Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

The multi-level defense system is mainly reflected in the network level and the system level. Which of the following options are used for security defense at the network level? (Multiple choice)

A.

software SACG

B.

hardware SACG

C.

802.1X switch

D.

Authentication server

There is a three-layer forwarding device between the authentication client and the admission control device:If at this time Portal The certified three-layer authentication device can also obtain the authentication client's MAC address,So you can use IP Addressand MC The address serves as the information to identify the user.

A.

True

B.

False

Jailbroken mobile terminal\Mobile terminals with non-compliant applications installed or terminals with non-compliant lock screen passwords connecting to the corporate network for office operations are not safe for companies. Any 0fice How to solve the problem of mobile office system?

A.

Directly discard data sent by devices that do not comply withregulations

B.

Certification of non-compliant equipment.

C.

Check for non-compliant terminals, Prohibit unsafe devices from accessing the network.

D.

Send alarm information to notify the administrator to deal with it.

MAC Certification refers to 802.1x In the protocol authentication environment, the terminal does not respond to the connection control device after accessing the network 802.1x When protocol authentication is requested, the access control does not automatically obtain the terminal’s MAC The address is sent as a credential to access the network RADIUS The server performs verification.

A.

True

B.

False

Web Standards that come with the client and operating system 8021 The instrument client only has the function of identity authentication: It does not support the execution of inspection strategies and monitoring strategies. Any Office The client supports all inspection strategies and monitoring strategies.

A.

True

B.

False

The terminal host access control function does not take effect, the following is SACG View information on:

display right- manager role-id rule

Advanced ACL 3099 ,25 rules,not bingding with vpn-instance Ad's step is 1

rule 1000 permit ip (1280 times matched)

rule 1001 permit ip destination 172.18.11.2210 (581 times matched)

rule 1002 permit ip destination 172:18.11.2230 (77 times matched)

rule 1003 permit ip destination 172.19.0.0 0.0 255.255 (355 Book times matched)

rule 1004 deny ip (507759 times matched)

Which of the following statements is correct?

A.

172.18.11.221 It is the server of the isolation domain.

B.

The escape route wasopened.

C.

172.18.11.223 It is a post-domain server.

D.

The terminal host stream is the default ACL Blocked.

The following is the 802.1X access control switch configuration:

[S5720]dot1x authentication-method eap

[S5720-GigabitEthernet0/0/1] port link-type access

[S5720-GigabitEthemet0/0/1] port default vlan 11

[S5720-GigabitEthernet0/0/1] authentication dot1x

Assuming that GE0/0/1 is connected to user 1 and user 2through the HUB, which of the following options is correct?

A.

After user 1 is authenticated, user 2 can access network resources without authentication

B.

User 1 and User 2 must be individually authenticated before they can access networkresources

C.

GE0/0/1 does not need to enable dot1X

D.

Neither user 1 nor user 2 can pass the authentication and access network resources.

Which of the following cybersecurity threats exist only in WLAN In the network?

A.

Brute force

B.

Crowd attack

C.

DoS Denial of service attack

D.

Weak IV attack

Using Agile Controller-Campus for visitor management, users can obtain the account they applied for in a variety of ways, but which of the following are not included A way?

A.

Short message

B.

E-mail

C.

Web Print

D.

Voicemail

VIP Experience guarantee, from which two aspects are the main guaranteesVIP User experience? (Multiple choice)

A.

bandwidth

B.

Forwarding priority

C.

Authority

D.

Strategy