Authentication for user data traffic is important, but so is authentication for IP voice traffic. The Cisco 830 802.1 feature provides an easier method for allowing IP voice traffic through the VPN, because it().A、requires access lists to identify the voice traffic B、can allow traffic from a device without 802.1X authentication, by MAC addressC、can allow traffic from Cisco IP phones by listening to their CDP advertisementsD、allows all packets marked with a ToS of 5 to bypass authenticationE、allows all IP voice packets to bypass authentication via stateful inspection
Authentication for user data traffic is important, but so is authentication for IP voice traffic. The Cisco 830 802.1 feature provides an easier method for allowing IP voice traffic through the VPN, because it().
- A、requires access lists to identify the voice traffic
- B、can allow traffic from a device without 802.1X authentication, by MAC address
- C、can allow traffic from Cisco IP phones by listening to their CDP advertisements
- D、allows all packets marked with a ToS of 5 to bypass authentication
- E、allows all IP voice packets to bypass authentication via stateful inspection
相关考题:
An authentication realm consists of which three authentication resources?() A. Authentication serverB. Session optionsC. Authentication policyD. End-point security policyE. Role-mapping rules
What are two steps to configure user authentication for a Junos Pulse Access Control Service?() A. Configure an authentication policy as part of the user role definitions.B. Configure a Sign-in Policy.C. Configure authentication agents as part of the user role definitionsD. Configure an authentication policy as part of the authentication realm definition.
Which three authentication resources are grouped within an authentication realm?() A. Authentication enforcerB. Directory serverC. Captive authenticationD. Authentication policyE. Role-mapping rules
Which profile configurations allows either PAP or CHAP to be used for authentication?() A.ppp authentication chap papB.pppoe authentication chap papC.ppp authentication chap ppp authentication papD.pppoe authentication chap pppoe authentication pap
which command is used to enable CHAP authentication whit PAP as the fallback method on a serial interface?()A、(config-if)#authentication ppp chap fallback pppB、(config-if)#authentication ppp chap papC、(config-if)#ppp authentication chap papD、(config-if)#ppp authentication chap fallback ppp
Which two statements about the open and shared key wireless-authentication methods are true? ()A、 Shared key authentication is considered more secure than open authentication.B、 Shared key authentication is considered less secure than open authentication.C、 If the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer data.D、 If the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer data.E、 If the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data.
Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.The Company.com employees use Microsoft Office Outlook 2007 to connect to their mailboxes.RPC over HTTP and Auto discover are configured on Microsoft Office Outlook 2007. A new Company.com security policy requires that the employees connected to the domain does not need authentication when using Outlook Anywhere.However, those not connected t the domain needs to be authentication when using Outlook Anywhere.The employees need to comply with the new Company.com security policy. What should you do?()A、You should consider using Basic authentication on Outlook Anywhere and set up only Basic authentication on the RPC virtual directory.B、You should consider using NTLM authentication on Outlook Anywhere and set up Basic authentication and NTLM authentication on the RPC virtual directory.C、You should consider using NTLM authentication on Outlook Anywhere and set up only Basic authentication on the RPC virtual directory.D、You should consider using Basic authentication on Outlook Anywhere and set up Basic authentication and NTLM authentication on the RPC virtual directory.
What are the three OSPF authentication methods supported on the ERX Edge Router?()A、 null passwordB、 simple passwordC、 message digest 5D、 Password Authentication ProtocolE、 Challenge Handshake Authentication Protocol
An authentication realm consists of which three authentication resources?()A、Authentication serverB、Session optionsC、Authentication policyD、End-point security policyE、Role-mapping rules
which command is used to enable CHAP authentication whit PAP as the fallback method on a serialinterface?()A、(config-if)#authentication ppp chap fallback pppB、(config-if)#authentication ppp chap papC、(config-if)#ppp authentication chap papD、(config-if)#ppp authentication chap fallback ppp
How is authentication handled with OSPFv3?()A、OSPFv3 for IPv6 authen tication is supported by IPv6 IPsec.B、OSPFv3 for IPv6 authentication is supported by MD5 authentication.C、OSPFv3 for IPv6 authentication is supported by IPv4 IPsec.D、OSPFv3 for IPv6 authentication is supported by SHA - 1 authentication.
