CMS专题

多选题You want to provide 802.1X access for Windows clients using Junos Pulse as the agent. Which two considerations must you take into account()AJunos Pulse out erauth entication uses EAP-PEAP.BJunos Pulse ou terauth entication uses EAP-TTLS.CJunos Pulse in

题目
多选题
You want to provide 802.1X access for Windows clients using Junos Pulse as the agent. Which two considerations must you take into account()
A

Junos Pulse out erauth entication uses EAP-PEAP.

B

Junos Pulse ou terauth entication uses EAP-TTLS.

C

Junos Pulse innerauth entication uses EAP-MSCHAP-V2.

D

Theend point must use thenative Microsoft 802.1X supplicant.

如果没有搜索结果,请直接 联系老师 获取答案。
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

When using RADIUS as an external authentication method for 802.1X authentication for the Junos Pulse Access Control Service, what must you do to ensure that the RADIUS authentication works properly?()

A. Configure IP helper to forward the authentication requests from the clients to the external RADIUS server

B. Configure the supplicant as anexternal authentication server

C. Configure RADIUS proxy on the realm

D. Specify the correct RADIUS port 389 on the Junos Pulse Access Control Service


参考答案:C

第2题:

What are two indicators that a customer should consider the installation of a Wireless LAN Controller? ()

  • A、need one access point
  • B、want to provide unsecured wireless access
  • C、need between two and three access points
  • D、want to provide employee wireless access
  • E、need more than four access points
  • F、want to provide guest wireless access

正确答案:E,F

第3题:

You must configure access to the corporate network for employees using a client access method. Users require IPsec tunneling to protected resources and an 802.1X supplicant. Users will access the network using Windows platforms.Which two client access methods would support these requirements?()

A. Junos Pulse

B. Java Agent

C. Odyssey Access Client

D. Native 802.1X supplicant


参考答案:A, C

第4题:

You have an Active Directory domain named contoso.com.You have an Exchange Server 2010  organization that contains a Client Access server named CAS1.Users connect to CAS1 from the Internet by using mail.contoso.com.The organization contains the following mobile clients:  (1)Windows Mobile 5.0 (2)Windows Mobile 6.1  (3)Windows Mobile 6.5  You plan to install a certificate on CAS1.You need to ensure that all clients can connect to CAS1 from the Internet by using Exchange ActiveSync.Which name should you include in the certificate?()

  • A、contoso.com
  • B、CAS1.contoso.com
  • C、EAS.contoso.com
  • D、mail.contoso.com

正确答案:D

第5题:

You are charged with implementing a secure wireless installation which will provide Internet access to client devices but will not allow communications between wireless clients. In addition toimplementing PSPF or peer-to-peer blocking on the wireless side. Which of the following actionsshould you perform on the wired infrastructure?()

  • A、Implement a Cisco Secure IPS sensor.
  • B、Implement 802.1X on the switch ports.
  • C、Take no action, you have achieved your goal.
  • D、Implement a protected port on the access switches.

正确答案:D

第6题:

You want to provide 802.1X access for Windows clients using Junos Pulse as the agent. Which two considerations must you take into account()

A.Junos Pulse out erauth entication uses EAP-PEAP.

B.Junos Pulse ou terauth entication uses EAP-TTLS.

C.Junos Pulse innerauth entication uses EAP-MSCHAP-V2.

D.Theend point must use thenative Microsoft 802.1X supplicant.


参考答案:B, D

第7题:

You are using ADU and are authenticated and associated to an access point. However, you areunable to obtain an IP address. Which of these has caused this problem?()

  • A、invalid SSID
  • B、invalid WEP key
  • C、invalid encryption type
  • D、invalid 802.1X authentication type

正确答案:B

第8题:

On the Junos Pulse Access Control Service, you have created a role called Secret that you only want to provide to users who present a certificate.Using the admin GUI, which two features would you configure to satisfy this requirement?()

A. Sign-in Policy

B. Role Mapping Rule

C. Role Restrictions

D. Trusted Server CA


参考答案:B, C

第9题:

You are charged with implementing a secure wireless installation which will provide Internet access to clientdevices but will not allow communications between wireless clients. In addition to implementing PSPF orpeer-to-peer blocking on the wireless side. Which of the following actions should you perform on the wiredinfrastructure?()

  • A、Take no action, you have achieved your goal.
  • B、Implement a Cisco Secure IPS sensor.
  • C、Implement a protected port on the access switches.
  • D、Implement 802.1X on the switch ports.

正确答案:C

第10题:

Your company has deployed Network Access Protection (NAP).You configure secure wireless access to the network by using 802.1X authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP.  What should you do?()

  • A、Configure all access points as RADIUS clients to the Remediation Servers.
  • B、Configure all access points as RADIUS clients to the Network Policy Server (NPS).
  • C、Create a Network Policy that defines Remote Access Server as a network connection method.
  • D、Create a Network Policy that specifies EAP-TLS as the only available authentication method.

正确答案:B

更多相关问题