An enterprise has a large number of mobile office employees, and a mobile office system needs to be deployed to manage the employees. The number of employees in this enterprise exceeds 2000 People, and the employees’ working areas are distributed all over the country. In order to facilitate management, which deployment method is adopted?
User access authentication technology does not include which of the following options?
In the terminal security all-round defense system, use PPT-PDCA The model can effectively implement terminal security defense. Which of the following options does not belong to PPT Model?
There are two types of accounts on the Agile Controller-Campus: one is a local account and theother is an external account.
Which of the following is not a local account?
In WPA2, because of the more secureencryption technology-TKIP/MIC, WPA2 is more secure than WPA.
Configuring WLAN device detection can realize the monitoring of the entire network, but you need to set the working mode of the AP first, which of the following options are.
What is the working mode of AP? (multiple choice)
Deployed by an enterprise network managerAgile Controller-Campus withSACG Later;Identityauthentication is successful but cannot access the post-authentication domain, This phenomenon may be caused by any reason? (Multiple choice)
Sort all services according to user group andaccount: By the end IP The address range is time-sharing, if it is a user group, a small terminal with an account IP Address range allocation for the same business(Chen Gongji outside business) I The business assigned to the one with the highest priority will take effect.
Which of the following is correct regarding the order of priority?
Theaccess control server is the implementer of the corporate security policy, responsible for implementing the corresponding access control in accordance with the security policy formulated by the customer's network(Allow, deny, leave or restrict).
When managing guest accounts, you need to create a guest account policy and set the account creation method. For the account creation method, which of the following descriptions is wrong?
Terminal security access technology does not include which of the following options?
Regarding the basic principles of user access security, it is wrong not to list any description?
In the Agile Controller-Campus solution, which device is usually used as the hardwareSACG?
When deploying the Agile Controller-Campus, the high-reliability solution of the Windows+SQL Server platform is adopted. Which of the following components is not supported for deployment?
If youdeploy Free Mobility, in the logic architecture of Free Mobility, which of the following options should be concerned by the administrator?
Which of the following options is right PKI The sequence description of the work process is correct?
1. PKI Entity direction CA ask CA Certificate. .
2. PKI Entity received CA After the certificate, install CA Certificate.
3. CA receive PKI Entity CA When requesting a certificate, add your own CA Certificate reply to PKI entity.
4. PKI Entity direction CA Send a certificate registration request message.
5. PKI When the entities communicate with each other, they need to obtain and install the local certificate of the opposite entity.
6. PKI Entity received CA The certificate information sent.
7. PKI After the entity installs the localcertificate of the opposite entity,Verify the validity of the local certificate of the peer entity. When the certificate is valid,PC The public key of the certificate is used for encrypted communication between entities.
8. CA receive PKI The entity's certificate registration request message.
The visitor management process includes page customization, account application, user authentication, audit, and logout. After the user successfully applies for an account, he needs to change.
When the account is distributed to users, what stage does the distribution of the account belong to?
Agile Controller-Campus The department includes four parts of the management center(MC)Business manager(SM)And business controller(SC)And client network access equipment (NAD)As a component of the solution, it is linked with the service controller to realize user access control and free mobility.
Visitor management can authorize visitors based on their account number,time, location, terminal type, access method, etc., and can also push personalized pages to visitors based on time, location, and terminal type.
In theAgile Controller-Campus admission control scenario, regarding the role description of the RADIUS server I client, which of the following is positive True?