网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which of the following authentication protocols uses certificates to negotiate access to the network?()
A

PAP

B

CHAP

C

EAP-TLS

D

Kerberos


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which of the following authentication protocols uses certificates to negotiate access to the network?()A PAPB CHAPC EAP-TLSD Kerberos” 相关考题
考题 Which of the following protocols uses port 119, by default?() A.NNTPB.NTPC.TFTPD.FTP

考题 Kerberos is a form of user authentication that:() A. Provides users access to network resources.B. Performs router commands after user authentication.C. Provides users with remote access only capabilities.D. Does not require an authentication server

考题 Which of the following authentication protocols uses certificates to negotiate access to the network?() A.PAPB.CHAPC.EAP-TLSD.Kerberos

考题 The Testking network is implementing dialup services for their remote employees.Testking uses several different Layer 3 protocols on the network. Authentication ofthe users connecting to the network is required for security. Additionally, some employees will be dialing long distance and will need callback support.Which protocol is the best choice for these remote access services?()A.802.1B.FramerelayC.HDLCD.PPPE.SLIPF.PAP

考题 下面哪条命令是把PPP的验证方式设置为PAP().A、ppp papB、ppp chapC、ppp authentication-mode papD、ppp authentication-mode chap

考题 Which two primary port authentication protocols are used with VSANs?()A、SPAPB、CHAPC、DHCHAPD、ESP

考题 What is not a difference between VPN tunnel authentication and per-user authentication?()A、VPN tunnel authentication is part of the IKE specification. B、VPN tunnel authentication does not control which end user can use the IPSec SA (VPN tunnel).C、User authentication is used to control access for a specific user ID, and can be used with or without a VPN tunnel for network access authorization. D、802.1X with EAP-TLS (X.509 certificates) can be used to authenticate an IPSec tunnel.

考题 Which of the following authentication protocols uses certificates to negotiate access to the network?()A、PAPB、CHAPC、EAP-TLSD、Kerberos

考题 Which of the following protocols uses port 80?()A、SMTPB、HTTPC、HTTPSD、FTP

考题 Client association using EAP-Cisco Wireless (LEAP) is failing, but EAP-PEAP is functioning on an autonomous access point. Which of the following needs to be enabled on the access point so EAP-Cisco Wireless (LEAP) is enabled?()A、open authentication plus MACB、open authentication plus EAPC、shared keyD、network EAP

考题 pany is implementing 802.1X in order to increase network security. In the use of 802.1X   access control,  which three protocols are allowed through the switch port before authentication  takes place? ()A、 EAP-over-LANB、 EAP MD5C、 STPD、 protocols not filtered by an ACLE、 CDPF、 TACACS+

考题 Kerberos is a form of user authentication that:()A、Provides users access to network resources.B、Performs router commands after user authentication.C、Provides users with remote access only capabilities.D、Does not require an authentication server

考题 Which of the following protocols uses UDP to transfer files?()A、FTPB、SFTPC、SMTPD、TFTP

考题 A technician installed a new wireless access point on an existing small office home office (SOHO) network with a selective security option enabled. All wireless computers connect to the new network except one computer that cannot connect to the wireless network. Which of the following is the cause?()A、The network uses MAC filteringB、The network uses WEPC、The network uses SSID broadcastD、The network uses WPA

考题 Which of the following is the MOST likely authentication scheme used in 802.1x?()A、CHAPB、RADIUSC、TACACS+D、Kerberos

考题 单选题A technician installed a new wireless access point on an existing small office home office (SOHO) network with a selective security option enabled. All wireless computers connect to the new network except one computer that cannot connect to the wireless network. Which of the following is the cause?()A The network uses MAC filteringB The network uses WEPC The network uses SSID broadcastD The network uses WPA

考题 单选题Which of the following protocols should be used to monitor network performance?()A SNTPB SMTPC HTTPD SNMP

考题 单选题Which of the following protocols is the LEAST secure and should be avoided on a wireless network?()A WEPB PEAPC WPAD TKIP

考题 单选题Which one of the following protocols uses both UDP and TCP ports for the transport layer operation?()A FTPB TFTPC SMTPD TelnetE DNS

考题 单选题Kerberos is a form of user authentication that:()A Provides users access to network resources.B Performs router commands after user authentication.C Provides users with remote access only capabilities.D Does not require an authentication server

考题 单选题The Testking network is implementing dialup services for their remote employees.Testking uses several different Layer 3 protocols on the network. Authentication ofthe users connecting to the network is required for security. Additionally, some employees will be dialing long distance and will need callback support.Which protocol is the best choice for these remote access services?()A 802.1B FramerelayC HDLCD PPPE SLIPF PAP

考题 单选题Which of the following protocols uses port 80?()A SMTPB HTTPC HTTPSD FTP

考题 单选题What is not a difference between VPN tunnel authentication and per-user authentication?()A VPN tunnel authentication is part of the IKE specification. B VPN tunnel authentication does not control which end user can use the IPSec SA (VPN tunnel).C User authentication is used to control access for a specific user ID, and can be used with or without a VPN tunnel for network access authorization. D 802.1X with EAP-TLS (X.509 certificates) can be used to authenticate an IPSec tunnel.

考题 单选题Which of the following protocols uses UDP to transfer files?()A FTPB SFTPC SMTPD TFTP

考题 单选题Your network contains a single Active Directory domain. All domain controllers run Windows Server   2008 R2. There are 1,000 client computers that run Windows 7 and that are connected to managedswitches.   You need to recommend a strategy for network access that meets the following requirements:   èUsers are unable to bypass network access restrictions.   èOnly client computers that have up-to-date service packs installed can access the network.   èOnly client computers that have up-to-date anti-malware software installed can access the network.   What should you recommend?()A Implement Network Access Protection (NAP) that uses DHCP enforcement.B Implement Network Access Protection (NAP) that uses 802.1x enforcement.C Implement a Network Policy Server (NPS), and enable IPsec on the domain controllers.D Implement a Network Policy Server (NPS), and enable Remote Authentication Dial-In User Service  (RADIUS) authentication on the managed switches.

考题 单选题Which of the following authentication protocols uses certificates to negotiate access to the network?()A PAPB CHAPC EAP-TLSD Kerberos

考题 单选题Which of the following protocols uses both TCP and UDP ports?()A SMTPB TelnetC FTPD DNS

考题 单选题Which of the following network protocols is used to ensure consistent time across network devices on the domain?()A NTPB FTPC RTPD IGMP