The RADIUS server
The EAPoL server
The workstation's network adapter
The Ethernet switch
第1题:
You must configure access to the corporate network for employees using a client access method. Users require IPsec tunneling to protected resources and an 802.1X supplicant. Users will access the network using Windows platforms.Which two client access methods would support these requirements?()
A. Junos Pulse
B. Java Agent
C. Odyssey Access Client
D. Native 802.1X supplicant
第2题:
Which two statements are correct when you use the reject parameter as the next-hop value for a static route?()
第3题:
To control the execution of a server process when it is receiving bad packets from a potentially malicious client, you set the SEC_PROTOCOL_ERROR_FURTHER_ACTION initialization parameter as follows:SQL> ALTER SYSTEM SET SEC_PROTOCOL_ERROR_FURTHER_ACTION = Drop,10;What is the significance of this setting?()
A. It terminates the client connection after 10 bad packets and the client cannot reconnect to the same instance.
B. It terminates the client connection after 10 bad packets but the client can still reconnect, and attempt the same operation again.
C. It terminates the client connection 10 seconds after receiving a bad packet and the client cannot reconnect to the same instance.
D. It terminates the client connection after receiving a bad packet and the client can reconnect to the same instance after 10 minutes.
第4题:
A users Junos Pulse client uses 802.1X to access a wired network and is failing to authenticate. You run a packet capture from the users PC and notice that immediately after the client machine sends an EAPoL-start packet, an EAP-failure packet is returned. You review the RADIUS troubleshooting logs on the MAG Series device and do not see any authentication attempts from the user. Other users on the same Ethernet switch are successfully authenticating. Which device is sending the EAP-failure packet to the workstation?()
第5题:
You must configure access to the corporate network for employees using a client access method. Users require IPsec tunneling to protected resources and an 802.1X supplicant. Users will access the network using Windows platforms.Which two client access methods would support these requirements?()
第6题:
A. Data, Frame, Packet, Segment, Bit
B. Data, Frame, Segment, Packet, Bit
C. Data, Packet, Frame, Segment, Bit
D. Data, Packet, Segment, Frame, Bit
E. Data, Segment, Frame, Packet, Bit
F. Data, Segment, Packet, Frame, Bit
第7题:
A user calls the help desk and explains that they just purchased a Macintosh computer. When they log into the network, the Odyssey Access Client is not automatically downloaded as it was when the user used their Windows PC.How do you resolve this issue?()
第8题:
Your IT director has decided to allow employees to use their laptops at home as well as in the office. You have deployed the Junos Pulse client to allow access to the offices 802.1X-enabled wired network. Your company also has the Junos Pulse Secure Access Service deployed. You want the Junos Pulse client to automatically launch the appropriate access method depending on each users location.Which three are supported to determine the users location?()
A. MAC address
B. DNS server
C. DHCP server
D. resolve address
E. endpoint address
第9题:
Your IT director has decided to allow employees to use their laptops at home as well as in the office. You have deployed the Junos Pulse client to allow access to the offices 802.1X-enabled wired network. Your company also has the Junos Pulse Secure Access Service deployed. You want the Junos Pulse client to automatically launch the appropriate access method depending on each users location. Which three are supported to determine the users location?()
第10题:
A PC on a network segment sends data to another PC on a different segment.Which of the following correctly describe the correct order of how this data will be encapsulated?()