3 Months Free Update
3 Months Free Update
3 Months Free Update
In the campus network, employees can use 802.1X, Portal,MAC Address or SACG Way to access. Use different access methods according to different needs to achieve the purpose of user access control.
Regarding the role of each role in the Portal authentication framework, which of the following descriptions are correct? (multiple choice)
Portal page push rules have priority, and the rules with higher priority are matched with the user's authentication information first. If none of the configured rules match, The default rules are used.
Visitors refer to users who need temporary access to the network at a specific location.
Regarding the strategy for checking the screensaver settings, which of the following descriptions arecorrect? (Multiple choice)
In centralized networking, database,SM server,SC server\ AE Servers are centrally installed in the corporate headquarters. This networking method is suitable for companies with a wide geographical distribution of users and a large number of users.
According to the user’s access5W1H Conditions determine access rights andQoS Strategy for5W1Ho[Which of the following descriptions are correct? (Multiple choice)
Regarding the description of the account blacklist, which of thefollowing options is wrong?
For the convenience of visitors, different authentication and master pages can be distributed for different visitors. When configuring the push page strategy, different matching conditions need to be defined, so which of the following options can be used as the limited matching conditions? (Multiple choice)
In the scenario of SACG linkage in bypass mode, only the traffic initiated by the terminal user will pass through the firewall, and the server will return to the terminal in use.
The traffic does not need to go through the firewall y. For the firewall, it belongs to the scenario ofinconsistent traffic back and forth paths, this needs to turn off the session state check function.
If you use a normal account for authentication, which of the following descriptions is wrong?
In some scenarios, ananonymous account can be used for authentication. What are the correct descriptions of the following options for the anonymous account?? (Multiple choice)
Inenterprises where terminal host access control management is relatively strict, administrators hope to bind terminal hosts and accounts to prevent terminal users from accessing the controlled network from unauthorized terminal hosts at will. Regarding thedescription of binding the terminal host and account, which of the following is correct?
The visitor management process includes page customization, account application, user authentication, audit, and logout. After the user successfully applies for an account, he needs to change.
When the account is distributed to users, what stage does the distribution of the account belong to?
Using Agile Controller-Campus for visitor management, users can obtain the account they applied for in a variety of ways, but which of the following are not included A way?
Free mobility is a special access control method, according to the user’s access location, access time, access method and terminal authorization instructions. Set permissions, as long as the user’s access conditions remain unchanged, the permissions and network experience after accessing the network--To q
Agile Controller-Campus All components are supported Windows System and Linux system.
VIP Experience guarantee, from which two aspects are the main guaranteesVIP User experience? (Multiple choice)
After configuring theannouncement,Agile Controller-Campus The system cannot assign this announcement to which of the following objects?
Location refers to the end user's use AC-Campus The terminal environment when accessing the controlled network office. Which of the following options is correct for the description of the place?
The following is the 802.1X access control switch configuration:
[S5720]dot1x authentication-method eap
[S5720-GigabitEthernet0/0/1] port link-type access
[S5720-GigabitEthemet0/0/1] port default vlan 11
[S5720-GigabitEthernet0/0/1] authentication dot1x
Assuming that GE0/0/1 is connected to user 1 and user 2through the HUB, which of the following options is correct?
Guest management is Agile Controller-Campus Important function of, regarding visitor management, which of the following statements are correct? (Multiple choice)
MAC Bypass authentication means that after the terminal is connected to the network, the access control device automatically obtains the terminal MAC Address, which is sent to RADIUS The serverperforms euverification.
Deploying on Windows platform, using SQL Server database About the HA function of Agile Cotoller-Campus, which of the following descriptions Is it correct? (multiple choice)
Regarding the description of the security zone in the Agile Controller-Campus, which of the following options are correct? (multiple choice)
In the park, users frequently enter and leave the wireless signal coverage area due to office needs. If youneed to ensure the user's Internet experience, after the user passes an authentication, when he accesses the network again, no important authentication is required:Which of the following authentication methods is recommended?
Which of the following series of devices does not support the function of accompanying business?
Which of the following options is not a challenge brought by mobile office?
When deploying the Agile Controller-Campus, the high-reliability solution of the Windows+SQL Server platform is adopted. Which of the following components is not supported for deployment?
Visitor management can authorize visitors based on their account number,time, location, terminal type, access method, etc., and can also push personalized pages to visitors based on time, location, and terminal type.
In the terminal host check strategy, you can check whether the importantsubkeys and key values ??of the registry meet the requirements to control the terminal host's Access, which of the following check results will be recorded as violations? (multiple choice)
Typical application scenarios of terminal security include: Desktop management, illegal outreach and computer peripheral management.
Which of the following options are right 802. 1X The description of the access process is correct? (Multiple choice).
Use on access control equipment test-aaa Command test and Radius When the server is connected, the running result shows a timeout, which may be caused by incorrect account or password configuration.
In a WLAN network, when the AP is in monitoring mode, what kind of packets does the AP use to determine the device type?
An account can only belong toone user group, that is, a user can only belong to one department.
Regarding the definition of WIPS/WIDS, which of the following statements is correct?
Identity authentication determines whether to allow access by identifying the identity of the access device or user.
Import the user information of the AD server on the Agile Controller-Campus to realize the user's access authentication. If the user is in the Agile.
The user information is not found on the Controller-Campus. Which of the following actions will be performed in the next step?
In the terminal security management, the blackand white list mode is used to check the terminal host software installation status. Which of the following situations is a compliant behavior?
About the hardware SACG Certification deployment scenarios, which of the following descriptions are correct? (Multiple choice)
Jailbroken mobile terminal\Mobile terminals with non-compliant applications installed or terminals with non-compliant lock screen passwords connecting to the corporate network for office operations are not safe for companies. Any 0fice How to solve the problem of mobile office system?