Authentication for user data traffic is important, but so is

题目
多选题
Authentication for user data traffic is important, but so is authentication for IP voice traffic. The Cisco 830 802.1 feature provides an easier method for allowing IP voice traffic through the VPN, because it().
A

requires access lists to identify the voice traffic

B

can allow traffic from a device without 802.1X authentication, by MAC address

C

can allow traffic from Cisco IP phones by listening to their CDP advertisements

D

allows all packets marked with a ToS of 5 to bypass authentication

E

allows all IP voice packets to bypass authentication via stateful inspection

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which of these is true of a Layer 3 out-of-band NAS deployment?()

A. The NAS acts as a gateway for all Layer 3 traffic.

B. Only the MAC address is used to identify the client device.

C. User traffic remains on the same VLAN for the duration of the connection.

D. After authentication and posture assessment, client traffic no longer passes through the NAS.


参考答案:D

第2题:

Which of the following is the MOST important consideration when implementing a data retentio program?()

  • A、 The data destruction requirements
  • B、 The user awareness training program
  • C、 The laws and legal requirements of the data
  • D、 The companys individual data retention policies

正确答案:C

第3题:

Which three advanced permit actions within security policies are valid?() (Choose three.)

A. Mark permitted traffic for firewall user authentication.

B. Mark permitted traffic for SCREEN options.

C. Associate permitted traffic with an IPsec tunnel.

D. Associate permitted traffic with a NAT rule.

E. Mark permitted traffic for IDP processing.


参考答案:A, C, E

第4题:

Which two traffic types trigger pass-through firewall user authentication?()

  • A、SSH
  • B、Telnet
  • C、ICMP
  • D、OSPF
  • E、HTTP

正确答案:B,E

第5题:

When a client using the SERVER_ENCRYPT authentication type connects to a server using the SERVER authentication type, what happens?()

  • A、An error will occur.
  • B、Data passed between the client and the server is encrypted.
  • C、User IDs and passwords are passed to the server unencrypted.
  • D、User IDs and passwords are encrypted before they are passed to the server.

正确答案:A

第6题:

Which statement about the Lightweight Access Point Protocol (LWAPP) is true?()

  • A、 LWAPP encrypts control traffic between the AP and the controller.
  • B、 LWAPP encrypts user traffic with a x.509 certificate using AES-CCMP
  • C、 LWAPP encrypts both control traffic and user data.
  • D、 When set to Layer 3, LWAPP uses a proprietary protocol to communicate with the Cisco Aironet APs.

正确答案:A

第7题:

You design a Business Intelligence (BI) solution by using SQL Server 2008.  The solution includes a SQL Server 2008 Reporting Services (SSRS) infrastructure in a scale-out deployment. All reports use a SQL Server 2008 relational database as the data source. You implement row-level security. You need to ensure that all reports display only the expected data based on the user who is viewing the report. What should you do?()

  • A、 Store the credential of a user in the data source.
  • B、 Configure the infrastructure to support Kerberos authentication.
  • C、 Configure the infrastructure to support anonymous authentication by using a custom authentication extension.
  • D、 Ensure that all report queries add a filter that uses the User.UserID value as a hidden parameter.

正确答案:B

第8题:

You have a firewall enforcer protecting resources in a data center. A user is experiencing difficulty connecting to a protected resource.Which two elements must exist so the user can access the resource?()

A. Resource access policy on the MAG Series device

B. IPsec routing policy on the MAG Series device

C. General traffic policy blocking access through the firewall enforcer

D. Auth table entry on the firewall enforcer


参考答案:A, D

第9题:

What is the objective of the aaa authentication login console-in local command?()

  • A、It specifies the login authentication method list named console-in using the local user database on the router
  • B、It specifies the login authorization method list named console-in using the local RADIUS username-password data base
  • C、It specifies the login authentication list named console-in using the local username- password data base on the router
  • D、It specifies the login authorization method list named console-in using the local username- password data base on the router

正确答案:A

第10题:

Which of these is true of a Layer 3 out-of-band NAS deployment?()

  • A、 The NAS acts as a gateway for all Layer 3 traffic.
  • B、 Only the MAC address is used to identify the client device.
  • C、 User traffic remains on the same VLAN for the duration of the connection.
  • D、 After authentication and posture assessment, client traffic no longer passes through the NAS.

正确答案:D

更多相关问题