3 Months Free Update
3 Months Free Update
3 Months Free Update
In the WLAN wireless access scenario, which of the following network security technologies belong to user access security? (Multiple choice)
Which of the following options is for Portal The statement of the gateway access process is correct?
For the scenario where the authentication server adopts distributed deployment, which of the following descriptions are correct? (multiple choice)
On WIDS functional WLAN Regarding the judgment of illegal devices in the network, which of the following statements are correct? (Multiple choice)
Location refers to the end user's use AC-Campus The terminal environment when accessing the controlled network office. Which of the following options is correct for the description of the place?
Portal authentication on the Agile Controller-Campus has been configured and is correct.
Configure the following commands on the access control switch:
[S5720] authentication free-rule 1 destination ip 10.1.31.78 mask 255.255. 255.255
Which of the following options are correct? (multiple choice)
In the process of establishing CAPWAP channel between AP and AC, AP and AC negotiate to establish CAPWAP tunnel. In this process, CAPWAP tunnel is established.
Use DTLS to encrypt and transmit UDP packets. What are the encryption methods supported by DTLS? (multiple choice)
The user accesses the network through the network access device, and the third-party RADIUS server authenticates and authorizes the user. Regarding the certification process, which of the following options is wrong?
Configuring DNS server of RBL feature on USG, which of the following statement is not correct?
There are two ways for Business Manager to download patches. When using hierarchical deployment, you can download patches directly from the management center or through Microsoft patches Server download patch.
MAC Certification refers to 802.1x In the protocol authentication environment, the terminal does not respond to the connection control device after accessing the network 802.1x When protocol authentication is requested, the access control does not automatically obtain the terminal’s MAC The address is sent as a credential to access the network RADIUS The server performs verification.
When deploying the Agile Controller-Campus, the high-reliability solution of the Windows+SQL Server platform is adopted. Which of the following components is not supported for deployment?
Administrator creates the correct IPS strategy, applied to domain or inter-domain , but found that no matter in the IPS signature set movement is blocking or alarm, when the invasion attack, only produce the
alarm.
What is the reason for this problem?
An enterprise has a large number of mobile office employees, and a mobile office system needs to be deployed to manage the employees. The number of employees in this enterprise exceeds 2000 People, and the employees’ working areas are distributed all over the country. In order to facilitate management, which deployment method is adopted?
URL filtering, according to the classification of the remote or local classification, the user can create multiple urls strategy, determines the corresponding processing action in URL strategies, a URL strategy was applied to the domain, which can realize the corresponding URL filtering.
After the user is successfully authenticated, Agile Controller-Campus Which of the following actions can be performed on the user(Multiple choice)
URL filtering, remote classification list provided and maintained by a third-party classification servers, devices can be synchronous updated automatically or manually from third-party classification servers.
Which of the following options is Agile Controller-Campus middle SC The main function of the component?
What do the common virus behavior characteristics include?(select 3 answers)
In the visitor reception hall of a company, there are many temporary terminal users, and the administrator hopes that users do not need to provide any account numbers and passwords. access Internet. Which of the following authentication methods can be used for access?
Use on access control equipment test-aaa Command test and Radius When the server is connected, the running result shows a timeout, which may be caused by incorrect account or password configuration.
Enterprise Intranet users access to the Internet, what may cause the UFL filtering function failure? (Select 3 answers)
In the terminal security management, the black and white list mode is used to check the terminal host software installation status. Which of the following situations is a compliant behavior?