单选题A customer is trying to decide which 802.1X inner protocol to use on their network. The customer requires that nopasswords be sent across the network in plain text, that the protocol be supported by the Windows native supplicant,and that the protocol s

题目
单选题
A customer is trying to decide which 802.1X inner protocol to use on their network. The customer requires that nopasswords be sent across the network in plain text, that the protocol be supported by the Windows native supplicant,and that the protocol supports password changes at Layer 2. Which protocol would meet the customers needs?()
A

EAP-TLS

B

EAP-MD5

C

PAP

D

EAP-MSCHAPv2

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

A customer has installed UAC in their network. They have both Windows and Linux endpoints andmust choose a deployment method that everyone can use. Which deployment method allows for multiple platforms? ()

A. IPsec enforcement

B. 802.1X enforcement

C. Source IP enforcement

D. Odyssey Access Client


参考答案:C

第2题:

Which two of these are characteristics of the 802.1Q protocol?()

A. it is a layer 2 messaging protocol which maintains vlan configurations across network.

B. it includes an 8-bit field which specifies the priority of a frame.

C. it is used exclusively for tagging vlan frames and dose not address network reconvergence following switched network topology changes.

D. it modifies the 802.3 frame header,and thus requires that the FCS be recomputed.

E. it is a trunking protocol capable of carring untagged frames.


参考答案:D, E

第3题:

A customer is trying to determine which client to deploy. The customer wants to be able to perform Layer 2 authentication as well as connect to the Junos Pulse Secure Access Service.Which client should the customer deploy?()

A. Windows native supplicant

B. Odyssey Access Client

C. Junos Pulse

D. Network Connect


参考答案:C

第4题:

For the following statements, which one is perceived as a drawback of implementing Fibre ChannelAuthentication Protocol (FCAP)?()

  • A、It is restricted in size to only three segments
  • B、It requires the use of netBT as the network protocol
  • C、It requires the implementation of IKE
  • D、It relies on an underlying Public Key Infrastructure

正确答案:D

第5题:

As a network engineer at Certpaper.com, you are responsible for Certpaper network. Which will benecessarily taken into consideration when implementing Syslogging in your network?()

  • A、Enable the highest level of Syslogging available to ensure you log all possible event messages
  • B、Use SSH to access your Syslog information
  • C、Log all messages to the system buffer so that they can be displayed when accessing the router
  • D、Syncronize clocks on the network with a protocol such as Network Time Protocol

正确答案:D

第6题:

Your customer wants to build a network for a financial trading floor that has a requirement for multiple high-value transactions, which are also vital to the customer. What are the two most critical requirements? ()(Choose two.)

A. no single point of failure

B. trading database server location

C. redundant application servers location

D. deterministic response to all failures

E. determine which protocol to use


参考答案:A, D

第7题:

A customer is trying to decide which 802.1X inner protocol to use on their network. The customer requires that nopasswords be sent across the network in plain text, that the protocol be supported by the Windows native supplicant,and that the protocol supports password changes at Layer 2. Which protocol would meet the customers needs?()

  • A、EAP-TLS
  • B、EAP-MD5
  • C、PAP
  • D、EAP-MSCHAPv2

正确答案:D

第8题:

A customer is trying to decide which 802.1X inner protocol to use on their network. The customer requires that nopasswords be sent across the network in plain text, that the protocol be supported by the Windows native supplicant,and that the protocol supports password changes at Layer 2.Which protocol would meet the customers needs?()

A. EAP-TLS

B. EAP-MD5

C. PAP

D. EAP-MSCHAPv2


参考答案:D

第9题:

Which two of these are recommended practices with trunks? ()

  • A、 use ISL encapsulation
  • B、 use 802.1q encapsulation
  • C、 set ISL to desirable and auto with encapsulation negotiate to support ILS protocol negotiation
  • D、 use VTP server mode to support dynamic propagation of VLAN information across the network 
  • E、 set DTP to desirable and desirable with encapsulation negotiate to support DTP protocol negotiation.

正确答案:B,E

第10题:

Your customer wants to build a network for a financial trading floor that has a requirement formultiple high-value transactions, which are also vital to the customer. What are the two mostcritical requirements?() (Choose two.)

  • A、no single point of failure
  • B、trading database server location
  • C、redundant application servers location
  • D、deterministic response to all failures
  • E、determine which protocol to use

正确答案:A,D

更多相关问题