Which three authentication server types are supported for retrieving user attributes used in role- mapping rules?()
第1题:
A. ping
B. FTP
C. Telnet
D. HTTP
E. HTTPS
第2题:
A. DES
B. MD5
C. Kerberos
D. unauthenticated
E. simple password
第3题:
A. Authentication server
B. Session options
C. Authentication policy
D. End-point security policy
E. Role-mapping rules
第4题:
Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by ESP?() (Choose three.)
第5题:
Which of the following procedures are involved in the recommended three-step troubleshootingflow?(Choose the best three answers.)()
第6题:
A. SHA-1
B. MD5 authentication
C. version 1 messages
D. version 2 messages
E. plain-text authentication
第7题:
Which three are current small business needs for technology investments? ()
第8题:
A. Authentication enforcer
B. Directory server
C. Captive authentication
D. Authentication policy
E. Role-mapping rules
第9题:
On which three traffic types does firewall pass-through authentication work? ()(Choose three.)
第10题:
An authentication realm consists of which three authentication resources?()