An Enterprise decides to implement Authentication Proxy for 

题目
单选题
An Enterprise decides to implement Authentication Proxy for per-user authentication for home offices. Each home office also supports an IP Phone. What should you do?()
A

Configure Access Control Lists to ensure Voice over IP traffic is checked by Auth Proxy.

B

Configure pNAT to ensure Voice over IP packets are properly translated.

C

Configure IOS firewall to permit RTP port numbers through the firewall via VPN. 

D

Configure Access Control Lists to allow Voice over IP traffic to bypass Auth Proxy checking.

参考答案和解析
正确答案: C
解析: 暂无解析
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

An administrator has been having problems with server security. Many of the servers have been infected with viruses in the past. Which of the following can be done to ensure that systems avoid OS exploits?()

A. Implement an intrusion detection system (IDS).

B. Implement a dual-factor authentication method.

C. Implement a patch management process.

D. Implement stronger user passwords.


参考答案:C

第2题:

What is a benefit of NTLMSSP over basic authentication?() 

  • A、 basic cannot be used in transparent proxy mode
  • B、 basic requiresreauthentication with every new domain
  • C、 NTLMSSP is compatible with open LDAP
  • D、 NTLMSSP is more secure than basic

正确答案:D

第3题:

Consider the Mysql Enterprise Audit plugin. The following event detail is found in the audit log:Which two points can be concluded from the given event?()

A.A connection as the user kate was successful

B.A connection failed due to authentication being unsuccessful

C.A connection was attempted via socket rather than TCP

D.A connection was blocked by a firewall or a similar security mechanism

E.A connection failed because the proxy user privileges did not match the login user


参考答案:B, E

第4题:

Which statement describes the Authentication Proxy feature?()

  • A、All traffic is permitted from the inbound to the outbound interface upon successful authentication of the user.
  • B、A specific access profile is retrieved from a TACACS+ or RADIUS server and applied to an IOS Firewall based on user provided credentials.
  • C、Prior to responding to a proxy ARP,the router will prompt the user for a login and password which are authenticated based on the configured AAA policy.
  • D、The proxy server capabilities of the IOS Firewall are enabled upon successful authentication of the user.

正确答案:B

第5题:

You need to design a PKI solution that meets business and security requirements. What should you do?()

  • A、Implement an enterprise root CA in the corp.woodgrovebank.com domain.Implement subordinate CAs in each child domain. Take the root CA offline
  • B、Implement an enterprise root CA in the corp.woodgrovebank.com domain
  • C、Implement an enterprise root CA in each of the child domains. Take the enterprise CA in each domain offline
  • D、Implement an enterprise root CA in the corp.woodgrovebank.com domain. Implement a stand-alone root CA in each of the child domains

正确答案:A

第6题:

Which statement about the S-Series native FTP proxy is not true?() 

  • A、 both active and passive modes FTP are supported
  • B、 by default the FTP proxy uses port 8021
  • C、 access polices may apply to native FTP traffic
  • D、 data loss prevention policies may apply to native FTP traffic
  • E、 authentication is supported in transparent mode

正确答案:E

第7题:

What are three features of the Cisco IOS Firewall feature set?()

  • A、network-based application recognition (NBAR)
  • B、authentication proxy
  • C、stateful packet filtering
  • D、AAA services
  • E、proxy server
  • F、IPS

正确答案:B,C,F

第8题:

When using RADIUS as an external authentication method for 802.1X authentication for the Junos Pulse Access Control Service, what must you do to ensure that the RADIUS authentication works properly?()

A. Configure IP helper to forward the authentication requests from the clients to the external RADIUS server

B. Configure the supplicant as anexternal authentication server

C. Configure RADIUS proxy on the realm

D. Specify the correct RADIUS port 389 on the Junos Pulse Access Control Service


参考答案:C

第9题:

You are the network administrator for Company. Company’s network consists of 200 Windows 2000 Professional computers. CompanyW1 is a Windows 2000 Server computer that hosts Company’s intranet site. CompanyP1 is a computer running Microsoft Proxy Server that is used by all computers on the network to access the Internet. You discover that CompanyP1 is experiencing performance degradation due to large number of requests to authenticate with the proxy server. You want to minimize the number of authentication requests to the proxy server. What should you do on each computer?()

  • A、Configure the proxy server settings to have a Secure proxy address of CompanyP1.
  • B、Configure the proxy server settings to bypass the proxy server for local addresses.
  • C、Add CompanyW1 to the Local intranet zone.
  • D、Add the CompanyW1 to the list of trusted sites.

正确答案:B

第10题:

Which statement about SNMP is true?()

  • A、SNMP version 2 uses a proxy agent to forward GetNext message to SNMP version 3.
  • B、SNMP version 2 supports message integrity to ensure that a packet has not been tampered with
  • C、Proxy agents were used only in SNMP version 1.
  • D、SNMP version 3 supports encryption and SNMP version 2 support authentication.
  • E、GetBulk messages are converted to GetNext messages by the proxy agent and are then forwarded to the SNMP version 1 agent.

正确答案:E

更多相关问题