单选题Service Focal Point, Inventory Scout, and DLPAR rely on correct setup and networking between the HMC and the logical partitions. Which authentication method is used to control session management, but also authentication between network peers?()A Kerber

题目
单选题
Service Focal Point, Inventory Scout, and DLPAR rely on correct setup and networking between the HMC and the logical partitions. Which authentication method is used to control session management, but also authentication between network peers?()
A

Kerberos

B

Domain Name Server

C

Secure Sockets Layer

D

Resource Monitoring and Control


相似考题
更多“单选题Service Focal Point, Inventory Scout, and DLPAR rely on correct setup and networking between the HMC and the logical partitions. Which authentication method is used to control session management, but also authentication between network peers?()A Kerber”相关问题
  • 第1题:

    What is not a difference between VPN tunnel authentication and per-user authentication?()

    • A、VPN tunnel authentication is part of the IKE specification. 
    • B、VPN tunnel authentication does not control which end user can use the IPSec SA (VPN tunnel).
    • C、User authentication is used to control access for a specific user ID, and can be used with or without a VPN tunnel for network access authorization. 
    • D、802.1X with EAP-TLS (X.509 certificates) can be used to authenticate an IPSec tunnel.

    正确答案:D

  • 第2题:

    Which protocol is used between the RAS and the authentication server in a narrowband network environment?()

    • A、RADIUS
    • B、PPPPAP
    • C、MSCHAP
    • D、PPPCHAP

    正确答案:A

  • 第3题:

    In a network using cisco autonomous access points running wds. What port is used for authentication by the local authentication service on an access point?()

    • A、1813
    • B、1645
    • C、1646
    • D、1812

    正确答案:D

  • 第4题:

    The pSeries technical specialist is concerned that the installed inventory for a p670 does not match what the customer says is installed.  The specialist discovers that the customer has never updated their VPD.  Which of the following HMC applications is used to gather the current VPD information?()

    • A、Service Processor
    • B、Service Director
    • C、Inventory Scout Services
    • D、Service Focal Point

    正确答案:C

  • 第5题:

    Which statement accurately describes firewall user authentication?()

    • A、Firewall user authentication provides another layer of security in a network.
    • B、Firewall user authentication provides a means for accessing a JUNOS Software-based security device.
    • C、Firewall user authentication enables session-based forwarding.
    • D、Firewall user authentication is used as a last resort security method in a network.

    正确答案:A

  • 第6题:

    Your network contains one Active Directory domain. You have a member server named Server1 that runs Windows Server 2008 R2. The server has the Routing and Remote Access Services role service installed.You implement Network Access Protection (NAP) for the domain.You need to configure the Point-to-Point Protocol (PPP) authentication method on Server1. Which authentication method should you use?()

    • A、Challenge Handshake Authentication Protocol (CHAP)
    • B、Extensible Authentication Protocol (EAP)
    • C、Microsoft Challenge Handshake Authentication Protocol version 2 (MS-CHAP v2)
    • D、Password Authentication Protocol (PAP)

    正确答案:B

  • 第7题:

    单选题
    The pSeries technical specialist is concerned that the installed inventory for a p670 does not match what the customer says is installed.  The specialist discovers that the customer has never updated their VPD.  Which of the following HMC applications is used to gather the current VPD information?()
    A

    Service Processor

    B

    Service Director

    C

    Inventory Scout Services

    D

    Service Focal Point


    正确答案: A
    解析: 暂无解析

  • 第8题:

    单选题
    Which of the following definitions can be used to define the term ‘offset ’ as a characteristic of controller action?()
    A

    The period of time in which the set point and the control point coincide

    B

    The periodic change between the set point and the control point

    C

    The variable difference between the set point and the control point

    D

    The constant difference between the set point and the control point


    正确答案: C
    解析: 暂无解析

  • 第9题:

    单选题
    Which protocol is used between the RAS and the authentication server in a narrowband network environment?()
    A

    RADIUS

    B

    PPPPAP

    C

    MSCHAP

    D

    PPPCHAP


    正确答案: D
    解析: 暂无解析

  • 第10题:

    单选题
    Your network contains one Active Directory domain. You have a member server named Server1 that runs Windows Server 2008. The server has the Routing and Remote Acecss role service installed. You implement Network Access Protection (NAP) for the domain. You need to configure the Point-to-Point (PPP) authentication method on Server1. Which autnetication method should you choose?()
    A

    Challenge Handshake Authentication Protocol (CHAP)

    B

    Extensible Authentication Protocol (EAP)

    C

    Microsoft Challenge Handshake Authentication Protocol version 2 (MS-CHAP v2)

    D

    Password Authentication Protocol (PAP)


    正确答案: B
    解析: 暂无解析

  • 第11题:

    单选题
    What is not a difference between VPN tunnel authentication and per-user authentication?()
    A

    VPN tunnel authentication is part of the IKE specification. 

    B

    VPN tunnel authentication does not control which end user can use the IPSec SA (VPN tunnel).

    C

    User authentication is used to control access for a specific user ID, and can be used with or without a VPN tunnel for network access authorization. 

