About the hardware SACG Certification deployment scenarios, which of the following descriptions are correct? (Multiple choice)
If you are deploying BYOD When the system is installed, use a stand-alone installation SM, Dual-machine installation SC, Stand-alone hardware deployment AE,Which of the following descriptions are correct? (Multiple choice)
Administrator creates the correct IPS strategy, applied to domain or inter-domain , but found that no matter in the IPS signature set movement is blocking or alarm, when the invasion attack, only produce the
alarm.
What is the reason for this problem?
Business accompanying is-A special access control method, according to the user's access location, access time, access method and terminal use to grant designated investment limits, among which the physical connection can be divided into 3 Class, excluding which of the following access methods?
About in WLAN User isolation technology is used in the networking environment. Which of the following statements is wrong?
Which of the following equipment is suitable for use MAC Authentication access network?
The use of the 802.1X authentication scheme generally requires the terminal to install specific client software. For large-scale deployment of client software, the methods that can be taken. What are the cases? (multiple choices)
According to different reliability requirements, centralized networking can provide different reliability networking solutions. Regarding these solutions, which of the following descriptions are correct? (Multiple choice)
For the terminal Wi-Fi The order of the push, which of the following is correct?
1. Any Office Mobile office system push Wi-Fi Configuration
2. Any Office The mobile office department automatically applies for a certificate.
3. The administrator configures the enterprise Wi-Fi Push.
4. The terminal automatically connects to the enterprise Wi-Fi.
Visitors refer to users who need temporary access to the network at a specific location.
Which of the following statement is not correct about application and identification of knowledge base upgrade?
After the user is successfully authenticated, Agile Controller-Campus Which of the following actions can be performed on the user(Multiple choice)
Which of the following options is right PKI The sequence description of the work process is correct?
1. PKI Entity direction CA ask CA Certificate. .
2. PKI Entity received CA After the certificate, install CA Certificate.
3. CA receive PKI Entity CA When requesting a certificate, add your own CA Certificate reply to PKI entity.
4. PKI Entity direction CA Send a certificate registration request message.
5. PKI When the entities communicate with each other, they need to obtain and install the local certificate of the opposite entity.
6. PKI Entity received CA The certificate information sent.
7. PKI After the entity installs the local certificate of the opposite entity,Verify the validity of the local certificate of the peer entity. When the certificate is valid,PC The public key of the certificate is used for encrypted communication between entities.
8. CA receive PKI The entity's certificate registration request message.
After configuring the announcement,Agile Controller-Campus The system cannot assign this announcement to which of the following objects?
Which of the following options is about SACG The description of the online process is wrong?
In the Agile Controller-Campus admission control scenario, regarding the role description of the RADIUS server I client, which of the following is positive True?
Portal authentication on the Agile Controller-Campus has been configured and is correct.
Configure the following commands on the access control switch:
[S5720] authentication free-rule 1 destination ip 10.1.31.78 mask 255.255. 255.255
Which of the following options are correct? (multiple choice)
Regarding MAC authentication and MAC bypass authentication, which of the following descriptions are correct? (multiple choice)
A network administrator configure IP function, when the signed agreement is http, will only detect http header information.
Hardware in useSACG At the time of certification,SACG After the configuration is completed, you can seeSACG andAgile Agile Controller-Campus The linkage is successful, but the user authentication fails. This phenomenon may be caused by the following reasons? (Multiple choice)
The user accesses the network through the network access device, and the third-party RADIUS server authenticates and authorizes the user. Regarding the certification process, which of the following options is wrong?
According to the different user name format and content used by the access device to verify user identity, the user name format used for MAC authentication can be changed.
There are three types. Which of the following formats is not included?
In the Agile Controller-Campus solution, which device is usually used as the hardware SACG?
Install Agile Controller-Campus Which of the following steps do not need to be completed before?
Regarding the trigger mechanism of 802.1X authentication, which of the following descriptions is correct? (multiple choice)