思科认证考试

Authentication for user data traffic is important, but so is authentication for IP voice traffic. The Cisco 830 802.1 feature provides an easier method for allowing IP voice traffic through the VPN, because it().A、requires access lists to identify the voi

题目

Authentication for user data traffic is important, but so is authentication for IP voice traffic. The Cisco 830 802.1 feature provides an easier method for allowing IP voice traffic through the VPN, because it().

  • A、requires access lists to identify the voice traffic 
  • B、can allow traffic from a device without 802.1X authentication, by MAC address
  • C、can allow traffic from Cisco IP phones by listening to their CDP advertisements
  • D、allows all packets marked with a ToS of 5 to bypass authentication
  • E、allows all IP voice packets to bypass authentication via stateful inspection
如果没有搜索结果,请直接 联系老师 获取答案。
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which three authentication resources are grouped within an authentication realm?()

A. Authentication enforcer

B. Directory server

C. Captive authentication

D. Authentication policy

E. Role-mapping rules


参考答案:B, D, E

第2题:

which command is used to enable CHAP authentication whit PAP as the fallback method on a serial interface?()

  • A、(config-if)#authentication ppp chap fallback ppp
  • B、(config-if)#authentication ppp chap pap
  • C、(config-if)#ppp authentication chap pap
  • D、(config-if)#ppp authentication chap fallback ppp

正确答案:C

第3题:

An authentication realm consists of which three authentication resources?()

A. Authentication server

B. Session options

C. Authentication policy

D. End-point security policy

E. Role-mapping rules


参考答案:A, C, E

第4题:

An authentication realm consists of which three authentication resources?()

  • A、Authentication server
  • B、Session options
  • C、Authentication policy
  • D、End-point security policy
  • E、Role-mapping rules

正确答案:A,C,E

第5题:

Company.com network consists of a single Active Directory domain named  Company.com.Company.com has an Exchange Server 2010 organization.The Company.com employees use Microsoft Office Outlook 2007 to connect to their mailboxes.RPC over HTTP and Auto discover are configured on Microsoft Office Outlook 2007. A new Company.com security policy requires that the employees connected to the domain does not need authentication when using Outlook Anywhere.However, those not connected t the domain needs to be authentication when using Outlook Anywhere.The employees need to comply with the new Company.com security policy.  What should you do?()

  • A、You should consider using Basic authentication on Outlook Anywhere and set up only Basic authentication on the RPC virtual directory.
  • B、You should consider using NTLM authentication on Outlook Anywhere and set up Basic authentication and NTLM authentication on the RPC virtual directory.
  • C、You should consider using NTLM authentication on Outlook Anywhere and set up only Basic authentication on the RPC virtual directory.
  • D、You should consider using Basic authentication on Outlook Anywhere and set up Basic authentication and NTLM authentication on the RPC virtual directory.

正确答案:B

第6题:

Which profile configurations allows either PAP or CHAP to be used for authentication?()

A.ppp authentication chap pap

B.pppoe authentication chap pap

C.ppp authentication chap ppp authentication pap

D.pppoe authentication chap pppoe authentication pap


参考答案:A

第7题:

Which two statements about the open and shared key wireless-authentication methods are true? ()

  • A、 Shared key authentication is considered more secure than open authentication.
  • B、 Shared key authentication is considered less secure than open authentication.
  • C、 If the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer data.
  • D、 If the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer data.
  • E、 If the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data.

正确答案:B,D

第8题:

What are two steps to configure user authentication for a Junos Pulse Access Control Service?()

A. Configure an authentication policy as part of the user role definitions.

B. Configure a Sign-in Policy.

C. Configure authentication agents as part of the user role definitions

D. Configure an authentication policy as part of the authentication realm definition.


参考答案:B, D

第9题:

What are the three OSPF authentication methods supported on the ERX Edge Router?()

  • A、 null password
  • B、 simple password
  • C、 message digest 5
  • D、 Password Authentication Protocol
  • E、 Challenge Handshake Authentication Protocol

正确答案:A,B,C

第10题:

which command is used to enable CHAP authentication whit PAP as the fallback method on a serialinterface?()

  • A、(config-if)#authentication ppp chap fallback ppp
  • B、(config-if)#authentication ppp chap pap
  • C、(config-if)#ppp authentication chap pap
  • D、(config-if)#ppp authentication chap fallback ppp

正确答案:C

更多相关问题