Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

If you deploy Free Mobility, in the logic architecture of Free Mobility, which of the following options should be concerned by the administrator?

A.

Is the strategy automatically deployed?

B.

Choose the appropriate policy control point and user authentication point

C.

Does the strategy deployment target a single user?

D.

Does the strategy deployment target a single department?

In the WLAN wireless access scenario, which of the following network security technologies belong to user access security? (Multiple choice)

A.

AP Certification

B.

Link authentication

C.

User access authentication

D.

data encryption

Which of the following options are correct for the description of visitor management? (Multiple choice)

A.

Visitor registration account can be configured to be exempt from approval

B.

Guest login can only be configured as Web Way of webpage

C.

Anonymous account authentication cannot be performed on the guest authentication page

D.

Visitor account approval information can be notified to visitors via SMS

What are the three main steps of business free deployment? (Multiple choice)

A.

Define security group

B.

Define and deploy group policies

C.

The system runs automatically

D.

Security group reported by the system

E.

Define user groups

What do the common virus behavior characteristics include?(select 3 answers)

A.

Download and backdoor characteristics

B.

Information Collection feature

C.

own hidden feature

D.

system attacks characteristics

Portal The second-level authentication method of authentication refers to the direct connection between the client and the access device(Or only layer devices exist in between),The device can learn the user’s MAC Address and can be used IP with MAC Address to identify the user.

A.

right

B.

wrong

Which statement is wrong about SA principle configuration?

A.

feature detection to identify the different applications by matching message feature and Knowledge Base feature set

B.

reduces the maximum number of packets detection threshold, can reduce the sas module identification number of packets, thus improve the recognition rate agreement

C.

There are some protocol packets are carried in other agreements, enable sa whole packet inspection can better detect such messages

D.

Configure SA associated protocol identification is mainly used for the same data stream signaling channel and data channel associated with the identification , and thus identify protocol

Security zone division means to better protect the internal network security,Based on the business type and security requirements of the intranet, divide the intranet into several granularities.

Logical area. Which of the following options does not belong Agile Controller-Campus Security domain?

A.

User domain

B.

Network domain

C.

Business domain:

D.

Attack domain

Which of the following law items is the most blessed for safety? This should be true?

A.

Checking strategies are mainly used to check some static settings of the terminal, such as whether the screen saver is set, whether the antivirus software is installed; whether there is illegal Outreach etc. z00

B.

Monitoring strategies are mainly used for real-time monitoring of events that occur in the system, such as whether anti-virus software is installed and whether PPPOE dial-up access is used Network, etc.-Once an incident is detected, some control can be taken.

C.

The security check strategy only includes two types of end-host check-type strategies and end-user behavior check-type strategies.

D.

Terminal host security management is mainly implemented by inspection strategies, and end user behavior management is mainly implemented by monitoring strategies.

Agile Controller-Campus The system architecture belongs to C/S Architecture.

A.

right

B.

wrong