    D

    802.1X with EAP-TLS (X.509 certificates) can be used to authenticate an IPSec tunnel.


    正确答案: A
    解析: 暂无解析

  • 第12题:

    单选题
    Which statement accurately describes firewall user authentication?()
    A

    Firewall user authentication provides another layer of security in a network.

    B

    Firewall user authentication provides a means for accessing a JUNOS Software-based security device.

    C

    Firewall user authentication enables session-based forwarding.

    D

    Firewall user authentication is used as a last resort security method in a network.


    正确答案: B
    解析: 暂无解析

  • 第13题:

    In an IEEE 802.1x deployment,between which two devices EAPOL messages typically are sent?()

    • A、Between the supplicant and the authenticator
    • B、Between the authenticator and the authentication server
    • C、Between the supplicant and the authentication server
    • D、Between the RADIUS server and the authenticator

    正确答案:A

  • 第14题:

    The LWAPP (Lightweight Access Point Protocol) is in use within the Company wireless LAN.  Which statement is true about this protocol?()

    • A、 Real-time frame exchange is accomplished within the access point.
    • B、 The control traffic between the client and the access point is encapsulated with the LWAPP. 
    • C、 Authentication, security, and mobility are handled by the access point.
    • D、 Data traffic between the client and the access point is encapsulated with LWAPP.
    • E、 None of the other alternatives apply

    正确答案:A

  • 第15题:

    In a network using Cisco autonomous access points running WDS, what port is used for authentication by the local authentication service on an access point?()

    • A、1813
    • B、1645
    • C、1646
    • D、1812

    正确答案:D

  • 第16题:

    When using RADIUS as an external authentication method for 802.1X authentication for the Junos Pulse Access Control Service, what must you do to ensure that the RADIUS authentication works properly?()

    • A、Configure IP helper to forward the authentication requests from the clients to the external RADIUS server
    • B、Configure the supplicant as anexternal authentication server
    • C、Configure RADIUS proxy on the realm
    • D、Specify the correct RADIUS port 389 on the Junos Pulse Access Control Service

    正确答案:C

  • 第17题:

    Your network contains one Active Directory domain. You have a member server named Server1 that runs Windows Server 2008. The server has the Routing and Remote Acecss role service installed. You implement Network Access Protection (NAP) for the domain. You need to configure the Point-to-Point (PPP) authentication method on Server1. Which autnetication method should you choose?()

    • A、Challenge Handshake Authentication Protocol (CHAP)
    • B、Extensible Authentication Protocol (EAP)
    • C、Microsoft Challenge Handshake Authentication Protocol version 2 (MS-CHAP v2)
    • D、Password Authentication Protocol (PAP)

    正确答案:B

  • 第18题:

    Service Focal Point, Inventory Scout, and DLPAR rely on correct setup and networking between the HMC and the logical partitions. Which authentication method is used to control session management, but also authentication between network peers?()

    • A、Kerberos
    • B、Domain Name Server
    • C、Secure Sockets Layer
    • D、Resource Monitoring and Control

    正确答案:D

  • 第19题:

    单选题
    In a network using Cisco autonomous access points running WDS, what port is used for authentication by the local authentication service on an access point?()
    A

    1813

    B

    1645

    C

    1646

    D

    1812


    正确答案: A
    解析: 暂无解析

  • 第20题:

    单选题
    In a network using cisco autonomous access points running wds. What port is used for authentication by the local authentication service on an access point?()
    A

    1813

    B

    1645

    C

    1646

    D

    1812


    正确答案: D
    解析: 暂无解析

  • 第21题:

    单选题
    When using RADIUS as an external authentication method for 802.1X authentication for the Junos Pulse Access Control Service, what must you do to ensure that the RADIUS authentication works properly?()
    A

    Configure IP helper to forward the authentication requests from the clients to the external RADIUS server

    B

    Configure the supplicant as anexternal authentication server

    C

    Configure RADIUS proxy on the realm

    D

    Specify the correct RADIUS port 389 on the Junos Pulse Access Control Service


    正确答案: C
    解析: 暂无解析

  • 第22题:

    单选题
    Your network contains one Active Directory domain. You have a member server named Server1 that runs Windows Server 2008 R2. The server has the Routing and Remote Access Services role service installed.You implement Network Access Protection (NAP) for the domain.You need to configure the Point-to-Point Protocol (PPP) authentication method on Server1.Which authentication method should you use?()
    A

    Challenge Handshake Authentication Protocol (CHAP)

    B

    Extensible Authentication Protocol (EAP)

    C

    Microsoft Challenge Handshake Authentication Protocol version 2 (MS-CHAP v2)

    D

    Password Authentication Protocol (PAP)


    正确答案: C
    解析: 暂无解析

  • 第23题:

    单选题
    Service Focal Point, Inventory Scout, and DLPAR rely on correct setup and networking between the HMC and the logical partitions. Which authentication method is used to control session management, but also authentication between network peers?()
    A

    Kerberos

    B

    Domain Name Server

    C

    Secure Sockets Layer

    D

    Resource Monitoring and Control


    正确答案: D
    解析: 暂无解析