Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Regarding the basic principles of user access security, it is wrong not to list any description?

A.

When a terminal device accesses the network, it first authenticates the user's identity through the access device, and the access device cooperates with the authentication server to complete the user Authentication.

B.

The terminal device directly interacts with the security policy server, and the terminal reports its own status information, including virus database version, operating system version, and terminal Information such as the patch version installed on the device.

C.

The security policy server checks the status information of the terminal, and for terminal devices that do not meet the corporate security standards, the security policy server reissues. The authorization information is given to the access device.

D.

The terminal device selects the answer to the resource to be accessed according to the result of the status check.

Which of the following options are right 802. 1X The description of the access process is correct? (Multiple choice).

A.

Through the entire authentication process, the terminal passes EAP The message exchanges information with the server.

B.

Terminal and 802.1X Switch EAP Message interaction,802.1X Switch and server use Radius Message exchange information

C.

802.1X Authentication does not require security policy checks.

D.

use MD5 The algorithm checks the information.

In the terminal security all-round defense system, use PPT-PDCA The model can effectively implement terminal security defense. Which of the following options does not belong to PPT Model?

A.

technology

B.

Process

C.

organization

D.

plan

URL filtering, remote classification list provided and maintained by a third-party classification servers, devices can be synchronous updated automatically or manually from third-party classification servers.

A.

TRUE

B.

FALSE

View on the switch Agile Controller-Campus The policy issued by the server is as follows:

For this strategy, which of the following options are correct? (Multiple choice)

A.

Common_ user Users can access Internet www H.

B.

VIP Users can access Internet w H.

C.

VIP Can visit Mail Server H.

D.

Common user Users can access Mail_ Sever resource.

If you use a normal account for authentication, which of the following descriptions is wrong?

A.

Users can use Any Office Perform authentication.

B.

User can't use web Way to authenticate.

C.

Users can use Web Agent Perform authentication.

D.

Users can use their own 802. 1X The client authenticates.

For the convenience of visitors, different authentication and master pages can be distributed for different visitors. When configuring the push page strategy, different matching conditions need to be defined, so which of the following options can be used as the limited matching conditions? (Multiple choice)

A.

Terminal P address

B.

Location information of the access device

C.

Priority of guest accounts

D.

Connected to the network SSID'

Jailbroken mobile terminal\Mobile terminals with non-compliant applications installed or terminals with non-compliant lock screen passwords connecting to the corporate network for office operations are not safe for companies. Any 0fice How to solve the problem of mobile office system?

A.

Directly discard data sent by devices that do not comply with regulations

B.

Certification of non-compliant equipment.

C.

Check for non-compliant terminals, Prohibit unsafe devices from accessing the network.

D.

Send alarm information to notify the administrator to deal with it.

When a guest needs to access the network through an account, which of the following methods can be used to access? (Multiple choice)

A.

Create new account

B.

Use existing social media accounts

C.

No authentication, no account required

D.

Scan public QR code

The use of the 802.1X authentication scheme generally requires the terminal to install specific client software. For large-scale deployment of client software, the methods that can be taken. What are the cases? (multiple choices)

A.

Enable Guest VLAN so that users can obtain the installation package in Guest VLAN

B.

Configure Free-rule and web push functions on the switch to push the installation package to users.

C.

Copy the installation packages to each other via U disk.

D.

Installed by the administrator for each user.