单选题Clients using cisco-leap and eap-fast authentication are having no problems logging on to The wireless network, but clients using peap are failing to log on. Which situation would result in this type of problem?()A posture validation has not been enabl

题目
单选题
Clients using cisco-leap and eap-fast authentication are having no problems logging on to The wireless network, but clients using peap are failing to log on. Which situation would result in this type of problem?()
A

posture validation has not been enabled.

B

the aaa server is set to accept both ms-chap v2 and gtc for peap authentication.

C

clients and server are not using certificates.

D

clients have been set to validate the server identity.


相似考题
参考答案和解析
正确答案: D
解析: 暂无解析
更多“Clients using cisco-leap and eap-fast authentication are hav”相关问题
  • 第1题:

    Which two statements about the open and shared key wireless-authentication methods are true? ()

    • A、 Shared key authentication is considered more secure than open authentication.
    • B、 Shared key authentication is considered less secure than open authentication.
    • C、 If the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer data.
    • D、 If the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer data.
    • E、 If the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data.

    正确答案:B,D

  • 第2题:

    To implement the optional phase zero when using EAP-FAST for authentication, which of the following parameters must be set on the Cisco Secure ACS?()

    • A、EAP-FAST master server
    • B、Allow automatic PAC provisioning
    • C、client initial message
    • D、authority ID info

    正确答案:B

  • 第3题:

    Clients using Cisco-LEAP and EAP-FAST authentication are having no problems logging on to thewireless network,but clients using PEAP are failing to log on. Which situation would result in thistype ofproblem?()

    • A、Posture validation has not been enabled.
    • B、The AAA server is set to accept both MS-CHAP v2 and GTC for PEAP authentication.
    • C、Clients and server are not using certificates.
    • D、Clients have been set to validate the server identity.

    正确答案:C

  • 第4题:

    Your company has deployed Network Access Protection (NAP).You configure secure wireless access to the network by using 802.1X authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP.  What should you do?()

    • A、Configure all access points as RADIUS clients to the Remediation Servers.
    • B、Configure all access points as RADIUS clients to the Network Policy Server (NPS).
    • C、Create a Network Policy that defines Remote Access Server as a network connection method.
    • D、Create a Network Policy that specifies EAP-TLS as the only available authentication method.

    正确答案:B

  • 第5题:

    单选题
    Clients using Cisco-LEAP and EAP-FAST authentication are having no problems logging on to the wirelessnetwork, but clients using PEAP are failing to log on. Which situation would result in this type of problem?()
    A

    The AAA server is set to accept both MS-CHAP v2 and GTC for PEAP authentication.

    B

    Clients have been set to validate the server identity.

    C

    Posture validation has not been enabled.

    D

    Clients and server are not using certificates.


    正确答案: C
    解析: 暂无解析

  • 第6题:

    单选题
    Clients using Cisco-LEAP and EAP-FAST authentication are having no problems logging on to thewireless network, but clients using PEAP are failing to log on. Which situation would result in thistype ofproblem?()
    A

    Posture validation has not been enabled

    B

    The AAA server is set to accept both MS-CHAP v2 and GTC for PEAP authentication

    C

    Clients and server are not using certificates

    D

    Clients have been set to validate the server identity


    正确答案: B
    解析: 暂无解析

  • 第7题:

    单选题
    When using RADIUS as an external authentication method for 802.1X authentication for the Junos Pulse Access Control Service, what must you do to ensure that the RADIUS authentication works properly?()
    A

    Configure IP helper to forward the authentication requests from the clients to the external RADIUS server

    B

    Configure the supplicant as anexternal authentication server

    C

    Configure RADIUS proxy on the realm

    D

    Specify the correct RADIUS port 389 on the Junos Pulse Access Control Service


    正确答案: C
    解析: 暂无解析

  • 第8题:

    多选题
    Which two statements regarding firewall user authentication client groups are true?()
    A

    Individual clients are configured under client groups in the configuration hierarchy.

    B

    Client groups are configured under individual clients in the configuration hierarchy.

    C

    Client groups are referenced in security policy in the same manner in which individual clients are referenced.

    D

    Client groups are used to simplify configuration by enabling firewall user authentication without security policy.


