niusouti.com

单选题What will serve as a RADIUS Client to the Infranet Controller for 802.1x authentication? ()A an ACE serverB a wireless networkC an Ethernet switchD Odyssey Access Client

题目
单选题
What will serve as a RADIUS Client to the Infranet Controller for 802.1x authentication? ()
A

an ACE server

B

a wireless network

C

an Ethernet switch

D

Odyssey Access Client


相似考题
更多“单选题What will serve as a RADIUS Client to the Infranet Controller for 802.1x authentication? ()A an ACE serverB a wireless networkC an Ethernet switchD Odyssey Access Client”相关问题
  • 第1题:

    You must configure access to the corporate network for employees using a client access method. Users require IPsec tunneling to protected resources and an 802.1X supplicant. Users will access the network using Windows platforms.Which two client access methods would support these requirements?()

    • A、Junos Pulse
    • B、Java Agent
    • C、Odyssey Access Client
    • D、Native 802.1X supplicant

    正确答案:A,C

  • 第2题:

    In the Company wireless LAN,  what is the function of the Service Set Identifier (SSID)?()

    • A、 The SSID must match on both the Company client and the Company access point and provides  MAC Address Authentication to authenticate the client to the access point.
    • B、 The SSID should be configured on the Company client site only and provides data-privacy  functions and authentication to the access point.
    • C、 The SSID must match on both the Company client and the Company access point and provides encryption keys for authentication to the access point.
    • D、 The SSID must match on both the Company client and the Company access point. The SSID is  advertised in plain-text in the access point beacon messages.  
    • E、 None of the other alternatives apply

    正确答案:D

  • 第3题:

    You work as a network administrator at, You have been asked to configure 802.1x port-based authentication. You notice that the client workstation is not compatible with 802.1x port-based authentication.  What supported authentication server should be chosen?()

    • A、TACACS with LEAP extensions
    • B、RADIUS with EAP extensions
    • C、TACACS+
    • D、LDAP

    正确答案:B

  • 第4题:

    What is the primary purpose of creating a Location Group Policy? ()

    • A、to associate more than one realm with an authentication server
    • B、to logically group network access devices and associate them with specific sign-in policies
    • C、to allow or prevent users from accessing resources in specific locations on the network
    • D、to define the URL that users of network access devices can use to access the Infranet Controller

    正确答案:B

  • 第5题:

    What will serve as a RADIUS Client to the Infranet Controller for 802.1x authentication? ()

    • A、an ACE server
    • B、a wireless network
    • C、an Ethernet switch
    • D、Odyssey Access Client

    正确答案:C

  • 第6题:

    You need to design an authentication solution for the wireless network. Your solution must meet the security requirements. What should you do?()

    • A、Create wireless VPNs using L2TP/IPSec between the client computers to the wireless access point
    • B、Configure IEEE 802.1x authentication with smart cards
    • C、Configure the wireless network to use Wired Equivalent Privacy (WEP)
    • D、Install and configure an Internet Authentication Service (IAS) server

    正确答案:C

  • 第7题:

    单选题
    In the Company wireless LAN,  what is the function of the Service Set Identifier (SSID)?()
    A

     The SSID must match on both the Company client and the Company access point and provides  MAC Address Authentication to authenticate the client to the access point.

    B

     The SSID should be configured on the Company client site only and provides data-privacy  functions and authentication to the access point.

    C

     The SSID must match on both the Company client and the Company access point and provides encryption keys for authentication to the access point.

    D

     The SSID must match on both the Company client and the Company access point. The SSID is  advertised in plain-text in the access point beacon messages.  

    E

     None of the other alternatives apply


    正确答案: D
    解析: 暂无解析

  • 第8题:

    单选题
    An 802.1X client cannot authenticate to an autonomous access point configured for multiple VLANs. The native VLAN does not have an SSID configured. Which one of the following links being down would prevent the clients from authenticating?()
    A

    between the RADIUS and the access point

    B

    between the client’s VLAN and the WLSE

    C

    between the native VLAN and the WLSE

    D

    between the client’s VLAN and the RADIUS


    正确答案: C
    解析: 暂无解析

  • 第9题:

    单选题
    On the wireless LAN, A client is searching for an access point (AP). What is the correct processorder that this client and access point goes through in order to create a connection?()
    A

    association request/response, probe request/response, authentication request/response

    B

    association request/response, authentication request/response, probe request/response

    C

    probe request/response, authentication request/response, association request/response

    D

    probe request/response, association request/response, authentication request/response

    E

    None of the other alternatives apply


    正确答案: E
    解析: 暂无解析

  • 第10题:

    单选题
    A user calls the help desk and explains that they just purchased a Macintosh computer. When they log into the network, the Odyssey Access Client is not automatically downloaded as it was when the user used their Windows PC.How do you resolve this issue?()
    A

    Download the Macintosh installer from the Junos Pulse Access Control Service and manually install the Odyssey Access Client.

