网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

What are two roles of the authenticator as described in the 802.1X standard? ()

  • A、It proxies the authentication information between the supplicant and the authentication server.
  • B、It controls physical access to the network.
  • C、It communicates with the authentication server only.
  • D、It is responsible for verifying the identity of the supplicant through the use of an internal database.

参考答案

更多 “What are two roles of the authenticator as described in the 802.1X standard? ()A、It proxies the authentication information between the supplicant and the authentication server.B、It controls physical access to the network.C、It communicates with the authentication server only.D、It is responsible for verifying the identity of the supplicant through the use of an internal database.” 相关考题
考题 What are two steps to configure user authentication for a Junos Pulse Access Control Service?() A. Configure an authentication policy as part of the user role definitions.B. Configure a Sign-in Policy.C. Configure authentication agents as part of the user role definitionsD. Configure an authentication policy as part of the authentication realm definition.

考题 What are two roles of the authenticator as described in the 802.1X standard? () A. It proxies the authentication information between the supplicant and the authentication server.B. It controls physical access to the network.C. It communicates with the authentication server only.D. It is responsible for verifying the identity of the supplicant through the use of an internal database.

考题 When using RADIUS as an external authentication method for 802.1X authentication for the Junos Pulse Access Control Service, what must you do to ensure that the RADIUS authentication works properly?() A. Configure IP helper to forward the authentication requests from the clients to the external RADIUS serverB. Configure the supplicant as anexternal authentication serverC. Configure RADIUS proxy on the realmD. Specify the correct RADIUS port 389 on the Junos Pulse Access Control Service

考题 You have an SRX Series Layer 2 enforcer providing 802.1X authentication for connected endpoints. Your security policy requires that users who fail their authentication be placed in a specific VLAN.On the Layer 2 enforcer, at the [edit protocols dot1x authenticator interface] hierarchy for each participating interface, what provides this functionality?()A. guest-vlanB. auth-fail-vlanC. server-reject-vlanD. server-fail-vlan

考题 What will serve as a RADIUS Client to the Infranet Controller for 802.1x authentication? () A. an ACE serverB. a wireless networkC. an Ethernet switchD. Odyssey Access Client

考题 What is not a difference between VPN tunnel authentication and per-user authentication?()A、VPN tunnel authentication is part of the IKE specification. B、VPN tunnel authentication does not control which end user can use the IPSec SA (VPN tunnel).C、User authentication is used to control access for a specific user ID, and can be used with or without a VPN tunnel for network access authorization. D、802.1X with EAP-TLS (X.509 certificates) can be used to authenticate an IPSec tunnel.

考题 In an IEEE 802.1x deployment,between which two devices EAPOL messages typically are sent?()A、Between the supplicant and the authenticatorB、Between the authenticator and the authentication serverC、Between the supplicant and the authentication serverD、Between the RADIUS server and the authenticator

考题 Which two pieces of information are needed when declaring the web resource collection in the deployment descriptor?()A、 the URL pattern that requires authorizationB、 the HTTP methods that require authorizationC、 the users allowed access to the web resourceD、 the J2EE roles allowed access to the web resourceE、 the authentication mechanism required by the web resource

考题 What are two steps to configure user authentication for a Junos Pulse Access Control Service?()A、Configure an authentication policy as part of the user role definitions.B、Configure a Sign-in Policy.C、Configure authentication agents as part of the user role definitionsD、Configure an authentication policy as part of the authentication realm definition.

考题 The database instance has the following parameter setting: OS_AUTHENT_PREFIX = OPS$ OS_ROLES = FALSE  REMOTE_OS_AUTHENT = FALSE REMOTE_OS_ROLES = FALSE TIMED_OS_STATISTICS = 0  You have a local operating system user SKD. You create a database user OPS$SKD, and then  assignexternal authentication. The user OPS$SKD has the CREATE SESSION privilege.  What would youachieve by the above process()A、The database user OPS$SKD will be able to administer the database.B、The authentication detail for the database user OPS$SKD is recorded in the password file.C、The local operating system user SKD will be able to access the database instance without specifying the username and password.D、The database user OPS$SKD has to login with the password of the local operating system user SKD to access the database instance.

考题 You must configure access to the corporate network for employees using a client access method. Users require IPsec tunneling to protected resources and an 802.1X supplicant. Users will access the network using Windows platforms.Which two client access methods would support these requirements?()A、Junos PulseB、Java AgentC、Odyssey Access ClientD、Native 802.1X supplicant

考题 Which statement regarding 802.1X is true?()A、802.1X is simple to implement on any workstation.B、802.1X requires access-lists to allow IP voice traffic across.C、Authentication is initiated when the workstation connects to an Ethernet port.D、802.1X requires HTTP access to initiate authentication.

