单选题A customer is trying to decide which 802.1X inner protocol to use on their network. The customer requires that nopasswords be sent across the network in plain text, that the protocol be supported by the Windows native supplicant,and that the protocol s

题目
单选题
A customer is trying to decide which 802.1X inner protocol to use on their network. The customer requires that nopasswords be sent across the network in plain text, that the protocol be supported by the Windows native supplicant,and that the protocol supports password changes at Layer 2. Which protocol would meet the customers needs?()
A

EAP-TLS

B

EAP-MD5

C

PAP

D

EAP-MSCHAPv2


相似考题
更多“单选题A customer is trying to decide which 802.1X inner protocol to use on their network. The customer requires that nopasswords be sent across the network in plain text, that the protocol be supported by the Windows native supplicant,and that the protocol s”相关问题
  • 第1题:

    Which two of these are characteristics of the 802.1Q protocol?()

    A. it is a layer 2 messaging protocol which maintains vlan configurations across network.

    B. it includes an 8-bit field which specifies the priority of a frame.

    C. it is used exclusively for tagging vlan frames and dose not address network reconvergence following switched network topology changes.

    D. it modifies the 802.3 frame header,and thus requires that the FCS be recomputed.

    E. it is a trunking protocol capable of carring untagged frames.


    参考答案:D, E

  • 第2题:

    As a network engineer at Certpaper.com, you are responsible for Certpaper network. Which will benecessarily taken into consideration when implementing Syslogging in your network?()

    • A、Enable the highest level of Syslogging available to ensure you log all possible event messages
    • B、Use SSH to access your Syslog information
    • C、Log all messages to the system buffer so that they can be displayed when accessing the router
    • D、Syncronize clocks on the network with a protocol such as Network Time Protocol

    正确答案:D

  • 第3题:

    For the following statements, which one is perceived as a drawback of implementing Fibre ChannelAuthentication Protocol (FCAP)?()

    • A、It is restricted in size to only three segments
    • B、It requires the use of netBT as the network protocol
    • C、It requires the implementation of IKE
    • D、It relies on an underlying Public Key Infrastructure

    正确答案:D

  • 第4题:

    Which two of these are characteristics of the 802.1Q protocol?()

    • A、it is a layer 2 messaging protocol which maintains vlan configurations across network.
    • B、it includes an 8-bit field which specifies the priority of a frame.
    • C、it is used exclusively for tagging vlan frames and dose not address network reconvergence following switched network topology changes.
    • D、it modifies the 802.3 frame header,and thus requires that the FCS be recomputed.
    • E、it is a trunking protocol capable of carring untagged frames.

    正确答案:D,E

  • 第5题:

    A customer has Windows servers and applications that use block I/O. The customer cannot affordthe cost of a fibre channel infrastructure but still requires shared storage. Which configurationmeets these requirements at the lowest cost?()

    • A、iSCSI HBAs and N3400
    • B、MicrosoftiSCSI initiator and N3400
    • C、MicrosoftiSCSI initiator and DS3400
    • D、SAN04B-R multi-protocol router and DS3400

    正确答案:B

  • 第6题:

    A customer has installed UAC in their network. They have both Windows and Linux endpoints andmust choose a deployment method that everyone can use. Which deployment method allows for multiple platforms? ()

    • A、IPsec enforcement
    • B、802.1X enforcement
    • C、Source IP enforcement
    • D、Odyssey Access Client

    正确答案:C

  • 第7题:

    Which statemetn is true regarding the Network Time Protocol (NTP) on Junos devices?()

    • A、MD5 authenticaton is supported by the Junos OS
    • B、Server mode is not supported by the Junos OS
    • C、The Junos OS can provide a primarytime reference
    • D、The Junos OS does not support the use of a boot server

    正确答案:A

  • 第8题:

    单选题
    You need to choose a routing protocol for a new Testking network. This network will be running IP, IPX, and Appletalk, and you wish to utilize only one routing protocol. Which one would be the best choice?()
    A

    OSPF

    B

    EIGRP

    C

    RIP v2

    D

    IGRP

    E

    RIP v1


    正确答案: B
    解析: 暂无解析

  • 第9题:

    单选题
    Which network protocol does DNS use?()
    A

    FTP

    B

    TFTP

    C

    TCP

    D

    UDP

    E

    SCP


    正确答案: B
    解析: 暂无解析

  • 第10题:

    单选题
    A customer has Windows servers and applications that use block I/O. The customer cannot affordthe cost of a fibre channel infrastructure but still requires shared storage. Which configurationmeets these requirements at the lowest cost?()
    A

    iSCSI HBAs and N3400

    B

    MicrosoftiSCSI initiator and N3400

    C

    MicrosoftiSCSI initiator and DS3400

    D

    SAN04B-R multi-protocol router and DS3400


    正确答案: B
    解析: 暂无解析

  • 第11题:

    单选题
    Your company’s network includes client computers that run Windows 7. You design a wireless network to use Extensible Authentication Protocol-Transport Level Security (EAP-TLS).   The Network Policy Server has a certificate installed.   Client computers are unable to connect to the wireless access points.    You need to enable client computers to connect to the wireless network.   What should you do?()
    A

    Configure client computers to use Protected Extensible Authentication Protocol-Microsoft Challenge Handshake Authentication Protocol version 2 (PEAP-MS-CHAP v2).

    B

    Configure client computers to use Protected Extensible Authentication Protocol-Transport Layer Security (PEAP-TLS).

    C

    Install a certificate in the Trusted Root Certification Authorities certificate store.

