Eap-fast provides a secure tunnel during phase one to protect the user’s authentication credentials. Which of these entities initializes the secure tunnel?()A、x.509 certificateB、generic token cardC、pre shared keyD、protected access credential

Eap-fast provides a secure tunnel during phase one to protect the user’s authentication credentials. Which of these entities initializes the secure tunnel?()

  • A、x.509 certificate
  • B、generic token card
  • C、pre shared key
  • D、protected access credential

相关考题:

Which encryption type is used to secure user data in an IPsec tunnel?() A. symmetric key encryptionB. asymmetric key encryptionC. RSAD. digital certificates

When configuring a multipoint GRE (mGRE) tunnel interface, which one of the following is NOT a valid configuration option:()A、 tunnel sourceB、 tunnel destinationC、 tunnel keyD、 ip addressE、 tunnelvrf

Cisco provides two enhancements to 802.11 security which protect a WEP key from exploits. Which two technologies provide these security enhancements? ()A、802.1XB、Cisco Temporal Key Integrity Protocol (CKIP)C、Extensible Authentication Protocol-Flexible Authentication via Secure Tunneling (EAP-FAST)D、Cisco Message Integrity Check (CMIC)E、One-Time Passwords (OTP)F、Advanced Encryption Standard (AES)

EAP-FAST provides a secure tunnel during Phase One to protect the user’s authentication credentials. Which of these entities initializes the secure tunnel?()A、generic token cardB、x.509 certificateC、preshared keyD、Protected Access Credential

You want to dynamically assign users to an 802.1Q VLAN as a result of their authentication. In order toaccomplish this,which two IETF RADIUS attributes should you configure on the Cisco Secure ACS?()A、064 Tunnel-TypeB、066 Tunnel-Client-EndpointC、067 Tunnel-Server-EndpointD、081 Tunnel-Private-Group-IDE、082 Tunnel-Assignment-ID

What is not a difference between VPN tunnel authentication and per-user authentication?()A、VPN tunnel authentication is part of the IKE specification. B、VPN tunnel authentication does not control which end user can use the IPSec SA (VPN tunnel).C、User authentication is used to control access for a specific user ID, and can be used with or without a VPN tunnel for network access authorization. D、802.1X with EAP-TLS (X.509 certificates) can be used to authenticate an IPSec tunnel.

EAP-FAST provides a secure tunnel during Phase One to protect the user’s authenticationcredentials. Which of these entities initializes the secure tunnel?()A、x.509 certificateB、generic token cardC、preshared keyD、Protected Access Credential

Which two configuration elements are required for a policy-based VPN?()A、IKE gatewayB、secure tunnel interfaceC、security policy to permit the IKE trafficD、security policy referencing the IPsec VPN tunnel

To implement the optional phase zero when using EAP-FAST for authentication, which of the following parameters must be set on the Cisco Secure ACS?()A、EAP-FAST master serverB、Allow automatic PAC provisioningC、client initial messageD、authority ID info

EAP-FAST provides a secure tunnel during Phase One to protect the user’s authentication credentials. Which of these entities initializes the secure tunnel?()A、x.509 certificateB、generic token cardC、preshared keyD、Protected Access Credential

For the following items ,which one can be used to authenticate the IPsec peers during IKE Phase 1?()A、pre-shared keyB、integrity check valueC、XAUTHD、Diffie-Hellman Nonce

Which protocol does the RADIUS server use inside the secure tunnel of EAP-FAST to authenticatethe client when one-time passwords are in use?()A、MS-CHAP v2B、PAPC、GTCD、MD5

You want to dynamically assign users to an 802.1Q VLAN as a result of their authentication.  Inorder to accomplish this, which two IETF RADIUS attributes should you configure on the Cisco Secure ACS?()A、083 Tunnel-PreferenceB、066 Tunnel-Client-EndpointC、064 Tunnel-TypeD、082 Tunnel-Assignment-IDE、081 Tunnel-Private-Group-IDF、067 Tunnel-Server-Endpoint