考题 You are using ADU and are authenticated and associated to an access point. You are unable toobtain an IP address. Which of the following will cause this problem?()A、AES encryption enabledB、TKIP enabledC、third-party wireless supplicant enabledD、802.1X authentication type enabled

考题 You are the network administrator for your company. A user is complaining that they are not able to access the network with the Junos Pulse client. You run a packet capture on the network interface to monitor the 802.1X authentication process. You notice that after the EAP- request/identity packet is received, and the supplicant responds with an EAP-response/identity packet, no further communication occurs for several seconds. What are three causes for this behavior?()A、The authenticator is not licensed to support Junos Pulse.B、The authenticator did not receive the EAP-response/identity packet.C、The authentication server is not receiving the RADIUS packet containing the EAP-response/identity data.D、The authenticator is sending the request over its loopback interface.E、The authentication server is sending back a RADIUS response packet, but the authenticator is not forwarding the response back to the supplicant.

考题 When using RADIUS as an external authentication method for 802.1X authentication for the Junos Pulse Access Control Service, what must you do to ensure that the RADIUS authentication works properly?()A、Configure IP helper to forward the authentication requests from the clients to the external RADIUS serverB、Configure the supplicant as anexternal authentication serverC、Configure RADIUS proxy on the realmD、Specify the correct RADIUS port 389 on the Junos Pulse Access Control Service

考题 Which additional configuration must be completed when setting up role restrictions using certificates? ()A、Set up a certificate authentication server.B、Configure the authentication realm to remember certificate information.C、Configure the authentication realm to use a certificate server for authentication.D、Configure a role mapping rule requiring certification information to map user to role.

考题 What will serve as a RADIUS Client to the Infranet Controller for 802.1x authentication? ()A、an ACE serverB、a wireless networkC、an Ethernet switchD、Odyssey Access Client

考题 You need to design an authentication solution for the wireless network. Your solution must meet the security requirements. What should you do?()A、Create wireless VPNs using L2TP/IPSec between the client computers to the wireless access pointB、Configure IEEE 802.1x authentication with smart cardsC、Configure the wireless network to use Wired Equivalent Privacy (WEP)D、Install and configure an Internet Authentication Service (IAS) server

考题 You need to design a method of communication between the IT and HR departments. Your solution must meet business requirements. What should you do?()A、Design a custom IPSec policy to implement Encapsulating Security Payload (ESP) for all IP traffic Design the IPSec policy to use certificate-based authentication between the two departments’ computersB、Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computersC、Design a customer IPSec policy to implement Encapsulating Payload (ESP) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computersD、Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use certificate-based authentication between the two departments’ computers

考题 单选题What will serve as a RADIUS Client to the Infranet Controller for 802.1x authentication? ()A an ACE serverB a wireless networkC an Ethernet switchD Odyssey Access Client

考题 单选题You have an SRX Series Layer 2 enforcer providing 802.1X authentication for connected endpoints. Your security policy requires that users who fail their authentication be placed in a specific VLAN.On the Layer 2 enforcer, at the [edit protocols dot1x authenticator interface] hierarchy for each participating interface, what provides this functionality?()A guest-vlanB auth-fail-vlanC server-reject-vlanD server-fail-vlan

考题 多选题Which two pieces of information are needed when declaring the web resource collection in the deployment descriptor?()Athe URL pattern that requires authorizationBthe HTTP methods that require authorizationCthe users allowed access to the web resourceDthe J2EE roles allowed access to the web resourceEthe authentication mechanism required by the web resource

考题 多选题What are two roles of the authenticator as described in the 802.1X standard? ()AIt proxies the authentication information between the supplicant and the authentication server.BIt controls physical access to the network.CIt communicates with the authentication server only.DIt is responsible for verifying the identity of the supplicant through the use of an internal database.

考题 单选题In an IEEE 802.1x deployment,between which two devices EAPOL messages typically are sent?()A Between the supplicant and the authenticatorB Between the authenticator and the authentication serverC Between the supplicant and the authentication serverD Between the RADIUS server and the authenticator

考题 单选题What is not a difference between VPN tunnel authentication and per-user authentication?()A VPN tunnel authentication is part of the IKE specification. B VPN tunnel authentication does not control which end user can use the IPSec SA (VPN tunnel).C User authentication is used to control access for a specific user ID, and can be used with or without a VPN tunnel for network access authorization. D 802.1X with EAP-TLS (X.509 certificates) can be used to authenticate an IPSec tunnel.

考题 单选题The database instance has the following parameter setting: OS_AUTHENT_PREFIX = OPS$ OS_ROLES = FALSE  REMOTE_OS_AUTHENT = FALSE REMOTE_OS_ROLES = FALSE TIMED_OS_STATISTICS = 0  You have a local operating system user SKD. You create a database user OPS$SKD, and then  assignexternal authentication. The user OPS$SKD has the CREATE SESSION privilege.  What would youachieve by the above process()A The database user OPS$SKD will be able to administer the database.B The authentication detail for the database user OPS$SKD is recorded in the password file.C The local operating system user SKD will be able to access the database instance without specifying the username and password.D The database user OPS$SKD has to login with the password of the local operating system user SKD to access the database instance.

考题 多选题What are two valid reasons for using IBM Tivoli Access Manager for Enterprise Single Sign-On Graphical Identification and Authentication (GINA)?()AABBCCDDEE