    B

    Provide the user with the sign-in URL you set up for Macintosh users; this will push the Odyssey Access Client to the user's machine.

    C

    Assist the user to configure the Macintosh native supplicant and provide the AppleScnptto expose the EAP-JUAC inner authentication protocol.

    D

    Configure the user's role to install the Java agent, which is a requirement to allow the Junos Pulse Access Control Service to deploy the Odyssey Access Client.


    正确答案: B
    解析: 暂无解析

  • 第11题:

    单选题
    Your company has deployed Network Access Protection (NAP). You configure secure wireless access to the network by using 802.1x authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP.  what should you do()?
    A

    Configure all access points as RADIUS clients to the Remediation Servers

    B

    Configure all access points as RADIUS clients to the Network Policy Server (NPS)

    C

    Create a Network Policy that defines Remote Access Server as a network connection method

    D

    Create a Network Policy that specifies EAP-TLS as the only availible authentication method.


    正确答案: B
    解析: 暂无解析

  • 第12题:

    单选题
    Your company has deployed Network Access Protection (NAP).You configure secure wireless access to the network by using 802.1X authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP.  What should you do?()
    A

    Configure all access points as RADIUS clients to the Remediation Servers.

    B

    Configure all access points as RADIUS clients to the Network Policy Server (NPS).

    C

    Create a Network Policy that defines Remote Access Server as a network connection method.

    D

    Create a Network Policy that specifies EAP-TLS as the only available authentication method.


    正确答案: D
    解析: 暂无解析

  • 第13题:

    A users Junos Pulse client uses 802.1X to access a wired network and is failing to authenticate. You run a packet capture from the users PC and notice that immediately after the client machine sends an EAPoL-start packet, an EAP-failure packet is returned. You review the RADIUS troubleshooting logs on the MAG Series device and do not see any authentication attempts from the user. Other users on the same Ethernet switch are successfully authenticating. Which device is sending the EAP-failure packet to the workstation?()

    • A、The RADIUS server
    • B、The EAPoL server
    • C、The workstation's network adapter
    • D、The Ethernet switch

    正确答案:D

  • 第14题:

    When configuring Cisco Secure ACS to support wireless EAP authentication, which device must be configured as a AAA client?()

    • A、Wireless Control System
    • B、wireless clients
    • C、wireless controllers
    • D、controller-based access points
    • E、Location Appliance

    正确答案:C

  • 第15题:

    When using RADIUS as an external authentication method for 802.1X authentication for the Junos Pulse Access Control Service, what must you do to ensure that the RADIUS authentication works properly?()

    • A、Configure IP helper to forward the authentication requests from the clients to the external RADIUS server
    • B、Configure the supplicant as anexternal authentication server
    • C、Configure RADIUS proxy on the realm
    • D、Specify the correct RADIUS port 389 on the Junos Pulse Access Control Service

    正确答案:C

  • 第16题:

    You have three classes of users on your network: employee, contractor, and IT administrator. You configure the Junos Pulse Access Control Service to assign roles to each user class and require that a specific wireless SSID be preconfigured for the Odyssey Access Client based on the role. Which configuration method should you use to satisfy this scenario?()

    • A、Create a "Settings Update file" in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under "User Roles" > "Agent" > "Odyssey Settings" > "Preconfigured Installer".
    • B、Configure a wired adapter and assign the required SSID under "User Roles" > "Agent" > "Odyssey Settings".
    • C、Create a script in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under "User Roles" > "Agent" > "Odyssey Settings" > "Preconfigured Installer".
    • D、Create a "Preconfiguration file" in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under "User Roles" > "Agent" > "Odyssey Settings" > "Preconfigured Installer".

    正确答案:A,B,D

  • 第17题:

    Your company has deployed Network Access Protection (NAP).You configure secure wireless access to the network by using 802.1X authentication from any access point.You need to ensure that all client computers that access the network are evaluated by NAP. What should you do?()

    • A、Configure all access points as RADIUS clients to the Remediation Servers.
    • B、Configure all access points as RADIUS clients to the Network Policy Server (NPS).
    • C、Create a Network Policy that defines Remote Access Server as a network connection method. 
    • D、Create a Network Policy that specifies EAP-TLS as the only available authentication method.