    正确答案: D,A
    解析: 暂无解析

  • 第9题:

    单选题
    To implement the optional phase zero when using eap-fast for authentication, which of the following parameters must be set on the cisco secure acs?()
    A

    eap-fast master server

    B

    allow automatic pac provisioning

    C

    client initial message

    D

    authority id info


    正确答案: C
    解析: 暂无解析

  • 第10题:

    Company.com network consists of a single Active Directory domain named  Company.com.Company.com has an Exchange Server 2010 organization.The Company.com employees use Microsoft Office Outlook 2007 to connect to their mailboxes.RPC over HTTP and Auto discover are configured on Microsoft Office Outlook 2007. A new Company.com security policy requires that the employees connected to the domain does not need authentication when using Outlook Anywhere.However, those not connected t the domain needs to be authentication when using Outlook Anywhere.The employees need to comply with the new Company.com security policy.  What should you do?()

    • A、You should consider using Basic authentication on Outlook Anywhere and set up only Basic authentication on the RPC virtual directory.
    • B、You should consider using NTLM authentication on Outlook Anywhere and set up Basic authentication and NTLM authentication on the RPC virtual directory.
    • C、You should consider using NTLM authentication on Outlook Anywhere and set up only Basic authentication on the RPC virtual directory.
    • D、You should consider using Basic authentication on Outlook Anywhere and set up Basic authentication and NTLM authentication on the RPC virtual directory.

    正确答案:B

  • 第11题:

    Which of the following commands configures the cisco 3845 integrated services router to allow eap-fast authentication using wds?()

    • A、router (config)# wlccp authentication-server infrastructure eap group_1
    • B、router (config)# wlccp authentication-server infrastructure eap-fast group_1
    • C、router (config)# wlccp authentication-server client eap-fast group_1
    • D、router (config)# wlccp authentication-server client eap group_1

    正确答案:D

  • 第12题:

    On a standalone access point, client association using EAP-Cisco Wireless (Cisco-LEAP) isfailing, but association using EAP-PEAP is functioning. What needs to be enabled on the standalone accesspoint to correct this issue?()

    • A、network EAP
    • B、open authentication plus MAC
    • C、open authentication plus EAP
    • D、a shared key

    正确答案:A

  • 第13题:

    Your company has deployed Network Access Protection (NAP). You configure secure wireless access to the network by using 802.1x authentication from any access point. You need to ensure that all client computers that access the network are evaluated by NAP.  what should you do()? 

    • A、Configure all access points as RADIUS clients to the Remediation Servers
    • B、Configure all access points as RADIUS clients to the Network Policy Server (NPS)
    • C、Create a Network Policy that defines Remote Access Server as a network connection method
    • D、Create a Network Policy that specifies EAP-TLS as the only availible authentication method.

    正确答案:B

  • 第14题:

    多选题
    You are designing a service that will use the Windows Azure AppFabric Service Bus.  You need to recommend an approach for controlling access to the service by using the Windows Azure AppFabric Access Control Service. Which two actions should you recommend?()
    A

    Configure the service to not require authentication.

    B

    Configure the service to require a relay access token.

    C

    Specify message security for all communications between clients and the service.

    D

    Specify transport security for allcommunications between clients and the service.


    正确答案: A,B
    解析: 暂无解析

  • 第15题:

    单选题
    Clients using Cisco-LEAP and EAP-FAST authentication are having no problems logging on to thewireless network,but clients using PEAP are failing to log on. Which situation would result in thistype ofproblem?()
    A

    Posture validation has not been enabled.

    B

    The AAA server is set to accept both MS-CHAP v2 and GTC for PEAP authentication.

    C

    Clients and server are not using certificates.

    D

    Clients have been set to validate the server identity.


    正确答案: D
    解析: 暂无解析

  • 第16题:

    单选题
    On a standalone access point, client association using EAP-Cisco Wireless (Cisco-LEAP) is failing, butassociation using EAP-PEAP is functioning. What needs to be enabled on the standalone access point tocorrect this issue?()
    A

    a shared key

    B

    network EAP

    C

    open authentication plus EAP

    D

    open authentication plus MAC


    正确答案: B
    解析: 暂无解析

  • 第17题:

    多选题
    Which two statements about the open and shared key wireless-authentication methods are true? ()
    A

    Shared key authentication is considered more secure than open authentication.

    B

    Shared key authentication is considered less secure than open authentication.

    C

    If the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer data.

    D

    If the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer data.

    E

    If the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data.


    正确答案: C,B
    解析: 暂无解析