网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Clients using Cisco-LEAP and EAP-FAST authentication are having no problems logging on to thewireless network,but clients using PEAP are failing to log on. Which situation would result in thistype ofproblem?()
A

Posture validation has not been enabled.

B

The AAA server is set to accept both MS-CHAP v2 and GTC for PEAP authentication.

C

Clients and server are not using certificates.

D

Clients have been set to validate the server identity.


参考答案

参考解析
解析: 暂无解析
更多 “单选题Clients using Cisco-LEAP and EAP-FAST authentication are having no problems logging on to thewireless network,but clients using PEAP are failing to log on. Which situation would result in thistype ofproblem?()A Posture validation has not been enabled.B The AAA server is set to accept both MS-CHAP v2 and GTC for PEAP authentication.C Clients and server are not using certificates.D Clients have been set to validate the server identity.” 相关考题
考题 In your database, the LDAP_DIRECTORY_SYSAUTH initialization parameter has been set to YES and the users who need to access the database as DBAs have been granted SYSDBA enterprise role in Oracle Internet Directory (OID). SSL and the password file have been configured. A user SCOTT with the SYSDBA privilege tries to connect to the database instance from a remote machine using the command:Which authentication method would be used first?()A. authentication by password fileB. authentication by using certificates over SSLC. authentication by using the Oracle Internet DirectoryD. authentication by using the local OS of the database server

考题 When using RADIUS as an external authentication method for 802.1X authentication for the Junos Pulse Access Control Service, what must you do to ensure that the RADIUS authentication works properly?() A. Configure IP helper to forward the authentication requests from the clients to the external RADIUS serverB. Configure the supplicant as anexternal authentication serverC. Configure RADIUS proxy on the realmD. Specify the correct RADIUS port 389 on the Junos Pulse Access Control Service

考题 Clients using Cisco-LEAP and EAP-FAST authentication are having no problems logging on to thewireless network, but clients using PEAP are failing to log on. Which situation would result in thistype ofproblem?()A、Posture validation has not been enabledB、The AAA server is set to accept both MS-CHAP v2 and GTC for PEAP authenticationC、Clients and server are not using certificatesD、Clients have been set to validate the server identity

考题 Which authentication types are allowed with the cisco adu when selecting wpa/wpa2/cckm under the security options?()A、cisco-leap,eap-fast,eap-peap(gtc),eap-tlsB、cisco-leap,eap-psk,eap-peap(ms-chap v2),eap-tlsC、cisco-leap,eap-fast,eap-peap(ms-chap v2),eap-ttlsD、cisco-leap,eap-md5,eap-peap(gtc),eap-ttls

考题 Which two statements about the open and shared key wireless-authentication methods are true? ()A、 Shared key authentication is considered more secure than open authentication.B、 Shared key authentication is considered less secure than open authentication.C、 If the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer data.D、 If the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer data.E、 If the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data.

考题 Company.com network consists of a single Active Directory domain named  Company.com.Company.com has an Exchange Server 2010 organization.The Company.com employees use Microsoft Office Outlook 2007 to connect to their mailboxes.RPC over HTTP and Auto discover are configured on Microsoft Office Outlook 2007. A new Company.com security policy requires that the employees connected to the domain does not need authentication when using Outlook Anywhere.However, those not connected t the domain needs to be authentication when using Outlook Anywhere.The employees need to comply with the new Company.com security policy.  What should you do?()A、You should consider using Basic authentication on Outlook Anywhere and set up only Basic authentication on the RPC virtual directory.B、You should consider using NTLM authentication on Outlook Anywhere and set up Basic authentication and NTLM authentication on the RPC virtual directory.C、You should consider using NTLM authentication on Outlook Anywhere and set up only Basic authentication on the RPC virtual directory.D、You should consider using Basic authentication on Outlook Anywhere and set up Basic authentication and NTLM authentication on the RPC virtual directory.

