EAP-TLS
EAP-MD5
PAP
EAP-MSCHAPv2
第1题:
A. it is a layer 2 messaging protocol which maintains vlan configurations across network.
B. it includes an 8-bit field which specifies the priority of a frame.
C. it is used exclusively for tagging vlan frames and dose not address network reconvergence following switched network topology changes.
D. it modifies the 802.3 frame header,and thus requires that the FCS be recomputed.
E. it is a trunking protocol capable of carring untagged frames.
第2题:
As a network engineer at Certpaper.com, you are responsible for Certpaper network. Which will benecessarily taken into consideration when implementing Syslogging in your network?()
第3题:
For the following statements, which one is perceived as a drawback of implementing Fibre ChannelAuthentication Protocol (FCAP)?()
第4题:
Which two of these are characteristics of the 802.1Q protocol?()
第5题:
A customer has Windows servers and applications that use block I/O. The customer cannot affordthe cost of a fibre channel infrastructure but still requires shared storage. Which configurationmeets these requirements at the lowest cost?()
第6题:
A customer has installed UAC in their network. They have both Windows and Linux endpoints andmust choose a deployment method that everyone can use. Which deployment method allows for multiple platforms? ()
第7题:
Which statemetn is true regarding the Network Time Protocol (NTP) on Junos devices?()
第8题:
OSPF
EIGRP
RIP v2
IGRP
RIP v1
第9题:
FTP
TFTP
TCP
UDP
SCP
第10题:
iSCSI HBAs and N3400
MicrosoftiSCSI initiator and N3400
MicrosoftiSCSI initiator and DS3400
SAN04B-R multi-protocol router and DS3400
第11题:
Configure client computers to use Protected Extensible Authentication Protocol-Microsoft Challenge Handshake Authentication Protocol version 2 (PEAP-MS-CHAP v2).
Configure client computers to use Protected Extensible Authentication Protocol-Transport Layer Security (PEAP-TLS).
Install a certificate in the Trusted Root Certification Authorities certificate store.
Install a certificate in the Third-Party Root Certification Authorities certificate store.
第12题:
It is restricted in size to only three segments
It requires the use of netBT as the network protocol
It requires the implementation of IKE
It relies on an underlying Public Key Infrastructure
第13题:
A customer is trying to decide which 802.1X inner protocol to use on their network. The customer requires that nopasswords be sent across the network in plain text, that the protocol be supported by the Windows native supplicant,and that the protocol supports password changes at Layer 2. Which protocol would meet the customers needs?()
第14题:
Which two of these are recommended practices with trunks? ()
第15题:
Your customer wants to build a network for a financial trading floor that has a requirement formultiple high-value transactions, which are also vital to the customer. What are the two mostcritical requirements?() (Choose two.)
第16题:
Which network protocol does DNS use?()
第17题:
Which statement is true regarding the Network Time Protocol (NTP) on Junos devices?()
第18题:
A customer is trying to determine which client to deploy. The customer wants to be able to perform Layer 2 authentication as well as connect to the Junos Pulse Secure Access Service.Which client should the customer deploy?()
第19题:
Your company’s network includes client computers that run Windows 7. You design a wireless network to use Extensible Authentication Protocol-Transport Level Security (EAP-TLS). The Network Policy Server has a certificate installed. Client computers are unable to connect to the wireless access points. You need to enable client computers to connect to the wireless network. What should you do?()
第20题:
EIGRP
OSPF
RIPv1
RIPv2
BGP
IS - IS
第21题:
H·323
UDP
RTP
TCP
Media Gateway Control Protocol (MGCP)
session initiation protocol (SIP)
第22题:
EAP-TLS
EAP-MD5
PAP
EAP-MSCHAPv2
第23题:
MD5 authenticaton is supported by the Junos OS
Server mode is not supported by the Junos OS
The Junos OS can provide a primarytime reference
The Junos OS does not support the use of a boot server
第24题:
MD5 authentication is supported by the Junos OS
Server mode is not supported by the Junos OS
The Junos OS can provide a primary time reference
The Junos OS does not support the use of a boot server