多选题What are three necessary steps for enabling 802.1X access when configuring Layer 2 enforcement?()AConfigure a location groupBCreatean authentication protocol setCConfigure the RADIUS AV pair listDConfigure RADIUS clientsEConfigure role and role-mapping

题目
多选题
What are three necessary steps for enabling 802.1X access when configuring Layer 2 enforcement?()
A

Configure a location group

B

Createan authentication protocol set

C

Configure the RADIUS AV pair list

D

Configure RADIUS clients

E

Configure role and role-mapping rules


相似考题
更多“多选题What are three necessary steps for enabling 802.1X access when configuring Layer 2 enforcement?()AConfigure a location groupBCreatean authentication protocol setCConfigure the RADIUS AV pair listDConfigure RADIUS clientsEConfigure role and role-mapping”相关问题
  • 第1题:

    When configuring PPP over ATM interfaces, what does the profile utility accomplish?()

    A.It binds an interface to a virtual router.

    B.It allows for dynamic interface creation.

    C.It assigns a Domain Name Server for a session.

    D.It identifies the RADIUS server to use for authentication


    参考答案:B

  • 第2题:

    What is a function of a user role?()

    • A、It defines the IPsec parameters for the role.
    • B、It assigns access to resources.
    • C、It associates the user with a RADIUS server.
    • D、It defines the types of authentication methods available to the user

    正确答案:A

  • 第3题:

    An authentication realm consists of which three authentication resources?()

    • A、Authentication server
    • B、Session options
    • C、Authentication policy
    • D、End-point security policy
    • E、Role-mapping rules

    正确答案:A,C,E

  • 第4题:

    When using RADIUS as an external authentication method for 802.1X authentication for the Junos Pulse Access Control Service, what must you do to ensure that the RADIUS authentication works properly?()

    • A、Configure IP helper to forward the authentication requests from the clients to the external RADIUS server
    • B、Configure the supplicant as anexternal authentication server
    • C、Configure RADIUS proxy on the realm
    • D、Specify the correct RADIUS port 389 on the Junos Pulse Access Control Service

    正确答案:C

  • 第5题:

    Which three authentication resources are grouped within an authentication realm?()

    • A、Authentication enforcer
    • B、Directory server
    • C、Captive authentication
    • D、Authentication policy
    • E、Role-mapping rules

    正确答案:B,D,E

  • 第6题:

    What will serve as a RADIUS Client to the Infranet Controller for 802.1x authentication? ()

    • A、an ACE server
    • B、a wireless network
    • C、an Ethernet switch
    • D、Odyssey Access Client

    正确答案:C

  • 第7题:

    Network Access Protection (NAP) is configured for the corporate network.Users connect to the corporate network by using portable computers.The company policy requires confidentiality of data when the data is in transit between the portable computers and the servers.You need to ensure that users can access network resources only from computers that comply with the company policy.What should you do?()

    • A、Create an IPsec Enforcement Network policy.
    • B、Create an 802.1X Enforcement Network policy.
    • C、Create a Wired Network (IEEE 802.3) Group policy.
    • D、Create an Extensible Authentication Protocol (EAP) Enforcement Network policy.

    正确答案:A

  • 第8题:

    单选题
    What will serve as a RADIUS Client to the Infranet Controller for 802.1x authentication? ()
    A

    an ACE server

    B

    a wireless network

    C

    an Ethernet switch

    D

    Odyssey Access Client


    正确答案: C
    解析: 暂无解析

  • 第9题:

    单选题
    Your company has deployed Network Access Protection (NAP). You configure secure wireless access to the network by using 802.1x authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP.  what should you do()?
    A

    Configure all access points as RADIUS clients to the Remediation Servers

    B

    Configure all access points as RADIUS clients to the Network Policy Server (NPS)

    C

    Create a Network Policy that defines Remote Access Server as a network connection method

    D

    Create a Network Policy that specifies EAP-TLS as the only availible authentication method.


    正确答案: B
    解析: 暂无解析

  • 第10题:

    单选题
    When configuring PPP over ATM interfaces, what does the profile utility accomplish?()
    A

    It binds an interface to a virtual router.

    B

    It allows for dynamic interface creation.

    C

    It assigns a Domain Name Server for a session.

    D

    It identifies the RADIUS server to use for authentication


    正确答案: D
    解析: 暂无解析

  • 第11题:

    多选题
    A customer has purchased a third-party switch to use for Layer 2 access with their Junos Pulse Access Controe Service. When configuring the switch on the Junos Pulse Access Control Service, the customer does not find a make/model entry for it . Which two actions should the customer take to make the switch work with the Junos Pulse Access Control Service?()
    A

    Add the switch to the Junos Pulse Access Control Service as a standard RADIUS.

    B

    Add the switch to the Junos Pulse Access Control Service using the Any make/model.

    C

    Add the switch as a firewall enforcer.

    D

    Obtain and configure the RADIUS dictionary for the switch and use that vendor listing for the make/model.


    正确答案: D,B
    解析: 暂无解析

  • 第12题:

    单选题
    Your company has deployed Network Access Protection (NAP).You configure secure wireless access to the network by using 802.1X authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP.  What should you do?()
    A

    Configure all access points as RADIUS clients to the Remediation Servers.