    正确答案:B

  • 第18题:

    Your company has deployed Network Access Protection (NAP). You configure secure wireless access to the network by using 802.1x authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP.  what should you do()? 

    • A、Configure all access points as RADIUS clients to the Remediation Servers
    • B、Configure all access points as RADIUS clients to the Network Policy Server (NPS)
    • C、Create a Network Policy that defines Remote Access Server as a network connection method
    • D、Create a Network Policy that specifies EAP-TLS as the only availible authentication method.

    正确答案:B

  • 第19题:

    单选题
    Which statement is correct about defining an Infranet Enforcer for use as a RADIUS Client? ()
    A

    You do not need to configure a RADIUS client policy.

    B

    You must know the exact model number of the Infranet Enforcer.

    C

    You must specify the NACN password of the device in the RADIUS client policy.

    D

    You do not need to designate a location group to which the Infranet Enforcer will belong.


    正确答案: C
    解析: 暂无解析

  • 第20题:

    单选题
    Refer to the exhibit. A Cisco Aironet Wireless LAN Client Adapter has been installed and configured through the ADU on the PC. The Aironet System Tray Utility (ASTU) has been enabled during the installation and the icon appears in the system tray area in the lower right of the desktop. What is thesignificance of the icon?()
    A

    It indicates that the radio of the client adapter is disabled

    B

    It indicates that the client adapter is not associated to an access point or another client

    C

    It indicates that the client adapter is associated to an access point or another client, but the user is not EAP authenticated

    D

    It indicates that the client adapter is associated to an access point or another client, that the user is authenticated if the client adapter is configured for EAP authentication, and that the signal strength is excellent or good

    E

    It indicates that the client adapter is associated to an access point or another client, that the user is authenticated if the client adapter is configured for EAP authentication, and that the signal strength is fair

    F

    It indicates that the client adapter is associated to an access point or another client, that the user is authenticated if the client adapter is configured for EAP authentication, and that the signal strength is poor


    正确答案: F
    解析: 暂无解析

  • 第21题:

    单选题
    Refer to the exhibit. A Cisco Aironet Wireless LAN Client Adapter has been installed and configured  through the ADU on the PC. The Aironet System Tray Utility (ASTU) has been enabled during the  installation and the icon appears in the system tray area in the lower right of the desktop. What is the  significance of the icon?()
    A

     It indicates that the radio of the client adapter is disabled.

    B

     It indicates that the client adapter is not associated to an access point or another client. 

    C

     It indicates that the client adapter is associated to an access point or another client, but the user is not  EAP authenticated.

    D

     It indicates that the client adapter is associated to an access point or another client, that the user is  authenticated if the client adapter is configured for EAP authentication, and that the signal strength is  excellent or good.

    E

     It indicates that the client adapter is associated to an access point or another client, that the user is  authenticated if the client adapter is configured for EAP authentication, and that the signal strength is fair.

    F

     It indicates that the client adapter is associated to an access point or another client, that the user is  authenticated if the client adapter is configured for EAP authentication, and that the signal strength is poor.


    正确答案: F
    解析: 暂无解析

  • 第22题:

    单选题
    You need to design an authentication solution for the wireless network. Your solution must meet the security requirements. What should you do?()
    A

    Create wireless VPNs using L2TP/IPSec between the client computers to the wireless access point

    B

    Configure IEEE 802.1x authentication with smart cards

    C

    Configure the wireless network to use Wired Equivalent Privacy (WEP)

    D

    Install and configure an Internet Authentication Service (IAS) server


    正确答案: A
    解析: 暂无解析

  • 第23题:

    单选题
    A users Junos Pulse client uses 802.1X to access a wired network and is failing to authenticate. You run a packet capture from the users PC and notice that immediately after the client machine sends an EAPoL-start packet, an EAP-failure packet is returned. You review the RADIUS troubleshooting logs on the MAG Series device and do not see any authentication attempts from the user. Other users on the same Ethernet switch are successfully authenticating. Which device is sending the EAP-failure packet to the workstation?()
    A

    The RADIUS server

    B

    The EAPoL server

    C

    The workstation's network adapter

    D

    The Ethernet switch


    正确答案: D
    解析: 暂无解析