更多“单选题Which of the following authentication protocols uses certificates to negotiate access to the network?()A PAPB CHAPC EAP-TLSD Kerberos”相关问题
  • 第1题:

    下面哪条命令是把PPP的验证方式设置为PAP().

    • A、ppp pap
    • B、ppp chap
    • C、ppp authentication-mode pap
    • D、ppp authentication-mode chap

    正确答案:C

  • 第2题:

    What is not a difference between VPN tunnel authentication and per-user authentication?()

    • A、VPN tunnel authentication is part of the IKE specification. 
    • B、VPN tunnel authentication does not control which end user can use the IPSec SA (VPN tunnel).
    • C、User authentication is used to control access for a specific user ID, and can be used with or without a VPN tunnel for network access authorization. 
    • D、802.1X with EAP-TLS (X.509 certificates) can be used to authenticate an IPSec tunnel.

    正确答案:D

  • 第3题:

    Which of the following protocols uses port 80?()

    • A、 SMTP
    • B、 HTTP
    • C、 HTTPS
    • D、 FTP

    正确答案:B

  • 第4题:

    pany is implementing 802.1X in order to increase network security. In the use of 802.1X   access control,  which three protocols are allowed through the switch port before authentication  takes place? ()

    • A、 EAP-over-LAN
    • B、 EAP MD5
    • C、 STP
    • D、 protocols not filtered by an ACL
    • E、 CDP
    • F、 TACACS+

    正确答案:A,C,E

  • 第5题:

    Which of the following protocols uses UDP to transfer files?()

    • A、FTP
    • B、SFTP
    • C、SMTP
    • D、TFTP

    正确答案:D

  • 第6题:

    Which of the following is the MOST likely authentication scheme used in 802.1x?()

    • A、CHAP
    • B、RADIUS
    • C、TACACS+
    • D、Kerberos

    正确答案:B

  • 第7题:

    单选题
    Which of the following protocols should be used to monitor network performance?()
    A

    SNTP

    B

    SMTP

    C

    HTTP

    D

    SNMP


    正确答案: A
    解析: 暂无解析

  • 第8题:

    单选题
    Which one of the following protocols uses both UDP and TCP ports for the transport layer operation?()
    A

    FTP

    B

    TFTP

    C

    SMTP

    D

    Telnet

    E

    DNS


    正确答案: A
    解析: 暂无解析

  • 第9题:

    单选题
    The Testking network is implementing dialup services for their remote employees.Testking uses several different Layer 3 protocols on the network. Authentication ofthe users connecting to the network is required for security. Additionally, some employees will be dialing long distance and will need callback support.Which protocol is the best choice for these remote access services?()
    A

    802.1

    B

    Framerelay

    C

    HDLC

    D

    PPP

    E

    SLIP

    F

    PAP


    正确答案: C
    解析: 暂无解析

  • 第10题:

    单选题
    What is not a difference between VPN tunnel authentication and per-user authentication?()
    A

    VPN tunnel authentication is part of the IKE specification. 

    B

    VPN tunnel authentication does not control which end user can use the IPSec SA (VPN tunnel).

    C

    User authentication is used to control access for a specific user ID, and can be used with or without a VPN tunnel for network access authorization. 

    D

    802.1X with EAP-TLS (X.509 certificates) can be used to authenticate an IPSec tunnel.


    正确答案: A
    解析: 暂无解析

  • 第11题:

    单选题
    Your network contains a single Active Directory domain. All domain controllers run Windows Server   2008 R2. There are 1,000 client computers that run Windows 7 and that are connected to managedswitches.   You need to recommend a strategy for network access that meets the following requirements:   èUsers are unable to bypass network access restrictions.   èOnly client computers that have up-to-date service packs installed can access the network.   èOnly client computers that have up-to-date anti-malware software installed can access the network.   What should you recommend?()
    A

    Implement Network Access Protection (NAP) that uses DHCP enforcement.

