Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

MAC Certification refers to 802.1x In the protocol authentication environment, the terminal does not respond to the connection control device after accessing the network 802.1x When protocol authentication is requested, the access control does not automatically obtain the terminal’s MAC The address is sent as a credential to access the network RADIUS The server performs verification.

A.

right

B.

wrong

Regarding uninstalling the Agile Controller-Campus in Windows and Linux systems, which of the following descriptions is correct?

A.

Use a common account to execute sh uninstall.sh in the Agile Controller/Uninstall directory to start the uninstallation program.

B.

Use the root account to execute sh uninstall.sh in the Agile Controller directory to start the uninstallation program. :

C.

On the Windows platform, select "Start>All Programs>Huawei>Agile Controller>Server Startup config".

D.

On the Windows platform, select "Start>All Programs> Huawei> Agile Controller>Uninstall

Which of the following options is Agile Controller-Campus middle SC The main function of the component?

A.

As Agile Controller-Campus The management center is responsible for formulating the overall strategy.

B.

As Agile Controller-Campus The management interface is used to configure and monitor the system.

C.

Integrated with standards RADIUS server,Porta Server, etc., responsible for linking with network access equipment to realize user-based network access control Strategy.

D.

As Agile Controller-Campus ’S security assistance server, responsible for iRadar Analysis and calculation of reported security incidents.

In the process of establishing CAPWAP channel between AP and AC, AP and AC negotiate to establish CAPWAP tunnel. In this process, CAPWAP tunnel is established.

Use DTLS to encrypt and transmit UDP packets. What are the encryption methods supported by DTLS? (multiple choice)

A.

Certificate encryption

B.

AES encryption

C.

PSK encryption

D.

Plaintext encryption

Portal At the time of certification, pass Web After the browser enters the account password for authentication, it prompts"Authenticating.."The status lasts for a long time before it shows that the authentication is successful. Which of the following reasons may cause this phenomenon?

A.

Multiple Agile Controller The same terminal IP Address added Portal"Access terminal IP Address list",Some of them Agile Controller The server and the terminal cannot communicate normally.

B.

Portal The template is configured with an incorrect password.

C.

Agile Controller-Campus There are too many authorization rules on the "It takes a lot of time to find 835

D.

Insufficient curtains of the terminal equipment result in a relatively large delay.

BY00 The products and textiles provided by the history solution program cover the entire terminal network\Application and management and other fields/include: Serialization BC Equipment, paperless network system network access support, VPN Gateway, terminal security customer ladder software, authentication system, mobile device management(MDN),move eSpace UC.

A.

right

B.

wrong

IPS custom signature in UTM supports you to set direction and protocol type.

A.

TRUE

B.

FALSE

Agile Controller-Campus The product architecture includes three levels. Which of the following options does not belong to the product architecture level?

A.

Server layer

B.

Network device layer

C.

Access control layer

D.

User access layer

The following configuration is in A with B The authentication commands are configured on the two admission control devices. For the analysis of the following configuration commands, which ones are correct? (Multiple choice)

A.

A What is configured on the device is MAC Bypass authentication

B.

B What is configured on the device is MAC Bypass authentication o

C.

A On the device 2GE1/01 Can access PC Can also access dumb terminal equipment

D.

B On the device GE1/0/1 Can access PC It can also access dumb terminal equipment. Upper

About the hardware SACG Certification deployment scenarios, which of the following descriptions are correct? (Multiple choice)

A.

SACG Authentication is generally used in scenarios where a stable network performs wired admission control.

B.

SACG Authentication is generally used in scenarios where new networks are used for wireless admission control.

C.

SACG It is generally deployed in a bypass mode without changing the original network topology.

D.

SACG Essentially through 802.1X Technology controls access users.