Typical application scenarios of terminal security include desktop management, illegal outreach and computer peripheral management.

Typical application scenarios of terminal security include desktop management, illegal outreach and computer peripheral management.A . TrueB . FalseView AnswerAnswer: A

March 5, 2019 No Comments READ MORE +

Which of the following is correct for the roles of Portal authentication system?

Which of the following is correct for the roles of Portal authentication system?A . The client is Any Office software.B . The role of portal server is to receive the client authentication request, provide free portal service and authentication interface and interact with the access device to authenticate the client.C...

February 28, 2019 No Comments READ MORE +

Aopt user isolation technology in WLAN networking environment, which of the following statements is wrong?

Aopt user isolation technology in WLAN networking environment, which of the following statements is wrong?A . User isolation between groups means that users in different groups can't communicate with each other, and internal users in the same group can communicateB . Isolation in user groups means that users in the...

February 27, 2019 No Comments READ MORE +

Mobile smart phone and tablet users establish IPSec encryption tunnel with AE through Any Office client. After passing authentication and compliance checks, they access enterprise services.

Mobile smart phone and tablet users establish IPSec encryption tunnel with AE through Any Office client. After passing authentication and compliance checks, they access enterprise services.A . TrueB . FalseView AnswerAnswer: B

February 18, 2019 No Comments READ MORE +

This fault may be caused by which reason?

A network use Portal authentication, when the user accesses, he finds that the user name/password is not entered in the pushed Web page. This fault may be caused by which reason?A . There is no corresponding user on Agile Controller-Campus.B . Switch AAA configured wrong.C . The switch does not...

February 12, 2019 No Comments READ MORE +

Before the user authentication, when the access control device receives HTTP request from the user and the resource is not the Portal server authentication URL, how does the admission control device handle it?

When use local guest account authentication, Portal authentication is usually used to push the authentication page to the visitor. Before the user authentication, when the access control device receives HTTP request from the user and the resource is not the Portal server authentication URL, how does the admission control device...

January 22, 2019 No Comments READ MORE +

Which of the following are correct about hardware SACG authentication deployment scenario? (Multiple choices)

Which of the following are correct about hardware SACG authentication deployment scenario? (Multiple choices)A . SACG authentication is generally used in stable network scenarios where wired admission control is performed.B . SACG authentication is generally used in scenarios where new networks are set up for wireless admission control.C . SACG...

January 21, 2019 No Comments READ MORE +

When manage guest accounts, you need to create guest account policy and set account creation method. Which of the following descriptions is incorrect for account creation?

When manage guest accounts, you need to create guest account policy and set account creation method. Which of the following descriptions is incorrect for account creation?A . When you add accounts individually, you can select individual creation.B . If the number of users is large, you can create them in...

January 20, 2019 No Comments READ MORE +

BYOD solution provide products and systems cover terminals, networks, security, application and management, include serialized BYOD devices, wireless network systems, network access security, VPN gateways, terminal security client software, authentication systems, mobile device management (MDM), mobile eSpace UC, etc.

BYOD solution provide products and systems cover terminals, networks, security, application and management, include serialized BYOD devices, wireless network systems, network access security, VPN gateways, terminal security client software, authentication systems, mobile device management (MDM), mobile eSpace UC, etc.A . TrueB . FalseView AnswerAnswer: A

January 18, 2019 No Comments READ MORE +

Which of the following are correct about 802.1X access process? (Multiple choices)

Which of the following are correct about 802.1X access process? (Multiple choices)A . Throughout the authentication process, the terminal exchanges information through the server and EAP packets.B . The terminal exchanges EAP packets with the 802.1X switch. The 802.1X switch and the server use Radius packets exchange information.C . 802.1X...

January 3, 2019 No Comments READ MORE +