for authentication, authorization, and accounting
Encrypts only the password
Uses UDP for a transport layer
Encrypts the entire packet
第11题:
To enable OSPF authentication in a network, OSPF area 0 authentications must be enabled first
The payload of OSPF version 3 packets contains no authentication information
OSPF version 3 supports Advanced Encryption Standard
OSPF version 3 uses router ID as a key to encrypt OSPF hello packets
OSPF MD5 authentication uses TCP, and Plan Test authentication uses UDP
第12题:
ACCESS REQUEST
ACCESS ACCEPT
CONTINUE
CHALLENGE
REPLY
START
第13题:
TACACS+ authentication uses whichthree packet types? ()
第14题:
What are the two advantages of any intelligent network that uses a systems-level approach?()
第15题:
A users Junos Pulse client uses 802.1X to access a wired network and is failing to authenticate. You run a packet capture from the users PC and notice that immediately after the client machine sends an EAPoL-start packet, an EAP-failure packet is returned. You review the RADIUS troubleshooting logs on the MAG Series device and do not see any authentication attempts from the user. Other users on the same Ethernet switch are successfully authenticating. Which device is sending the EAP-failure packet to the workstation?()
第16题:
Which two statements about using the CHAP authentication mechanism in a PPP link are true?()
第17题:
Which two external authentication methods are supported by the Junos OS for user authentication?()
第18题:
CHAP uses a two-way handshake
CHAP authentication periodically occurs after link establishment
CHAP has no protection from playback attacks
CHAP authentication is performed only upon link establishment
CHAP uses a three-way handshake
CHAP authentication passwords are sent in plaintext
第19题:
timing
queuing
differential
serialization
packetization
propagation
第20题:
debug eigrp packets
show ip eigrp traffic
show ip eigrp topology
show ip eigrp neighbors
第21题:
The RADIUS server
The EAPoL server
The workstation's network adapter
The Ethernet switch
第22题:
this login authenticationmethod list is automaticallyapplied to all lines except those that have a named method list explicitly defined
If the user fails the TACACS+ authentication then the local database on the router will be used to authenticatethe user
if the tacacs+ server fails to respond then the local database on the router will be used to authenticate the user
login is the name of the method list being configured
if the tacacs+ server is unavailable, authentication will succeed automaticallyby default
第23题:
MD5 and SHA
RADIUS and TACACS only
Local User Database
Local user Database, RADIUS, and TACACS+
第24题:
RADIUS
TACACS+
LDAP
IIS