Which two secure remote access m

题目

Which two secure remote access methods are available on the WX platforms?() (Choose two.)

  • A、SSL
  • B、SSH
  • C、Telnet
  • D、HTTP
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Without calling JTAC, which two troubleshooting tools on a MAG Series device would you use to identify the cause of an authentication failure?()

A. Remote Debugging

B. System Snapshot

C. User Access logs

D. Policy Tracing


参考答案:C, D

第2题:

Which of the following is a secure method of remote access via command line?()

A.RCP

B.Telnet

C.RSH

D.SSH


参考答案:D

第3题:

根据材料回答2~3题:

To keep certain information private and secure while providing remote access for employees,many businesses are creating intranets.An intranet is an( )organizational intemet that is guarded against outside access by a special feature called a firewall(which can be software,hardware, or a combination of the two).

A.outside

B.external

C.internal

D.inside


正确答案:C

第4题:

Without calling JTAC, which two troubleshooting tools on a MAG Series device would you use to identify the cause of an authentication failure?()

  • A、Remote Debugging
  • B、System Snapshot
  • C、User Access logs
  • D、Policy Tracing

正确答案:C,D

第5题:

Which two practices help secure the configuration utilities on wireless access points from unauthorized access? (Choose two.)()

  • A、assigning a private IP address to the AP
  • B、changing the default SSID value
  • C、configuring a new administrator password
  • D、changing the mixed mode setting to single mode
  • E、configuring traffic filtering

正确答案:B,C

第6题:

Which three types of policies must you configure to allow remote users transparent access to protected resources using IF-MAP Federation between a Junos Pulse Secure Access Service and a Junos Pulse Access Control Service?()

A. Session-Export policies on the Junos Pulse Secure Access Service

B. Session-Export policies on the Junos Pulse Access Control Service

C. Session-Import policies on the Junos Pulse Secure Access Service

D. Session-Import policies on the Junos Pulse Access Control Service

E. Resource access policies on the Junos Pulse Access Control Service


参考答案:A, D, E

第7题:

Which two WAN access methods are specified for a simplified and cost-effective Cisco Single-Site Secure Network Foundation Deployment Design?()

  • A、Frame-Relay
  • B、Leased Line
  • C、MPLS
  • D、DSL
  • E、Cable
  • F、Wireless

正确答案:D,E

第8题:

What are two use cases enabled by IF-MAP Federation?()

A. Users authenticated to one Junos Pulse Access Control Service can transparently access resources protected by another Junos Pulse Access Control Service.

B. Users authenticated to a Junos Pulse Access Control Service can transparently access resources protected by a Junos Pulse Secure Access Service.

C. Remote access users authenticated to a Junos Pulse Secure Access Service can transparently access resources protected by a Junos Pulse Access Control Service.

D. Remote access users authenticated to one Junos Pulse Secure Access Service can transparently access resources protected by another Junos Pulse Secure Access Service.


参考答案:A, C

第9题:

When designing remote access to the Enterprise Campus network for teleworkers and mobileworkers, which of the following should the designer consider?()

  • A、 It is recommended to place the VPN termination device in line with the Enterprise Edge 1
  • B、 Maintaining access rules, based on the source IP of the client, on an internal firewall drawnfrom a headend RADIUS server is the most secure deployment
  • C、 VPN Headend routing using Reverse Route Injection (RRI) with distribution is recommended when the remote user community is small and dedicated DHCP scopes are in place
  • D、 Clientless SSL VPNs provide more granular access control than SSL VPN clients (thin or thick),including at Layer 7

正确答案:A

第10题:

What are two ways with which a small business can keep a wireless business separate and secure from a wireless guest access network? () 

  • A、 auto-channel selection
  • B、 WMM QoS
  • C、 802.11F roaming
  • D、 multiple BSSIDs
  • E、 802.1Q VLANs
  • F、 AP detection

正确答案:D,E

更多相关问题