单项选择题X 纠错

A. EAP-MD5 is not supported by the Junos Pulse Access Control Service
B. EAP-MD5 requires passwords to be stored in an encrypted format.
C. EAP-MD5 requires passwords to be stored in a clear text format.
D. EAP-MD5 performs a real time hash of the handset's MAC address.

参考答案:
查答案就用赞题库小程序 还有拍照搜题 语音搜题 快来试试吧
无需下载 立即使用

你可能喜欢

单项选择题

A. to specify the destination addresses to which access is permitted
B. to specify the source address permitted to access the resource
C. to specify the services to which access is permitted
D. to inform the enforcer to expect policy information from the Junos Pulse Access Control Service

多项选择题

A. The MAG Series device has multiple ports associated with the certificate.
B. The MAG Series device's serial number needs to be configured on the SRX Series device.
C. The SRX Series device must have a certificate signed by the same authority as the MAG Series device.
D. The MAG Series device and SRX Series device are not synchronized to an NTP server.

多项选择题

A. Username
B. LDAP user
C. Certificate
D. Custom expressions
E. Source y IP

多项选择题

A. Configure a location group
B. Createan authentication protocol set
C. Configure the RADIUS AV pair list
D. Configure RADIUS clients
E. Configure role and role-mapping rules

多项选择题

A. Create a "Settings Update file" in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under "User Roles" > "Agent" > "Odyssey Settings" > "Preconfigured Installer".
B. Configure a wired adapter and assign the required SSID under "User Roles" > "Agent" > "Odyssey Settings".
C. Create a script in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under "User Roles" > "Agent" > "Odyssey Settings" > "Preconfigured Installer".
D. Create a "Preconfiguration file" in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under "User Roles" > "Agent" > "Odyssey Settings" > "Preconfigured Installer".

多项选择题

A. Select "Require and Enforce" for the Host Checker Policy in the realm authentication policy.
B. Select "Evaluate Policies" for the Host Checker policy in the realm authentication policy.
C. Configure the Host Checker policy as a role restriction for the Employee role.
D. Configure the Host Checker policy as a resource access policy for the Employee role.

多项选择题

A. It proxies the authentication information between the supplicant and the authentication server.
B. It controls physical access to the network.
C. It communicates with the authentication server only.
D. It is responsible for verifying the identity of the supplicant through the use of an internal database.

赞题库

赞题库-搜题找答案

(已有500万+用户使用)


  • 历年真题

  • 章节练习

  • 每日一练

  • 高频考题

  • 错题收藏

  • 在线模考

  • 提分密卷

  • 模拟试题

无需下载 立即使用

版权所有©考试资料网(ppkao.com)All Rights Reserved