Which protocol does the radius server use inside the secure tunnel of eap-fast to authenticate the client when one-time passwords are in use?()A、gtcB、md5C、ms-chap v2D、pap

Which of the following methods of user authentication is the MOST secure?()A、CHAPB、KerberosC、TACACSD、EAP

Which encryption type is used to secure user data in an IPsec tunnel?()A、symmetric key encryptionB、asymmetric key encryptionC、RSAD、digital certificates

What are two use cases enabled by IF-MAP Federation?()A、Users authenticated to one Junos Pulse Access Control Service can transparently access resources protected by another Junos Pulse Access Control Service.B、Users authenticated to a Junos Pulse Access Control Service can transparently access resources protected by a Junos Pulse Secure Access Service.C、Remote access users authenticated to a Junos Pulse Secure Access Service can transparently access resources protected by a Junos Pulse Access Control Service.D、Remote access users authenticated to one Junos Pulse Secure Access Service can transparently access resources protected by another Junos Pulse Secure Access Service.

单选题Which protocol does the RADIUS server use inside the secure tunnel of EAP-FAST to authenticate the client when one-time passwords are in use?()AMS-CHAP v2BPAPCGTCDMD5

单选题EAP-FAST provides a secure tunnel during Phase One to protect the user’s authenticationcredentials. Which of these entities initializes the secure tunnel?()Ax.509 certificateBgeneric token cardCpreshared keyDProtected Access Credential

单选题Eap-fast provides a secure tunnel during phase one to protect the user’s authentication credentials. Which of these entities initializes the secure tunnel?()Ax.509 certificateBgeneric token cardCpre shared keyDprotected access credential

单选题EAP-FAST provides a secure tunnel during Phase One to protect the user’s authentication credentials. Which of these entities initializes the secure tunnel?()Ageneric token cardBx.509 certificateCpreshared keyDProtected Access Credential

单选题To implement the optional phase zero when using eap-fast for authentication, which of the following parameters must be set on the cisco secure acs?()Aeap-fast master serverBallow automatic pac provisioningCclient initial messageDauthority id info

单选题When configuring a multipoint GRE (mGRE) tunnel interface, which one of the following is NOT a valid configuration option:()A tunnel sourceB tunnel destinationC tunnel keyD ip addressE tunnelvrf

多选题Cisco provides two enhancements to 802.11 security which protect a WEP key from exploits. Which two technologies provide these security enhancements? ()A802.1XBCisco Temporal Key Integrity Protocol (CKIP)CExtensible Authentication Protocol-Flexible Authentication via Secure Tunneling (EAP-FAST)DCisco Message Integrity Check (CMIC)EOne-Time Passwords (OTP)FAdvanced Encryption Standard (AES)

单选题What is not a difference between VPN tunnel authentication and per-user authentication?()AVPN tunnel authentication is part of the IKE specification. BVPN tunnel authentication does not control which end user can use the IPSec SA (VPN tunnel).CUser authentication is used to control access for a specific user ID, and can be used with or without a VPN tunnel for network access authorization. D802.1X with EAP-TLS (X.509 certificates) can be used to authenticate an IPSec tunnel.

多选题You want to dynamically assign users to an 802.1Q VLAN as a result of their authentication. In order toaccomplish this,which two IETF RADIUS attributes should you configure on the Cisco Secure ACS?()A064 Tunnel-TypeB066 Tunnel-Client-EndpointC067 Tunnel-Server-EndpointD081 Tunnel-Private-Group-IDE082 Tunnel-Assignment-ID

多选题You want to dynamically assign users to an 802.1q vlan as a result of their authentication. In order to accomplish this,which two ietf radius attributes should you configure on the cisco secure acs?()A083 tunnel-preferenceB066 tunnel-client-endpointC064 tunnel-typeD082 tunnel-assignment-idE081 tunnel-private-group-idF067 tunnel-server-endpoint