Which three authentication resources are grouped within an authentication realm?()A、Authentication enforcerB、Directory serverC、Captive authenticationD、Authentication policyE、Role-mapping rules
You need to recommend a strategy to ensure that the administration of AD LDS is encrypted. What should you include in the recommendation?()A、a server authentication certificateB、client authentication certificatesC、Digest authenticationD、Windows Integrated authentication
You need to recommend a security strategy for WebApp2 that meets the company’s applicaton requirements.What should you include in the recommendation?()A、Basic authentication and connection security rulesB、Basic authentication and SSLC、Digest authentication and connection security rulesD、Digest authentication and SSL
单选题You need to implement an authentication method on SQL4. The TravelOnline database will be accessed through a Web services application. You need to make the authentication method as secure as possible.What should you do?()ACreate an HTTP endpoint with NTLM authentication, and create a service principal name (SPN).BCreate an HTTP endpoint with digest authentication, and create a service principal name (SPN).CCreate an HTTP endpoint with integrated authentication, and create a service principal name (SPN).DCreate an HTTP endpoint with Kerberos authentication.
单选题How is authentication handled with OSPFv3?()AOSPFv3 for IPv6 authen tication is supported by IPv6 IPsec.BOSPFv3 for IPv6 authentication is supported by MD5 authentication.COSPFv3 for IPv6 authentication is supported by IPv4 IPsec.DOSPFv3 for IPv6 authentication is supported by SHA - 1 authentication.
单选题Which statement accurately describes firewall user authentication?()AFirewall user authentication provides another layer of security in a network.BFirewall user authentication provides a means for accessing a JUNOS Software-based security device.CFirewall user authentication enables session-based forwarding.DFirewall user authentication is used as a last resort security method in a network.
单选题You need to recommend a strategy to ensure that the administration of AD LDS is encrypted. What should you include in the recommendation?()Aa server authentication certificateBclient authentication certificatesCDigest authenticationDWindows Integrated authentication
多选题Which two statements about authentication settings for DCNM-LAN are true? ()AIf none of the authentication servers that are configured for the current authentication mode responds to an authentication request, the DCNM-LAN server falls back to localauthentication.BDCNM-LAN only supports TACACS+.CEach DCNM-LAN server will have the same device credentials.DAdministering DCNM-LAN authentication settings requires an authentication license.EDCNM-LAN server users are local to the DCNM-LAN server.
多选题Which two statements regarding external authentication servers for firewall userauthentication are true?()AUp to three external authentication server types can be used simultaneously.BOnly one external authentication server type can be used simultaneously.CIf the local password database is not configured in the authentication order, and the configured authentication server is unreachable, authentication is not performed.DIf the local password database is not configured in the authentication order, and the configured authentication server rejects the authentication request, authentication is not performed
单选题Which IS-IS authentication method is supported on the ERX Edge Router?()Asimple passwordBHMAC message digest 5CPassword Authentication ProtocolDChallenge Handshake Authentication Protocol
多选题Which two statements regarding external authentication servers for firewall user authentication are true?() (Choose two.)AUp to three external authentication server types can be used simultaneously.BOnly one external authentication server type can be used simultaneously.CIf the local password database is not configured in the authentication order, and the configured authentication server bypassed.DIf the local password database is not configured in the authentication order, and the configured authentication server authentication is rejected.
单选题Which profile configurations allows either PAP or CHAP to be used for authentication?()Appp authentication chap papBpppoe authentication chap papCppp authentication chap ppp authentication papDpppoe authentication chap pppoe authentication pap
单选题When using RADIUS as an external authentication method for 802.1X authentication for the Junos Pulse Access Control Service, what must you do to ensure that the RADIUS authentication works properly?()AConfigure IP helper to forward the authentication requests from the clients to the external RADIUS serverBConfigure the supplicant as anexternal authentication serverCConfigure RADIUS proxy on the realmDSpecify the correct RADIUS port 389 on the Junos Pulse Access Control Service
单选题Which one of the following commands can be used to enable AAA authentication to determine if a user canaccess the privilege command level?()Aaaa authentication enable method defaultBaaa authentication enable defaultCaaa authentication enable levelDaaa authentication enable default local
多选题What are the three OSPF authentication methods supported on the ERX Edge Router?()Anull passwordBsimple passwordCmessage digest 5DPassword Authentication ProtocolEChallenge Handshake Authentication Protocol
多选题Which two statements about the open and shared key wireless-authentication methods are true? ()AShared key authentication is considered more secure than open authentication.BShared key authentication is considered less secure than open authentication.CIf the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer data.DIf the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer data.EIf the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data.
单选题which command is used to enable CHAP authentication whit PAP as the fallback method on a serialinterface?()A(config-if)#authentication ppp chap fallback pppB(config-if)#authentication ppp chap papC(config-if)#ppp authentication chap papD(config-if)#ppp authentication chap fallback ppp