Kerberos
Domain Name Server
Secure Sockets Layer
Resource Monitoring and Control
第1题:
What is not a difference between VPN tunnel authentication and per-user authentication?()
第2题:
Which protocol is used between the RAS and the authentication server in a narrowband network environment?()
第3题:
In a network using cisco autonomous access points running wds. What port is used for authentication by the local authentication service on an access point?()
第4题:
The pSeries technical specialist is concerned that the installed inventory for a p670 does not match what the customer says is installed. The specialist discovers that the customer has never updated their VPD. Which of the following HMC applications is used to gather the current VPD information?()
第5题:
Which statement accurately describes firewall user authentication?()
第6题:
Your network contains one Active Directory domain. You have a member server named Server1 that runs Windows Server 2008 R2. The server has the Routing and Remote Access Services role service installed.You implement Network Access Protection (NAP) for the domain.You need to configure the Point-to-Point Protocol (PPP) authentication method on Server1. Which authentication method should you use?()
第7题:
Service Processor
Service Director
Inventory Scout Services
Service Focal Point
第8题:
The period of time in which the set point and the control point coincide
The periodic change between the set point and the control point
The variable difference between the set point and the control point
The constant difference between the set point and the control point
第9题:
RADIUS
PPPPAP
MSCHAP
PPPCHAP
第10题:
Challenge Handshake Authentication Protocol (CHAP)
Extensible Authentication Protocol (EAP)
Microsoft Challenge Handshake Authentication Protocol version 2 (MS-CHAP v2)
Password Authentication Protocol (PAP)
第11题:
VPN tunnel authentication is part of the IKE specification.
VPN tunnel authentication does not control which end user can use the IPSec SA (VPN tunnel).
User authentication is used to control access for a specific user ID, and can be used with or without a VPN tunnel for network access authorization.
802.1X with EAP-TLS (X.509 certificates) can be used to authenticate an IPSec tunnel.
第12题:
Firewall user authentication provides another layer of security in a network.
Firewall user authentication provides a means for accessing a JUNOS Software-based security device.
Firewall user authentication enables session-based forwarding.
Firewall user authentication is used as a last resort security method in a network.
第13题:
In an IEEE 802.1x deployment,between which two devices EAPOL messages typically are sent?()
第14题:
The LWAPP (Lightweight Access Point Protocol) is in use within the Company wireless LAN. Which statement is true about this protocol?()
第15题:
In a network using Cisco autonomous access points running WDS, what port is used for authentication by the local authentication service on an access point?()
第16题:
When using RADIUS as an external authentication method for 802.1X authentication for the Junos Pulse Access Control Service, what must you do to ensure that the RADIUS authentication works properly?()
第17题:
Your network contains one Active Directory domain. You have a member server named Server1 that runs Windows Server 2008. The server has the Routing and Remote Acecss role service installed. You implement Network Access Protection (NAP) for the domain. You need to configure the Point-to-Point (PPP) authentication method on Server1. Which autnetication method should you choose?()
第18题:
Service Focal Point, Inventory Scout, and DLPAR rely on correct setup and networking between the HMC and the logical partitions. Which authentication method is used to control session management, but also authentication between network peers?()
第19题:
1813
1645
1646
1812
第20题:
1813
1645
1646
1812
第21题:
Configure IP helper to forward the authentication requests from the clients to the external RADIUS server
Configure the supplicant as anexternal authentication server
Configure RADIUS proxy on the realm
Specify the correct RADIUS port 389 on the Junos Pulse Access Control Service
第22题:
Challenge Handshake Authentication Protocol (CHAP)
Extensible Authentication Protocol (EAP)
Microsoft Challenge Handshake Authentication Protocol version 2 (MS-CHAP v2)
Password Authentication Protocol (PAP)
第23题:
Kerberos
Domain Name Server
Secure Sockets Layer
Resource Monitoring and Control