an ACE server
a wireless network
an Ethernet switch
Odyssey Access Client
第1题:
You must configure access to the corporate network for employees using a client access method. Users require IPsec tunneling to protected resources and an 802.1X supplicant. Users will access the network using Windows platforms.Which two client access methods would support these requirements?()
第2题:
In the Company wireless LAN, what is the function of the Service Set Identifier (SSID)?()
第3题:
You work as a network administrator at, You have been asked to configure 802.1x port-based authentication. You notice that the client workstation is not compatible with 802.1x port-based authentication. What supported authentication server should be chosen?()
第4题:
What is the primary purpose of creating a Location Group Policy? ()
第5题:
What will serve as a RADIUS Client to the Infranet Controller for 802.1x authentication? ()
第6题:
You need to design an authentication solution for the wireless network. Your solution must meet the security requirements. What should you do?()
第7题:
The SSID must match on both the Company client and the Company access point and provides MAC Address Authentication to authenticate the client to the access point.
The SSID should be configured on the Company client site only and provides data-privacy functions and authentication to the access point.
The SSID must match on both the Company client and the Company access point and provides encryption keys for authentication to the access point.
The SSID must match on both the Company client and the Company access point. The SSID is advertised in plain-text in the access point beacon messages.
None of the other alternatives apply
第8题:
between the RADIUS and the access point
between the client’s VLAN and the WLSE
between the native VLAN and the WLSE
between the client’s VLAN and the RADIUS
第9题:
association request/response, probe request/response, authentication request/response
association request/response, authentication request/response, probe request/response
probe request/response, authentication request/response, association request/response
probe request/response, association request/response, authentication request/response
None of the other alternatives apply
第10题:
Download the Macintosh installer from the Junos Pulse Access Control Service and manually install the Odyssey Access Client.
Provide the user with the sign-in URL you set up for Macintosh users; this will push the Odyssey Access Client to the user's machine.
Assist the user to configure the Macintosh native supplicant and provide the AppleScnptto expose the EAP-JUAC inner authentication protocol.
Configure the user's role to install the Java agent, which is a requirement to allow the Junos Pulse Access Control Service to deploy the Odyssey Access Client.
第11题:
Configure all access points as RADIUS clients to the Remediation Servers
Configure all access points as RADIUS clients to the Network Policy Server (NPS)
Create a Network Policy that defines Remote Access Server as a network connection method
Create a Network Policy that specifies EAP-TLS as the only availible authentication method.
第12题:
Configure all access points as RADIUS clients to the Remediation Servers.
Configure all access points as RADIUS clients to the Network Policy Server (NPS).
Create a Network Policy that defines Remote Access Server as a network connection method.
Create a Network Policy that specifies EAP-TLS as the only available authentication method.
第13题:
A users Junos Pulse client uses 802.1X to access a wired network and is failing to authenticate. You run a packet capture from the users PC and notice that immediately after the client machine sends an EAPoL-start packet, an EAP-failure packet is returned. You review the RADIUS troubleshooting logs on the MAG Series device and do not see any authentication attempts from the user. Other users on the same Ethernet switch are successfully authenticating. Which device is sending the EAP-failure packet to the workstation?()
第14题:
When configuring Cisco Secure ACS to support wireless EAP authentication, which device must be configured as a AAA client?()
第15题:
When using RADIUS as an external authentication method for 802.1X authentication for the Junos Pulse Access Control Service, what must you do to ensure that the RADIUS authentication works properly?()
第16题:
You have three classes of users on your network: employee, contractor, and IT administrator. You configure the Junos Pulse Access Control Service to assign roles to each user class and require that a specific wireless SSID be preconfigured for the Odyssey Access Client based on the role. Which configuration method should you use to satisfy this scenario?()
第17题:
Your company has deployed Network Access Protection (NAP).You configure secure wireless access to the network by using 802.1X authentication from any access point.You need to ensure that all client computers that access the network are evaluated by NAP. What should you do?()
第18题:
Your company has deployed Network Access Protection (NAP). You configure secure wireless access to the network by using 802.1x authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP. what should you do()?
第19题:
You do not need to configure a RADIUS client policy.
You must know the exact model number of the Infranet Enforcer.
You must specify the NACN password of the device in the RADIUS client policy.
You do not need to designate a location group to which the Infranet Enforcer will belong.
第20题:
It indicates that the radio of the client adapter is disabled
It indicates that the client adapter is not associated to an access point or another client
It indicates that the client adapter is associated to an access point or another client, but the user is not EAP authenticated
It indicates that the client adapter is associated to an access point or another client, that the user is authenticated if the client adapter is configured for EAP authentication, and that the signal strength is excellent or good
It indicates that the client adapter is associated to an access point or another client, that the user is authenticated if the client adapter is configured for EAP authentication, and that the signal strength is fair
It indicates that the client adapter is associated to an access point or another client, that the user is authenticated if the client adapter is configured for EAP authentication, and that the signal strength is poor
第21题:
It indicates that the radio of the client adapter is disabled.
It indicates that the client adapter is not associated to an access point or another client.
It indicates that the client adapter is associated to an access point or another client, but the user is not EAP authenticated.
It indicates that the client adapter is associated to an access point or another client, that the user is authenticated if the client adapter is configured for EAP authentication, and that the signal strength is excellent or good.
It indicates that the client adapter is associated to an access point or another client, that the user is authenticated if the client adapter is configured for EAP authentication, and that the signal strength is fair.
It indicates that the client adapter is associated to an access point or another client, that the user is authenticated if the client adapter is configured for EAP authentication, and that the signal strength is poor.
第22题:
Create wireless VPNs using L2TP/IPSec between the client computers to the wireless access point
Configure IEEE 802.1x authentication with smart cards
Configure the wireless network to use Wired Equivalent Privacy (WEP)
Install and configure an Internet Authentication Service (IAS) server
第23题:
The RADIUS server
The EAPoL server
The workstation's network adapter
The Ethernet switch