多选题What are two roles of the authenticator as described in the 802.1X standard? ()AIt proxies the authentication information between the supplicant and the authentication server.BIt controls physical access to the network.CIt communicates with the authent

题目
多选题
What are two roles of the authenticator as described in the 802.1X standard? ()
A

It proxies the authentication information between the supplicant and the authentication server.

B

It controls physical access to the network.

C

It communicates with the authentication server only.

D

It is responsible for verifying the identity of the supplicant through the use of an internal database.

参考答案和解析
正确答案: D,A
解析: 暂无解析
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

When using RADIUS as an external authentication method for 802.1X authentication for the Junos Pulse Access Control Service, what must you do to ensure that the RADIUS authentication works properly?()

A. Configure IP helper to forward the authentication requests from the clients to the external RADIUS server

B. Configure the supplicant as anexternal authentication server

C. Configure RADIUS proxy on the realm

D. Specify the correct RADIUS port 389 on the Junos Pulse Access Control Service


参考答案:C

第2题:

What is not a difference between VPN tunnel authentication and per-user authentication?()

  • A、VPN tunnel authentication is part of the IKE specification. 
  • B、VPN tunnel authentication does not control which end user can use the IPSec SA (VPN tunnel).
  • C、User authentication is used to control access for a specific user ID, and can be used with or without a VPN tunnel for network access authorization. 
  • D、802.1X with EAP-TLS (X.509 certificates) can be used to authenticate an IPSec tunnel.

正确答案:D

第3题:

What are two steps to configure user authentication for a Junos Pulse Access Control Service?()

A. Configure an authentication policy as part of the user role definitions.

B. Configure a Sign-in Policy.

C. Configure authentication agents as part of the user role definitions

D. Configure an authentication policy as part of the authentication realm definition.


参考答案:B, D

第4题:

The database instance has the following parameter setting: OS_AUTHENT_PREFIX = OPS$ OS_ROLES = FALSE  REMOTE_OS_AUTHENT = FALSE REMOTE_OS_ROLES = FALSE TIMED_OS_STATISTICS = 0  You have a local operating system user SKD. You create a database user OPS$SKD, and then  assignexternal authentication. The user OPS$SKD has the CREATE SESSION privilege.  What would youachieve by the above process()

  • A、The database user OPS$SKD will be able to administer the database.
  • B、The authentication detail for the database user OPS$SKD is recorded in the password file.
  • C、The local operating system user SKD will be able to access the database instance without specifying the username and password.
  • D、The database user OPS$SKD has to login with the password of the local operating system user SKD to access the database instance.

正确答案:C

第5题:

Which two pieces of information are needed when declaring the web resource collection in the deployment descriptor?()

  • A、 the URL pattern that requires authorization
  • B、 the HTTP methods that require authorization
  • C、 the users allowed access to the web resource
  • D、 the J2EE roles allowed access to the web resource
  • E、 the authentication mechanism required by the web resource

正确答案:A,B

第6题:

What will serve as a RADIUS Client to the Infranet Controller for 802.1x authentication? ()

A. an ACE server

B. a wireless network

C. an Ethernet switch

D. Odyssey Access Client


参考答案:C

第7题:

In an IEEE 802.1x deployment,between which two devices EAPOL messages typically are sent?()

  • A、Between the supplicant and the authenticator
  • B、Between the authenticator and the authentication server
  • C、Between the supplicant and the authentication server
  • D、Between the RADIUS server and the authenticator

正确答案:A

第8题:

What are two roles of the authenticator as described in the 802.1X standard? ()

A. It proxies the authentication information between the supplicant and the authentication server.

B. It controls physical access to the network.

C. It communicates with the authentication server only.

D. It is responsible for verifying the identity of the supplicant through the use of an internal database.


参考答案:A, B

第9题:

What are two steps to configure user authentication for a Junos Pulse Access Control Service?()

  • A、Configure an authentication policy as part of the user role definitions.
  • B、Configure a Sign-in Policy.
  • C、Configure authentication agents as part of the user role definitions
  • D、Configure an authentication policy as part of the authentication realm definition.

正确答案:B,D

第10题:

What are two roles of the authenticator as described in the 802.1X standard? ()

  • A、It proxies the authentication information between the supplicant and the authentication server.
  • B、It controls physical access to the network.
  • C、It communicates with the authentication server only.
  • D、It is responsible for verifying the identity of the supplicant through the use of an internal database.

正确答案:A,B

更多相关问题