requires access lists to identify the voice traffic
can allow traffic from a device without 802.1X authentication, by MAC address
can allow traffic from Cisco IP phones by listening to their CDP advertisements
allows all packets marked with a ToS of 5 to bypass authentication
allows all IP voice packets to bypass authentication via stateful inspection
第1题:
A. The NAS acts as a gateway for all Layer 3 traffic.
B. Only the MAC address is used to identify the client device.
C. User traffic remains on the same VLAN for the duration of the connection.
D. After authentication and posture assessment, client traffic no longer passes through the NAS.
第2题:
Which of the following is the MOST important consideration when implementing a data retentio program?()
第3题:
A. Mark permitted traffic for firewall user authentication.
B. Mark permitted traffic for SCREEN options.
C. Associate permitted traffic with an IPsec tunnel.
D. Associate permitted traffic with a NAT rule.
E. Mark permitted traffic for IDP processing.
第4题:
Which two traffic types trigger pass-through firewall user authentication?()
第5题:
When a client using the SERVER_ENCRYPT authentication type connects to a server using the SERVER authentication type, what happens?()
第6题:
Which statement about the Lightweight Access Point Protocol (LWAPP) is true?()
第7题:
You design a Business Intelligence (BI) solution by using SQL Server 2008. The solution includes a SQL Server 2008 Reporting Services (SSRS) infrastructure in a scale-out deployment. All reports use a SQL Server 2008 relational database as the data source. You implement row-level security. You need to ensure that all reports display only the expected data based on the user who is viewing the report. What should you do?()
第8题:
You have a firewall enforcer protecting resources in a data center. A user is experiencing difficulty connecting to a protected resource.Which two elements must exist so the user can access the resource?()
A. Resource access policy on the MAG Series device
B. IPsec routing policy on the MAG Series device
C. General traffic policy blocking access through the firewall enforcer
D. Auth table entry on the firewall enforcer
第9题:
What is the objective of the aaa authentication login console-in local command?()
第10题:
Which of these is true of a Layer 3 out-of-band NAS deployment?()