Identity authentication determines whether to allow access by identifying the identity of the access device or user.

Identity authentication determines whether to allow access by identifying the identity of the access device or user.A . TrueB . FalseView AnswerAnswer: A

June 29, 2022 No Comments READ MORE +

The products and systems provided by BYOD solutions cover many fields such as terminal, network, security, application, and management, including: serialized BYOD equipment, wireless network system, network access security, VPN gateway, terminal security client software, Authentication system, mobile device management (MDM), mobile eSpace UC, etc.

The products and systems provided by BYOD solutions cover many fields such as terminal, network, security, application, and management, including: serialized BYOD equipment, wireless network system, network access security, VPN gateway, terminal security client software, Authentication system, mobile device management (MDM), mobile eSpace UC, etc.A . TrueB . FalseView AnswerAnswer:...

June 29, 2022 No Comments READ MORE +

Which of the following methods can be used for enterprise terminal security to be protected?

Which of the following methods can be used for enterprise terminal security to be protected?A . Admission ControlB . Encrypted AccessC . Business isolationD . Audit BillingView AnswerAnswer: A

June 28, 2022 No Comments READ MORE +

When the Agile Controller-Campus acts as a RADIUS server for authentication, what ports need to be configured for authentication on the admission control device?

When the Agile Controller-Campus acts as a RADIUS server for authentication, what ports need to be configured for authentication on the admission control device?A . 1812B . 1813C . 8443D . 8080View AnswerAnswer: A

June 28, 2022 No Comments READ MORE +

MAC authentication means that in the 802.1X authentication environment, when the terminal does not respond to the 802.1X authentication request from the access control device after accessing the network, the access control device automatically obtains the terminal's MAC address and sends it as a credential for accessing the network to the RADIUS server for verification.

MAC authentication means that in the 802.1X authentication environment, when the terminal does not respond to the 802.1X authentication request from the access control device after accessing the network, the access control device automatically obtains the terminal's MAC address and sends it as a credential for accessing the network to...

June 28, 2022 No Comments READ MORE +

In Portal authentication, which of the following parameters must be configured on the switch? (Multiple Choice)

In Portal authentication, which of the following parameters must be configured on the switch? (Multiple Choice)A . Portal server IPB . Portal page URLC . shared-keyD . Portal protocol versionView AnswerAnswer: ABC

June 27, 2022 No Comments READ MORE +

When using the test-aaa command on the access control device to test the connectivity with the Radius server, the running result shows a timeout, which may be caused by incorrect account or password configuration.

When using the test-aaa command on the access control device to test the connectivity with the Radius server, the running result shows a timeout, which may be caused by incorrect account or password configuration.A . TrueB . FalseView AnswerAnswer: B

June 27, 2022 No Comments READ MORE +

Which of the following is true about the order of priority?

When allocating various services according to the user group, account and terminal IP address range, if the same service (except the announcement service) is allocated to the user group, account and terminal IP address range, the business assigned to the highest priority will take effect. Which of the following is...

June 27, 2022 No Comments READ MORE +

When deploying wired 802.1X authentication, if the admission control device is deployed at the aggregation layer, this deployment method has the characteristics of high security performance, many management devices, and complex management.

When deploying wired 802.1X authentication, if the admission control device is deployed at the aggregation layer, this deployment method has the characteristics of high security performance, many management devices, and complex management.A . TrueB . FalseView AnswerAnswer: B

June 27, 2022 No Comments READ MORE +

For the description of the account blacklist, which of the following options is incorrect?

For the description of the account blacklist, which of the following options is incorrect?A . The automatic account lockout and manual account lockout functions cannot be enabled at the same time.B . For automatic account lockout, within a limited time, the account will be automatically locked if the number of...

June 26, 2022 No Comments READ MORE +