多选题An administrator needs to authenticate users to the network, authorize network activities, and account for activities done. Which of the following are services that will BEST meet these goals?()(Select TWO).ATACACS+BRADIUSCKerberosD802.1XERRAS
多选题
An administrator needs to authenticate users to the network, authorize network activities, and account for activities done. Which of the following are services that will BEST meet these goals?()(Select TWO).
A
TACACS+
B
RADIUS
C
Kerberos
D
802.1X
E
RRAS
参考解析
解析:
暂无解析
相关考题:
An administrator replaced a router with a switch. End users are able to access network shares butare not able to access the Internet. Which of the following is the BEST explanation why the usersare unable to access the Internet?()A. Router routes traffic between different networks and a switch does notB. The new switch is faulty and needs to be replaced and configured correctlyC. The firewall needs to be setup to allow traffic to reach the InternetD. The switch needs to be setup to forward data traffic to the Internet
An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?() A.SSHB.WEPC.VPND.WPA
A network administrator needs to configure a serial link between the main office and a remote location. The router at the remote office is a non-Cisco router.How should the network administrator configure the serial interface of the main office router to make the connection?()A.B.C.D.
A user complains that the network printer is not printing. The system administrator knows there is a print queue for the network printer and needs to check on the queue. Which command is run?()A、 netstat B、 lpstat C、 telinit D、 prtconf
A network administrator needs to configure port security on a switch.which two statements are true?()A、The network administrator can apply port security to dynamic access portsB、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.C、The sticky learning feature allows the addition of dynamically learned addresses to the runningconfiguration.D、The network administrator can apply port security to EtherChannels.E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.
You have configured the Odyssey Access Client with a profile which has the "Disable Server Verification" setting cleared.What will be the result if the device certificate on the MAG Series device has expired and the user attempts to authenticate?()A、The user will be instructed to call the network administrator.B、The user will fail authentication.C、The user will be prompted to install a new device certificate on the MAG Series device.D、The user will successfully authenticate and have full network access.
A network administrator needs to configure port security on a switch.which two statements are true?()A、The network administrator can apply port security to dynamic access portsB、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.C、The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.D、The network administrator can apply port security to EtherChannels.E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.
A user reports they cannot access the network share folder, the users workstation is configured to use automatic IP. When the administrator checks the IP address the response returns as 169.254.0.5. Which of the following should the administrator verify?()A、 That there are no DHCP relay serversB、 That the user account on Active Directory is not lockedC、 That the network card driver is not installed incorrectlyD、 The network connection is functioning
An administrator replaced a router with a switch. End users are able to access network shares butare not able to access the Internet. Which of the following is the BEST explanation why the usersare unable to access the Internet?()A、Router routes traffic between different networks and a switch does notB、The new switch is faulty and needs to be replaced and configured correctlyC、The firewall needs to be setup to allow traffic to reach the InternetD、The switch needs to be setup to forward data traffic to the Internet
An administrator needs to grant privileges to other server staff members to run archive utilities on adefault Windows installation. The administrator needs to set the minimum permissions to:()A、 remote users.B、 account operators.C、 server operators.D、 backup operators.
An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot. Which of the following is the FIRST thing the administrator should check?()A、 Default gatewayB、 The ports on the switchC、 Port security on the servers switch portD、 Ethernet cable
An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot. Which of the following is the FIRST thing the administrator should check?()A、Default gatewayB、The ports on the switchC、Port security on the server's switch portD、Ethernet cable
A network technician is installing a small wireless network. A requirement is that individual users must authenticate using usernames and passwords. Which of the following technologies would support users authenticating with encrypted usernames and passwords?()A、WPA TLSB、WPA PEAPC、64-bit WEPD、128-bit WEP
An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?()A、SSHB、WEPC、VPND、WPA
A System p administrator needs to set the default password length for all users to six characters. Which of the following files needs to be edited to accomplish this ()A、/etc/security/limitsB、/etc/security/mkuser.sysC、/etc/security/privD、/etc/security/user
Your corporate network has a member server named RAS1 that runs Windows Server 2008 R2. You configure RAS1 to use the Routing and Remote Access Services (RRAS).The companys remote access policy allows members of the Domain Users group to dial in to RAS1. The company issues smart cards to all employees.You need to ensure that smart card users are able to connect to RAS1 by using a dial-up connection.What should you do?()A、Install the Network Policy Server (NPS) server role on RAS1.B、Create a remote access policy that requires users to authenticate by using SPAP.C、Create a remote access policy that requires users to authenticate by using EAP-TLS.D、Create a remote access policy that requires users to authenticate by using MS-CHAP v2.
