Deploying on Windows platform, using SQL Server database About the HA function of Agile Cotoller-Campus, which of the following descriptions Is it correct? (multiple choice)
The traditional campus network is based on IP As the core network, if there are mobile office users, which of the following options is not the problem that mobile office users face when deploying access authentication?
Which of the following options is Agile Controller-Campus middle SC The main function of the component?
In the Agile Controller-Campus admission control technology framework, regarding the description of RADIUS, which of the following options is correct?
How to check whether the SM and SC silverware start normally after installing the Agile Controller-Campus) (multiple delivery)
Which of the following description is incorrect against server loophole security threats ?
In some scenarios, an anonymous account can be used for authentication. What are the correct descriptions of the following options for the anonymous account?? (Multiple choice)
In Portal authentication, which of the following parameters must be configured on the switch? (Multiple choice)
Portal The second-level authentication method of authentication refers to the direct connection between the client and the access device(Or only layer devices exist in between),The device can learn the user’s MAC Address and can be used IP with MAC Address to identify the user.
An account can belong to multiple roles, that is, a user may hold multiple positions.
Enterprise Intranet users access to the Internet, what may cause the UFL filtering function failure? (Select 3 answers)
MAC Certification refers to 802.1x In the protocol authentication environment, the terminal does not respond to the connection control device after accessing the network 802.1x When protocol authentication is requested, the access control does not automatically obtain the terminal’s MAC The address is sent as a credential to access the network RADIUS The server performs verification.
In the scenario of SACG linkage in bypass mode, only the traffic initiated by the terminal user will pass through the firewall, and the server will return to the terminal in use.
The traffic does not need to go through the firewall y. For the firewall, it belongs to the scenario of inconsistent traffic back and forth paths, this needs to turn off the session state check function.
There is a three-layer forwarding device between the authentication client and the admission control device:If at this time Portal The certified three-layer authentication device can also obtain the authentication client's MAC address,So you can use IP Address and MC The address serves as the information to identify the user.
A network adopts Portal Authentication, the user finds the pushed Web No username entered on the page/The place of the password. This failure may Which of the following causes?
When using the misuse of inspection technology, normal user behavior and invasion characteristics knowledge base match successfully will be false positives.
Agile Controller-Campus The system can manage the software installed on the terminal, define the black and white list of software, and assist the terminal to install necessary software and uninstall the software that is not allowed to be installed by linking with the access control equipment,Regarding the definition of black and white lists, which of the following statements is correct?
Regarding the policy for checking account security, which of the following descriptions are correct? (Multiple choice)
Which of the following options is about SACG The description of the online process is wrong?
Security zone division means to better protect the internal network security,Based on the business type and security requirements of the intranet, divide the intranet into several granularities.
Logical area. Which of the following options does not belong Agile Controller-Campus Security domain?
Which of the following cybersecurity threats exist only in WLAN In the network?
There are three roles in the XMPP protocol: server, gateway, and client. Corresponding to the free mobility solution: Agile Controller-Campus as For the server, Huawei USG6000 series firewall acts as the gateway; the agile switch acts as the client.
Which of the following options is right PKI The sequence description of the work process is correct?
1. PKI Entity direction CA ask CA Certificate. .
2. PKI Entity received CA After the certificate, install CA Certificate.
3. CA receive PKI Entity CA When requesting a certificate, add your own CA Certificate reply to PKI entity.
4. PKI Entity direction CA Send a certificate registration request message.
5. PKI When the entities communicate with each other, they need to obtain and install the local certificate of the opposite entity.
6. PKI Entity received CA The certificate information sent.
7. PKI After the entity installs the local certificate of the opposite entity,Verify the validity of the local certificate of the peer entity. When the certificate is valid,PC The public key of the certificate is used for encrypted communication between entities.
8. CA receive PKI The entity's certificate registration request message.
In WPA2, because of the more secure encryption technology-TKIP/MIC, WPA2 is more secure than WPA.
After configuring the announcement,Agile Controller-Campus The system cannot assign this announcement to which of the following objects?