    B

    Configure all access points as RADIUS clients to the Network Policy Server (NPS).

    C

    Create a Network Policy that defines Remote Access Server as a network connection method.

    D

    Create a Network Policy that specifies EAP-TLS as the only available authentication method.


    正确答案: D
    解析: 暂无解析

  • 第13题:

    What will serve as a RADIUS Client to the Infranet Controller for 802.1x authentication? ()

    A. an ACE server

    B. a wireless network

    C. an Ethernet switch

    D. Odyssey Access Client


    参考答案:C

  • 第14题:

    What are three necessary steps for enabling 802.1X access when configuring Layer 2 enforcement?()

    • A、Configure a location group
    • B、Createan authentication protocol set
    • C、Configure the RADIUS AV pair list
    • D、Configure RADIUS clients
    • E、Configure role and role-mapping rules

    正确答案:A,D,E

  • 第15题:

    You work as a network administrator at, You have been asked to configure 802.1x port-based authentication. You notice that the client workstation is not compatible with 802.1x port-based authentication.  What supported authentication server should be chosen?()

    • A、TACACS with LEAP extensions
    • B、RADIUS with EAP extensions
    • C、TACACS+
    • D、LDAP

    正确答案:B

  • 第16题:

    A customer has purchased a third-party switch to use for Layer 2 access with their Junos Pulse Access Controe Service. When configuring the switch on the Junos Pulse Access Control Service, the customer does not find a make/model entry for it . Which two actions should the customer take to make the switch work with the Junos Pulse Access Control Service?()

    • A、Add the switch to the Junos Pulse Access Control Service as a standard RADIUS.
    • B、Add the switch to the Junos Pulse Access Control Service using the "Any" make/model.
    • C、Add the switch as a firewall enforcer.
    • D、Obtain and configure the RADIUS dictionary for the switch and use that vendor listing for the make/model.

    正确答案:A,D

  • 第17题:

    When configuring PPP over ATM interfaces, what does the profile utility accomplish?()

    • A、It binds an interface to a virtual router.
    • B、It allows for dynamic interface creation.
    • C、It assigns a Domain Name Server for a session.
    • D、It identifies the RADIUS server to use for authentication

    正确答案:B

  • 第18题:

    Your company has deployed Network Access Protection (NAP).You configure secure wireless access to the network by using 802.1X authentication from any access point.You need to ensure that all client computers that access the network are evaluated by NAP. What should you do?()

    • A、Configure all access points as RADIUS clients to the Remediation Servers.
    • B、Configure all access points as RADIUS clients to the Network Policy Server (NPS).
    • C、Create a Network Policy that defines Remote Access Server as a network connection method. 
    • D、Create a Network Policy that specifies EAP-TLS as the only available authentication method.

    正确答案:B

  • 第19题:

    Your company has deployed Network Access Protection (NAP). You configure secure wireless access to the network by using 802.1x authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP.  what should you do()? 

    • A、Configure all access points as RADIUS clients to the Remediation Servers
    • B、Configure all access points as RADIUS clients to the Network Policy Server (NPS)
    • C、Create a Network Policy that defines Remote Access Server as a network connection method
    • D、Create a Network Policy that specifies EAP-TLS as the only availible authentication method.

    正确答案:B

  • 第20题:

    单选题
    What is a function of a user role?()
    A

    It defines the IPsec parameters for the role.

    B

    It assigns access to resources.

    C

    It associates the user with a RADIUS server.

    D

    It defines the types of authentication methods available to the user


    正确答案: A
    解析: 暂无解析

  • 第21题:

    多选题
    What are two steps to configure user authentication for a Junos Pulse Access Control Service?()
    A

    Configure an authentication policy as part of the user role definitions.

    B

    Configure a Sign-in Policy.

    C

    Configure authentication agents as part of the user role definitions

    D

    Configure an authentication policy as part of the authentication realm definition.


    正确答案: B,D
    解析: 暂无解析

  • 第22题:

    单选题
    An administrator has created three different Odyssey Access Client preconfiguration files and assigned them to three different roles in the same realm.Which action should the administrator take to ensure that users get the correct Odyssey Access Client preconfiguration file?()
    A

    Configure each user account in the auth server with the appropriate Odyssey Access Client preconfiguration files.

    B

    Configure the role-mapping rules with the appropriate Odyssey Access Client preconfiguration files.

    C

    Ensure that merge roles is selected in the role-mapping rules.

    D

    Ensure that the first role a user is mapped to is the role with the appropriate Odyssey Access Client preconfiguration file.


    正确答案: C
    解析: 暂无解析

  • 第23题:

    单选题
    When using RADIUS as an external authentication method for 802.1X authentication for the Junos Pulse Access Control Service, what must you do to ensure that the RADIUS authentication works properly?()
    A

    Configure IP helper to forward the authentication requests from the clients to the external RADIUS server

    B

    Configure the supplicant as anexternal authentication server

    C

    Configure RADIUS proxy on the realm

    D

    Specify the correct RADIUS port 389 on the Junos Pulse Access Control Service


    正确答案: C
    解析: 暂无解析