● NAC’s (Network Access Control ) role is to restrict network access to only compliant endpoints and (66) users. However, NAC is not a complete LAN (67) solution; additional proactive and (68) security measures must be implemented. Nevis is the first and only comprehensive LAN security solution that combines deep security processing of every packet at 10Gbps, ensuring a high level of security plus application availability and performance. Nevis integrates NAC as the first line of LAN security (69) . In addition to NAC, enterprises need to implement role-based network access control as well as critical proactive security measures — real-time, multilevel (70inspection and microsecond threat containment.
(66)A. automated B. distinguished C. authenticated D. destructed
(67)A. crisis B. security C. favorable D. excellent
(68)A. constructive B. reductive C. reactive D. productive
(69)A. defense B. intrusion C. inbreak D. protection
(70)A. port B. connection C. threat D. insurance
第1题:
Your security policy requires that users authenticating to the Junos Pulse Access Control Service are connecting from a domain member endpoint on the internal corporate network.Which set of role access restrictions must you configure to enforce this security policy?()
A. Source IP and browser
B. Source IP and certificate
C. Certificate and Host Checker
D. Host Checker and source IP
第2题:
A. NAC can authenticate using 802.1X and IBNS cannot
B. NAC can ensure only compliant machines connect and IBNS cannot
C. NAC can ensure access to the correct network resources and IBNS cannot
D. NAC can manage user mobility and reduce overhead costs and IBNS cannot
第3题:
第4题:
第5题:
What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。
第6题:
Which two considerations must you take into account when deploying a Junos Pulse Access Control Service cluster?()
第7题:
Which of these is a benefit of using Network Admission Control instead of Cisco Identity Based Networking Services?()
第8题:
An outside vendor is eligible for the guest role and the contractor role when accessing your network, that is secured with the Junos Pulse Access Control Service.What is the default role-mapping behavior?()
第9题:
Your company has an Active Directory forest named contoso.com. You plan to deploy an Exchange Server 2010 organization that will contain two servers. Each server will have the Client Access server role, the Hub Transport server role, and the Mailbox serverrole installed. You plan to add both servers to a database availability group (DAG). You need to recommend a high-availability solution for the Client Access server role. Your solution must ensure that users are not prompted to authenticate if a Client Access server becomesunavailable. What should you recommend?()
第10题:
Your network consists of an Active Directory forest that contains two sites named Site1 and Site2. From the Internet, users can only access servers in Site1. You have an Exchange Server 2007 organization. Each site contains servers that run the Client Access server role, the Mailbox server role, and the HubTransport server role. You plan to transition the organization to Exchange Server 2010. You need to recommend the server role that you must transition first to Exchange Server 2010. Your solution must provide the least amount of downtime for users in the organization. Which servers should you transition first?()
第11题:
Configure Internet Authentication Service (IAS) for accounting.
Configure the server running Routing and Remote Access to support L2TP.
Configure the server running Routing and Remote Access to restrict dial-in traffic to the NewApp servers only.
Create a separate account for remote access users. Configure these accounts to access the NewApp server only.
第12题:
Wireless Domain Services (WDS)
Access Control Server (ACS)
Lightweight Access Point Protocol (LWAPP)
Wireless LAN solution Engine (WLSE)
Wireless Services Module (WISM)
Wireless Control System (WCS)
第13题:
A. State synchronization occurs only through the internal network interface card (NIC)
B. Latency of the WAN must be less than 300 ms.
C. Authenticating endpoints must be on the same LAN segment.
D. Cluster members must use the same hardware platfor
第14题:
To access information on the Intemet,a user must first log on to the client computer'S______network.
A.server
B.client
C.host
D.self
第15题:
第16题:
第17题:
pany is deploying a Cisco autonomous WLAN solution in their network. Which three components are included in this solution?()
第18题:
As the Company wireless administrator, you required to be knowledgeable about the wireless LAN components. Which two statements about these components are true? ()
第19题:
Your security policy requires that users authenticating to the Junos Pulse Access Control Service are connecting from a domain member endpoint on the internal corporate network.Which set of role access restrictions must you configure to enforce this security policy?()
第20题:
You administer a network containing SRX Series firewalls. New policy requires that you implement MAG Series devices to provide access control for end users. The policy requires that the SRX Series devices dynamically enforce security policy based on the source IP address of the user. The policy also requires that the users communicate with protected resources using encrypted traffic. Which two statements are true?()
第21题:
You need to design a method to protect traffic on the wireless network. Your solution must meet the requirements of the chief security officer. What should you do?()
第22题:
You are designing a security strategy for users who need remote access to the corporate network. What should you do?()
第23题:
The vendor must select a role from a list of eligible roles.
The vendor must select a rule from a list of eligible rules.
The vendor is automatically mapped to the first configured role
The vendor is automatically granted a merged role.