单选题PEAP provides authentication for theEAP exchange using: ()A RC4B TLSC SSHD AESE 3DES

单选题
PEAP provides authentication for theEAP exchange using: ()
A

 RC4

B

 TLS

C

 SSH

D

 AES

E

 3DES


参考解析

解析: 暂无解析

相关考题:

Kerberos is a form of user authentication that:() A. Provides users access to network resources.B. Performs router commands after user authentication.C. Provides users with remote access only capabilities.D. Does not require an authentication server

LDAP is being utilized throughout the Company Wireless network.  Which issue or set of issues  does the Lightweight Access Point Protocol (LWAPP) address? ()A、 Reduction of processing in wireless controllersB、 Distributed approach to authentication, encryption, and policy enforcementC、 Access point discovery, information exchange, and configurationD、 Provides security by blocking communication between access points and wireless clientsE、 None of the other alternatives apply.

Which two statements about the Wired Equivalent Privacy (WEP) encryption mechanism are true? ()A、the two methods of authentication using the WEP encryption are open and shared keyB、the 802.11 standard defines WEP security using 128-bit keysC、WEP can provide stronger authentication through the use of LEAP, PEAP, or EAP-FASTD、WEP is a scalable encryption solution that uses static keys for authenticationE、WEP security provides only one-way authenticationF、WEPv2 offers improved encryption by replacing the RC4 encryption mechanism with the AES (symmetric block cipher) mechanism

Company.com network consists of a single Active Directory domain named  Company.com.Company.com has an Exchange Server 2010 organization.The Company.com employees use Microsoft Office Outlook 2007 to connect to their mailboxes.RPC over HTTP and Auto discover are configured on Microsoft Office Outlook 2007. A new Company.com security policy requires that the employees connected to the domain does not need authentication when using Outlook Anywhere.However, those not connected t the domain needs to be authentication when using Outlook Anywhere.The employees need to comply with the new Company.com security policy.  What should you do?()A、You should consider using Basic authentication on Outlook Anywhere and set up only Basic authentication on the RPC virtual directory.B、You should consider using NTLM authentication on Outlook Anywhere and set up Basic authentication and NTLM authentication on the RPC virtual directory.C、You should consider using NTLM authentication on Outlook Anywhere and set up only Basic authentication on the RPC virtual directory.D、You should consider using Basic authentication on Outlook Anywhere and set up Basic authentication and NTLM authentication on the RPC virtual directory.

当采用PEAP或EAP-TLS的无线认证方式时,我们需要全局下使用命令()来使能,并根据需要加载根证书和服务器证书。A、dot1x authentication-method eapB、dot1x authentication-method chapC、dot1x authentication-method papD、dot1x authentication-method peap

Which issue or set of issues does the Lightweight Access Point Protocol (LWAPP) address?()A、 reduction of processing in wireless controllersB、 distributed approach to authentication, encryption, and policy enforcementC、 provides security by blocking communication between access points and wireless clientsD、 access point discovery, information exchange, and configuration

Clients using Cisco-LEAP and EAP-FAST authentication are having no problems logging on to thewireless network,but clients using PEAP are failing to log on. Which situation would result in thistype ofproblem?()A、Posture validation has not been enabled.B、The AAA server is set to accept both MS-CHAP v2 and GTC for PEAP authentication.C、Clients and server are not using certificates.D、Clients have been set to validate the server identity.

PEAP provides authentication for theEAP exchange using: ()A、 RC4B、 TLSC、 SSHD、 AESE、 3DES

Client association using EAP-Cisco Wireless (LEAP) is failing, but EAP-PEAP is functioning on an autonomous access point. Which of the following needs to be enabled on the access point so EAP-Cisco Wireless (LEAP) is enabled?()A、open authentication plus MACB、open authentication plus EAPC、shared keyD、network EAP

On a standalone access point, client association using EAP-Cisco Wireless (Cisco-LEAP) isfailing, but association using EAP-PEAP is functioning. What needs to be enabled on the standalone accesspoint to correct this issue?()A、network EAPB、open authentication plus MACC、open authentication plus EAPD、a shared key

Kerberos is a form of user authentication that:()A、Provides users access to network resources.B、Performs router commands after user authentication.C、Provides users with remote access only capabilities.D、Does not require an authentication server

You have an Exchange Server 2010 organization.You need to prevent users from changing their password by using Outlook Web App (OWA).What should you do?()A、Create a Group Policy Object.B、Create an Outlook Web App Mailbox policy.C、Modify the authentication settings of the OWA virtual directory.D、Modify the authentication settings of the IISADMPWD virtual directory.