    B

    Implement Network Access Protection (NAP) that uses 802.1x enforcement.

    C

    Implement a Network Policy Server (NPS), and enable IPsec on the domain controllers.

    D

    Implement a Network Policy Server (NPS), and enable Remote Authentication Dial-In User Service  (RADIUS) authentication on the managed switches.


    正确答案: C
    解析: 暂无解析

  • 第12题:

    单选题
    Which of the following protocols uses both TCP and UDP ports?()
    A

    SMTP

    B

    Telnet

    C

    FTP

    D

    DNS


    正确答案: D
    解析: 暂无解析

  • 第13题:

    Which two primary port authentication protocols are used with VSANs?()

    • A、SPAP
    • B、CHAP
    • C、DHCHAP
    • D、ESP

    正确答案:B,C

  • 第14题:

    Which of the following authentication protocols uses certificates to negotiate access to the network?()

    • A、PAP
    • B、CHAP
    • C、EAP-TLS
    • D、Kerberos

    正确答案:C

  • 第15题:

    Client association using EAP-Cisco Wireless (LEAP) is failing, but EAP-PEAP is functioning on an autonomous access point. Which of the following needs to be enabled on the access point so EAP-Cisco Wireless (LEAP) is enabled?()

    • A、open authentication plus MAC
    • B、open authentication plus EAP
    • C、shared key
    • D、network EAP

    正确答案:D

  • 第16题:

    Kerberos is a form of user authentication that:()

    • A、Provides users access to network resources.
    • B、Performs router commands after user authentication.
    • C、Provides users with remote access only capabilities.
    • D、Does not require an authentication server

    正确答案:A

  • 第17题:

    A technician installed a new wireless access point on an existing small office home office (SOHO) network with a selective security option enabled. All wireless computers connect to the new network except one computer that cannot connect to the wireless network. Which of the following is the cause?()

    • A、The network uses MAC filtering
    • B、The network uses WEP
    • C、The network uses SSID broadcast
    • D、The network uses WPA

    正确答案:A

  • 第18题:

    单选题
    A technician installed a new wireless access point on an existing small office home office (SOHO) network with a selective security option enabled. All wireless computers connect to the new network except one computer that cannot connect to the wireless network. Which of the following is the cause?()
    A

    The network uses MAC filtering

    B

    The network uses WEP

    C

    The network uses SSID broadcast

    D

    The network uses WPA


    正确答案: D
    解析: 暂无解析

  • 第19题:

    单选题
    Which of the following protocols is the LEAST secure and should be avoided on a wireless network?()
    A

    WEP

    B

    PEAP

    C

    WPA

    D

    TKIP


    正确答案: A
    解析: 暂无解析

  • 第20题:

    单选题
    Kerberos is a form of user authentication that:()
    A

    Provides users access to network resources.

    B

    Performs router commands after user authentication.

    C

    Provides users with remote access only capabilities.

    D

    Does not require an authentication server


    正确答案: D
    解析: 暂无解析

  • 第21题:

    单选题
    Which of the following protocols uses port 80?()
    A

     SMTP

    B

     HTTP

    C

     HTTPS

    D

     FTP


    正确答案: D
    解析: 暂无解析

  • 第22题:

    单选题
    Which of the following protocols uses UDP to transfer files?()
    A

    FTP

    B

    SFTP

    C

    SMTP

    D

    TFTP


    正确答案: B
    解析: 暂无解析

  • 第23题:

    单选题
    Which of the following authentication protocols uses certificates to negotiate access to the network?()
    A

    PAP

    B

    CHAP

    C

    EAP-TLS

    D

    Kerberos


    正确答案: C
    解析: 暂无解析

  • 第24题:

    单选题
    Which of the following network protocols is used to ensure consistent time across network devices on the domain?()
    A

    NTP

    B

    FTP

    C

    RTP

    D

    IGMP


    正确答案: B
    解析: 暂无解析