    D

    Install a certificate in the Third-Party Root Certification Authorities certificate store.


    正确答案: A
    解析: 暂无解析

  • 第12题:

    单选题
    For the following statements, which one is perceived as a drawback of implementing Fibre ChannelAuthentication Protocol (FCAP)?()
    A

    It is restricted in size to only three segments

    B

    It requires the use of netBT as the network protocol

    C

    It requires the implementation of IKE

    D

    It relies on an underlying Public Key Infrastructure


    正确答案: C
    解析: 暂无解析

  • 第13题:

    A customer is trying to decide which 802.1X inner protocol to use on their network. The customer requires that nopasswords be sent across the network in plain text, that the protocol be supported by the Windows native supplicant,and that the protocol supports password changes at Layer 2. Which protocol would meet the customers needs?()

    • A、EAP-TLS
    • B、EAP-MD5
    • C、PAP
    • D、EAP-MSCHAPv2

    正确答案:D

  • 第14题:

    Which two of these are recommended practices with trunks? ()

    • A、 use ISL encapsulation
    • B、 use 802.1q encapsulation
    • C、 set ISL to desirable and auto with encapsulation negotiate to support ILS protocol negotiation
    • D、 use VTP server mode to support dynamic propagation of VLAN information across the network 
    • E、 set DTP to desirable and desirable with encapsulation negotiate to support DTP protocol negotiation.

    正确答案:B,E

  • 第15题:

    Your customer wants to build a network for a financial trading floor that has a requirement formultiple high-value transactions, which are also vital to the customer. What are the two mostcritical requirements?() (Choose two.)

    • A、no single point of failure
    • B、trading database server location
    • C、redundant application servers location
    • D、deterministic response to all failures
    • E、determine which protocol to use

    正确答案:A,D

  • 第16题:

    Which network protocol does DNS use?()

    • A、FTP
    • B、TFTP
    • C、TCP
    • D、UDP
    • E、SCP

    正确答案:E

  • 第17题:

    Which statement is true regarding the Network Time Protocol (NTP) on Junos devices?()

    • A、MD5 authentication is supported by the Junos OS
    • B、Server mode is not supported by the Junos OS
    • C、The Junos OS can provide a primary time reference
    • D、The Junos OS does not support the use of a boot server

    正确答案:A

  • 第18题:

    A customer is trying to determine which client to deploy. The customer wants to be able to perform Layer 2 authentication as well as connect to the Junos Pulse Secure Access Service.Which client should the customer deploy?()

    • A、Windows native supplicant
    • B、Odyssey Access Client
    • C、Junos Pulse
    • D、Network Connect

    正确答案:C

  • 第19题:

    Your company’s network includes client computers that run Windows 7. You design a wireless network to use Extensible Authentication Protocol-Transport Level Security (EAP-TLS).   The Network Policy Server has a certificate installed.   Client computers are unable to connect to the wireless access points.    You need to enable client computers to connect to the wireless network.   What should you do?()

    • A、Configure client computers to use Protected Extensible Authentication Protocol-Microsoft Challenge Handshake Authentication Protocol version 2 (PEAP-MS-CHAP v2).
    • B、Configure client computers to use Protected Extensible Authentication Protocol-Transport Layer Security (PEAP-TLS).
    • C、Install a certificate in the Trusted Root Certification Authorities certificate store.
    • D、Install a certificate in the Third-Party Root Certification Authorities certificate store.

    正确答案:C

  • 第20题:

    单选题
    ACME Rocket Sleds is growing, and so is their network. They have determined that they can nolonger continue using static routes and must implement a dynamic routing protocol. They want to have data use multiple paths to the destinations, even if the paths are not equal cost. Which routing protocol has the ability to do this?()
    A

    EIGRP

    B

    OSPF

    C

    RIPv1

    D

    RIPv2

    E

    BGP

    F

    IS - IS


    正确答案: D
    解析: 暂无解析

  • 第21题:

    多选题
    In a VoIP network, which three call signaling protocols are supported by the Cisco CallManager for call setup, call maintenance, and call teardown? ()
    A

    H·323

    B

    UDP

    C

    RTP

    D

    TCP

    E

    Media Gateway Control Protocol (MGCP)

    F

    session initiation protocol (SIP)


    正确答案: D,C
    解析: 暂无解析

  • 第22题:

    单选题
    A customer is trying to decide which 802.1X inner protocol to use on their network. The customer requires that nopasswords be sent across the network in plain text, that the protocol be supported by the Windows native supplicant,and that the protocol supports password changes at Layer 2. Which protocol would meet the customers needs?()
    A

    EAP-TLS

    B

    EAP-MD5

    C

    PAP

    D

    EAP-MSCHAPv2


    正确答案: C
    解析: 暂无解析

  • 第23题:

    单选题
    Which statemetn is true regarding the Network Time Protocol (NTP) on Junos devices?()
    A

    MD5 authenticaton is supported by the Junos OS

    B

    Server mode is not supported by the Junos OS

    C

    The Junos OS can provide a primarytime reference

    D

    The Junos OS does not support the use of a boot server


    正确答案: B
    解析: 暂无解析

  • 第24题:

    单选题
    Which statement is true regarding the Network Time Protocol (NTP) on Junos devices?()
    A

    MD5 authentication is supported by the Junos OS

    B

    Server mode is not supported by the Junos OS

    C

    The Junos OS can provide a primary time reference

    D

    The Junos OS does not support the use of a boot server


    正确答案: D
    解析: 暂无解析