Your corporate network has a member server named RAS1 that runs Windows Server 2008. You configure RAS1 to use the Routing and Remote Access Service (RRAS) The companys remote access policy allows members of the Domain Users group to dial in to RAS1. The company issues smart cards to all employees. You need to ensure that smart card users are able to connect to RAS1 by using a dial-up connection. What should you do?()A、 Install the Network Policy Server (NPS) on the RAS1 serverB、 Create a remote access policy that requires users to authenticate by using SPAPC、 Create a remote access policy that requires users to authenticate by using EAP-TLSD、 Create a remote access policy that requires users to authenticate by using MS-CHAP v2
Maria has been set up as an assistant to the administrator. Users of your network are complaining that Maria has been opening their files and editing them. She needs to perform backups and installations of programs, and setting up of printers. How do you fix the problem with the minimum amount of effort, yet allowing her to accomplish the assigned tasks? ()A、Remove her Administrator privilege and give her Power Users and Backup Operators.B、Leave her as Administrator and make deny on Users’ files.C、Remove her administrator privileges and assign her Server Operators.D、Remove her administrator privileges and assign her Power Users and Replicator. E、Tell her that she isn’t allowed to tamper with other users files.
An administrator needs to authenticate users to the network, authorize network activities, and account for activities done. Which of the following are services that will BEST meet these goals?()(Select TWO).A、TACACS+B、RADIUSC、KerberosD、802.1XE、RRAS
单选题An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot. Which of the following is the FIRST thing the administrator should check?()ADefault gatewayBThe ports on the switchCPort security on the server's switch portDEthernet cable
单选题A user reports they cannot access the network share folder, the users workstation is configured to use automatic IP. When the administrator checks the IP address the response returns as 169.254.0.5. Which of the following should the administrator verify?()A That there are no DHCP relay serversB That the user account on Active Directory is not lockedC That the network card driver is not installed incorrectlyD The network connection is functioning
单选题A user complains that the network printer is not printing. The system administrator knows there is a print queue for the network printer and needs to check on the queue. Which command is run?()A netstat B lpstat C telinit D prtconf
单选题An administrator wants to limit access of a wireless network without requiring authorized users to enter a password or network key. Which of the following methods would MOST likely be implemented on the wireless network?()ADisable SSIDBWPACMAC filteringDRAS
单选题You have configured the Odyssey Access Client with a profile which has the "Disable Server Verification" setting cleared.What will be the result if the device certificate on the MAG Series device has expired and the user attempts to authenticate?()AThe user will be instructed to call the network administrator.BThe user will fail authentication.CThe user will be prompted to install a new device certificate on the MAG Series device.DThe user will successfully authenticate and have full network access.
单选题An administrator needs to grant privileges to other server staff members to run archive utilities on adefault Windows installation. The administrator needs to set the minimum permissions to:()A remote users.B account operators.C server operators.D backup operators.
单选题A network technician is installing a small wireless network. A requirement is that individual users must authenticate using usernames and passwords. Which of the following technologies would support users authenticating with encrypted usernames and passwords?()AWPA TLSBWPA PEAPC64-bit WEPD128-bit WEP
多选题You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003.The network contains a Web server named Server1 that runs IIS 6.0 and hosts a secure Web site. The Web site is accessible from the intranet, as well as from the Internet. All users must authenticate when they connect to Server1. All users on the Internet must use a secure protocol to connect to the Web site. Users on the intranet do not need to use a secure protocol.You need verify that all users are using a secure protocol to connect to Server1 from the Internet. What are two possible ways to achieve this goal?()AMonitor the events in the application log on Server1.BMonitor the events in the security log on Server1.CMonitor the Web server connections on Server1 by using a performance log.DMonitor network traffic to Server1 by using Network Monitor.EMonitor the IIS logs on Server1.