Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

After configuring theannouncement,Agile Controller-Campus The system cannot assign this announcement to which of the following objects?

A.

Assign to user

B.

Assigned to account

C.

Assign to terminal IP Address range

D.

Assigned to places

In some scenarios, ananonymous account can be used for authentication. What are the correct descriptions of the following options for the anonymous account?? (Multiple choice)

A.

The use of anonymous accounts for authentication is based on the premise of trusting the other party, and the authentication agency does not need the other party to provide identity information to provide services to the other party.

B.

Agile Controller-Campus Need to be manually created"~anonymous"account number.

C.

By default, the access control andpolicy of anonymous accounts cannot be performed. 1 Operations such as invoking patch templates and software distribution.

D.

Administrators cannot delete anonymous accounts"~anonymous*.

What are the three main steps of business free deployment? (Multiple choice)

A.

Define security group

B.

Define and deploy group policies

C.

The system runs automatically

D.

Security group reported by the system

E.

Define user groups

The visitor management process includes page customization, account application, user authentication, audit, and logout. After the user successfully applies for an account, he needs to change.

When the account is distributed to users, what stage does the distribution of the account belong to?

A.

Page customization stage

B.

Account application stage

C.

User authentication phase

D.

Audit and cancellation stage

The following configuration is in A with B The authentication commands are configured on the two admission control devices. For the analysis of the following configuration commands, which ones are correct? (Multiple choice)

A.

A What is configured on the device is MAC Bypass authentication

B.

B What is configured on the device is MAC Bypass authentication o

C.

A On the device 2GE1/01 Can access PC Can also access dumb terminal equipment

D.

B On the device GE1/0/1 Can access PC It can also access dumb terminal equipment. Upper

Regarding the role of each role in the Portal authentication framework, which of the following descriptions are correct? (multiple choice)

A.

The AAA server saves information such as usernames and passwords for authentication of access users.

B.

The Web server saves informationsuch as user names and passwords for authentication of access users.

C.

The AAA server is used to push the Portal authentication page to the user.

D.

The web server is used to push the Portal authentication page to the user.

In Portal authentication, which of the following parameters must be configured on the switch? (Multiple choice)

A.

Portal server IP

B.

Portal page URL

C.

shared-key

D.

Portal Protocol version

Portal authentication on the Agile Controller-Campus has been configured and is correct.

Configure the following commands on the access control switch:

[S5720] authentication free-rule 1 destination ip 10.1.31.78 mask 255.255. 255.255

Which of the following options are correct? (multiple choice)

A.

After the configuration is complete, the switch will automatically release the data flow to access the security controller,No need for manual configuration by the administrator.

B.

This configuration allows users to access network resources before authentication.

C.

After the configuration is complete, the administrator still needs to manually configure the release network segment

D.

Only after the authentication is passed, the terminal can access 10.1.31.78 Host.

Regarding the file source set in the software management, which of the following descriptions is correct?

A.

When the file source is an internal data source, when distributing software, the business manager will only send thepath of the data source of the software to be distributed to Any Office

B.

When the file source is an external data source, Any 0fce will obtain the software to be distributed.

C.

External data sources cannot distribute files from FTP-type file servers.

D.

The Microsoft Windows file sharing server uses the UNC (Universal Naming Conversion) path (beginning with "\\") to provide waiting. The path to distribute the software.

The useraccesses the network through the network access device, and the third-party RADIUS server authenticates and authorizes the user. Regarding the certification process, which of the following options is wrong?

A.

Configure RADIUS authentication and accountingon the RADIUS server.

B.

Configure the Agile Controller-Campus for local data source authentication, receive the packets sent by the device, and perform authentication.

C.

Configure RADIUS authentication and accounting on the device side. W"

D.

ConfigureRADIUS authentication and authorization on the Agile Controller-Campus.