多选题You must configure access to the corporate network for employees using a client access method. Users require IPsec tunneling to protected resources and an 802.1X supplicant. Users will access the network using Windows platforms.Which two client access

题目
多选题
You must configure access to the corporate network for employees using a client access method. Users require IPsec tunneling to protected resources and an 802.1X supplicant. Users will access the network using Windows platforms.Which two client access methods would support these requirements?()
A

Junos Pulse

B

Java Agent

C

Odyssey Access Client

D

Native 802.1X supplicant

参考答案和解析
正确答案: C,A
解析: 暂无解析
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

You must configure access to the corporate network for employees using a client access method. Users require IPsec tunneling to protected resources and an 802.1X supplicant. Users will access the network using Windows platforms.Which two client access methods would support these requirements?()

  • A、Junos Pulse
  • B、Java Agent
  • C、Odyssey Access Client
  • D、Native 802.1X supplicant

正确答案:A,C

第2题:

Your company has deployed Network Access Protection (NAP).You configure secure wireless access to the network by using 802.1X authentication from any access point.You need to ensure that all client computers that access the network are evaluated by NAP. What should you do?()

  • A、Configure all access points as RADIUS clients to the Remediation Servers.
  • B、Configure all access points as RADIUS clients to the Network Policy Server (NPS).
  • C、Create a Network Policy that defines Remote Access Server as a network connection method. 
  • D、Create a Network Policy that specifies EAP-TLS as the only available authentication method.

正确答案:B

第3题:

You must configure access to the corporate network for employees using a client access method. Users require IPsec tunneling to protected resources and an 802.1X supplicant. Users will access the network using Windows platforms.Which two client access methods would support these requirements?()

A. Junos Pulse

B. Java Agent

C. Odyssey Access Client

D. Native 802.1X supplicant


参考答案:A, C

第4题:

Network Access Protection (NAP) is configured for the corporate network.Users connect to the corporate network by using portable computers.The company policy requires confidentiality of data when the data is in transit between the portable computers and the servers.You need to ensure that users can access network resources only from computers that comply with the company policy.What should you do?()

  • A、Create an IPsec Enforcement Network policy.
  • B、Create an 802.1X Enforcement Network policy.
  • C、Create a Wired Network (IEEE 802.3) Group policy.
  • D、Create an Extensible Authentication Protocol (EAP) Enforcement Network policy.

正确答案:A

第5题:

Your network consists of a single Active Directory domain. All servers run Windows Server 2008 R2.   All client computers run Windows 7. Some users have laptop computers and work remotely from home.   You need to plan a data provisioning infrastructure to secure sensitive files. Your plan must meet the following requirements:   èFiles must be stored in an encrypted format.   èFiles must be accessible by remote users over the Internet.   èFiles must be encrypted while they are transmitted over the Internet. What should you include in your plan?()

  • A、Deploy one Microsoft SharePoint Foundation 2010 site. Require users to access the SharePoint site by using a Secure Socket Transmission Protocol (SSTP) connection.
  • B、Deploy two Microsoft SharePoint Foundation 2010 sites.Configure one site for internal users. Configure the other site for remote users. Publish the SharePoint sites by using HTTPS.
  • C、Configure a Network Policy and Access Services (NPAS) server to act as a VPN server. Require remote users to access the files by using an IPsec connection to the VPN server.
  • D、Store all sensitive files in folders that are encrypted by using Encrypting File System (EFS). Require  remote users to access the files by using Secure Socket Transmission Protocol (SSTP).

正确答案:D

第6题:

You administer a network containing SRX Series firewalls. New policy requires that you implement MAG Series devices to provide access control for end users. The policy requires that the SRX Series devices dynamically enforce security policy based on the source IP address of the user. The policy also requires that the users communicate with protected resources using encrypted traffic. Which two statements are true?()

  • A、The endpoints can use agentless access.
  • B、Encrypted traffic flows between the endpoint and the enforcer.
  • C、Encrypted traffic flows between the endpoint and the protected resource
  • D、The endpoints can use the Odyssey Access Client.

正确答案:B,D

第7题:

Your company's corporate network uses Network Access Protection (NAP).Users are able to connect to the corporate network remotely.You need to ensure that data transmissions between remote client computers and the corporate network are as secure as possible. What should you do?()

  • A、Apply an IPsec NAP policy.
  • B、Configure a NAP policy for 802.1X wireless connections.
  • C、Configure VPN connections to use MS-CHAP v2 authentication.
  • D、Restrict Dynamic Host Configuration Protocol (DHCP) clients by using NAP.

正确答案:A

第8题:

Network Access Protection (NAP) is configured for the corporate network. Users connect to the corporate network by using portable computers. The company policy required confidentiality of data when the data is in transmit between the portable computers and the servers. You need to ensure taht users can access network resources only from computers that comply with the company policy. What should you do? ()

  • A、 Create an IPsec Enforcement Network policy
  • B、 Create an 802.1X enforcement network policy
  • C、 Create a wired network (IEEE 802.3) Group Policy
  • D、 Create an Extensible Authentication Portocol (EAP) Enforcement Network Policy

正确答案:A

第9题:

Your corporate network has a member server named RAS1 that runs Windows Server 2008 R2. You configure RAS1 to use the Routing and Remote Access Services (RRAS).The companys remote access policy allows members of the Domain Users group to dial in to RAS1. The company issues smart cards to all employees.You need to ensure that smart card users are able to connect to RAS1 by using a dial-up connection.What should you do?()

  • A、Install the Network Policy Server (NPS) server role on RAS1.
  • B、Create a remote access policy that requires users to authenticate by using SPAP.
  • C、Create a remote access policy that requires users to authenticate by using EAP-TLS.
  • D、Create a remote access policy that requires users to authenticate by using MS-CHAP v2.

正确答案:C

第10题:

You need to design an e-mail access strategy for remote users. What should you do? () 

  • A、 Instruct remote users to connect to their e-mail by using RPC
  • B、 Instruct remote users to connect to Outlook Web Access by using only HTTPS
  • C、 Instruct remote users to connect to the company network by using PPTP connections
  • D、 Instruct remote users to connectd to their e-mail by using RPC over HTTP Configure the HTTP servers to require encryption.

正确答案:D

更多相关问题