考题 To implement the optional phase zero when using EAP-FAST for authentication, which of the following parameters must be set on the Cisco Secure ACS?()A、EAP-FAST master serverB、Allow automatic PAC provisioningC、client initial messageD、authority ID info

考题 Which of the following commands configures the cisco 3845 integrated services router to allow eap-fast authentication using wds?()A、router (config)# wlccp authentication-server infrastructure eap group_1B、router (config)# wlccp authentication-server infrastructure eap-fast group_1C、router (config)# wlccp authentication-server client eap-fast group_1D、router (config)# wlccp authentication-server client eap group_1

考题 Clients using Cisco-LEAP and EAP-FAST authentication are having no problems logging on to thewireless network,but clients using PEAP are failing to log on. Which situation would result in thistype ofproblem?()A、Posture validation has not been enabled.B、The AAA server is set to accept both MS-CHAP v2 and GTC for PEAP authentication.C、Clients and server are not using certificates.D、Clients have been set to validate the server identity.

考题 On a standalone access point, client association using EAP-Cisco Wireless (Cisco-LEAP) isfailing, but association using EAP-PEAP is functioning. What needs to be enabled on the standalone accesspoint to correct this issue?()A、network EAPB、open authentication plus MACC、open authentication plus EAPD、a shared key

考题 Your company has deployed Network Access Protection (NAP).You configure secure wireless access to the network by using 802.1X authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP.  What should you do?()A、Configure all access points as RADIUS clients to the Remediation Servers.B、Configure all access points as RADIUS clients to the Network Policy Server (NPS).C、Create a Network Policy that defines Remote Access Server as a network connection method.D、Create a Network Policy that specifies EAP-TLS as the only available authentication method.

考题 Your company has deployed Network Access Protection (NAP). You configure secure wireless access to the network by using 802.1x authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP.  what should you do()? A、Configure all access points as RADIUS clients to the Remediation ServersB、Configure all access points as RADIUS clients to the Network Policy Server (NPS)C、Create a Network Policy that defines Remote Access Server as a network connection methodD、Create a Network Policy that specifies EAP-TLS as the only availible authentication method.

考题 单选题Clients using Cisco-LEAP and EAP-FAST authentication are having no problems logging on to the wirelessnetwork, but clients using PEAP are failing to log on. Which situation would result in this type of problem?()A The AAA server is set to accept both MS-CHAP v2 and GTC for PEAP authentication.B Clients have been set to validate the server identity.C Posture validation has not been enabled.D Clients and server are not using certificates.

考题 多选题You are designing a service that will use the Windows Azure AppFabric Service Bus.  You need to recommend an approach for controlling access to the service by using the Windows Azure AppFabric Access Control Service. Which two actions should you recommend?()AConfigure the service to not require authentication.BConfigure the service to require a relay access token.CSpecify message security for all communications between clients and the service.DSpecify transport security for allcommunications between clients and the service.

考题 单选题Clients using Cisco-LEAP and EAP-FAST authentication are having no problems logging on to thewireless network, but clients using PEAP are failing to log on. Which situation would result in thistype ofproblem?()A Posture validation has not been enabledB The AAA server is set to accept both MS-CHAP v2 and GTC for PEAP authenticationC Clients and server are not using certificatesD Clients have been set to validate the server identity

考题 单选题When using RADIUS as an external authentication method for 802.1X authentication for the Junos Pulse Access Control Service, what must you do to ensure that the RADIUS authentication works properly?()A Configure IP helper to forward the authentication requests from the clients to the external RADIUS serverB Configure the supplicant as anexternal authentication serverC Configure RADIUS proxy on the realmD Specify the correct RADIUS port 389 on the Junos Pulse Access Control Service

考题 单选题On a standalone access point, client association using EAP-Cisco Wireless (Cisco-LEAP) is failing, butassociation using EAP-PEAP is functioning. What needs to be enabled on the standalone access point tocorrect this issue?()A a shared keyB network EAPC open authentication plus EAPD open authentication plus MAC

考题 多选题Which two statements regarding firewall user authentication client groups are true?()AIndividual clients are configured under client groups in the configuration hierarchy.BClient groups are configured under individual clients in the configuration hierarchy.CClient groups are referenced in security policy in the same manner in which individual clients are referenced.DClient groups are used to simplify configuration by enabling firewall user authentication without security policy.

考题 多选题Which two statements about the open and shared key wireless-authentication methods are true? ()AShared key authentication is considered more secure than open authentication.BShared key authentication is considered less secure than open authentication.CIf the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer data.DIf the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer data.EIf the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data.

考题 单选题To implement the optional phase zero when using eap-fast for authentication, which of the following parameters must be set on the cisco secure acs?()A eap-fast master serverB allow automatic pac provisioningC client initial messageD authority id info