Your network contains two Active Directory sites named Site1 and Site2. Only Site1 can be accessed from the Internet. You have an Exchange Server 2010 organization.  You deploy a Client Access server in Site1 and enable Windows Integrated Authentication for OutlookWeb App (OWA).  In Site2, you deploy a Mailbox server and a Client Access server.  You need to configure the Exchange organization to meet the following requirements: .Allow users to access their mailboxes from the Internet by using OWA  .Prevent authentication prompts from displaying when users connect to OWA by using domain- joinedcomputers that are connected to the internal network  What should you do?()A、Modify the Exchange virtual directory on the Client Access server in Site1.B、Modify the Exchange virtual directory on the Client Access server in Site2.C、Modify the OWA virtual directory on the Client Access server in Site1.D、Modify the OWA virtual directory on the Client Access server in Site2.

单选题You have an Exchange Server 2010 organization.  You need to recommend a storage solution that meets the following requirements:.Provides users with an alternate location for storing e-mail messages  .Provides users with access to the alternate location by using Outlook Web App (OWA)  What should you recommend?()Ajournal rulesBmanaged foldersCpersonal archivesDpersonal folders (.pst)

单选题You install a new Exchange Server 2010 server.You need to ensure that users can connect from the Internet to the server by using Exchange ActiveSync.What should you do on the Exchange server?()AModify the internal URL for the Microsoft-Server-ActiveSync virtual directory.BModify the external URL for the Microsoft-Server-ActiveSync virtual directory.CEnable Anonymous Authentication for the Microsoft-Server-ActiveSync virtual directory.DEnable Windows Integrated Authentication for the Microsoft-Server-ActiveSync virtual directory.

多选题When implementing WLAN security, what are three benefits of using the Temporal Key Integrity Protocol (TKIP) instead of WEP? ()ATKIP uses an advanced encryption scheme based on AESBTKIP provides authentication and integrity checking using Cipher Block Chaining Message Authentication Code (CBC-MAC)CTKIP provides per-packet keyingand a rekeying mechanismDTKIP provides message integrity checkETKIP reduces WEP’s vulnerabilities byusing different hardware encryption chipsetFTKIP uses a 48 bit InitializationVector

单选题Which statement accurately describes firewall user authentication?()AFirewall user authentication provides another layer of security in a network.BFirewall user authentication provides a means for accessing a JUNOS Software-based security device.CFirewall user authentication enables session-based forwarding.DFirewall user authentication is used as a last resort security method in a network.

单选题You are evaluating the use of pass-through disks for the Exchange servers. You need to recommend a backup solution for the Exchange servers that meets the following requirements: - Minimizes costs. - Provides for the recovery of the Exchange databases if a hardware failure occurs. What should you include in the recommendation?()ACreate snapshots of the VMs from Hyper-V ManagerBCreate full backups of the Hyper-V host by using Windows Server BackupCCreate full backups of the VMs by using Windows Server Backup from within the VMsDCreate full backups of the Hyper-V host by using Microsoft System Center Data Protection manager

单选题Clients using Cisco-LEAP and EAP-FAST authentication are having no problems logging on to thewireless network, but clients using PEAP are failing to log on. Which situation would result in thistype ofproblem?()APosture validation has not been enabledBThe AAA server is set to accept both MS-CHAP v2 and GTC for PEAP authenticationCClients and server are not using certificatesDClients have been set to validate the server identity

单选题Clients using Cisco-LEAP and EAP-FAST authentication are having no problems logging on to thewireless network,but clients using PEAP are failing to log on. Which situation would result in thistype ofproblem?()APosture validation has not been enabled.BThe AAA server is set to accept both MS-CHAP v2 and GTC for PEAP authentication.CClients and server are not using certificates.DClients have been set to validate the server identity.

单选题Which issue or set of issues does the Lightweight Access Point Protocol (LWAPP) address?()A reduction of processing in wireless controllersB distributed approach to authentication, encryption, and policy enforcementC provides security by blocking communication between access points and wireless clientsD access point discovery, information exchange, and configuration

单选题On a standalone access point, client association using EAP-Cisco Wireless (Cisco-LEAP) is failing, butassociation using EAP-PEAP is functioning. What needs to be enabled on the standalone access point tocorrect this issue?()Aa shared keyBnetwork EAPCopen authentication plus EAPDopen authentication plus MAC