Which two primary port authentication protocols are used wit

题目
多选题
Which two primary port authentication protocols are used with VSANs?()
A

SPAP

B

CHAP

C

DHCHAP

D

ESP

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which two methods of authentication are used by the Infranet Controller for IPSec enforcement?()

A. dial-up VPN

B. IKE authentication

C. XAuth authentication

D. shared IKE authentication


参考答案:A, C

第2题:

Which two statements regarding firewall user authentication client groups are true?() (Choose two.)

  • A、A client group is a list of clients associated with a group.
  • B、A client group is a list of groups associated with a client.
  • C、Client groups are referenced in security policy in the same manner in which individual clients are referenced.
  • D、Client groups are used to simplify configuration by enabling firewall user authentication without security policy.

正确答案:B,C

第3题:

Which two commands are used during the password recovery process?()

A. clear system login

B. boot -s

C. recovery

D. delete system root-authentication


参考答案:B, C

第4题:

Which two statements are true regarding the use of NTP clock synchronization?()

  • A、The Junos OS supports client, server, and symmetric modes of NTP operation.
  • B、Synchronized time on all network devices makes log messages more useful for troubleshooting.
  • C、Authentication methods are not supported.
  • D、The Junos OS must be used as the primary time reference.

正确答案:A,B

第5题:

Which two ports are used with RADIUS authentication and authorization?()

  • A、UDP port 1812
  • B、UDP port 2000
  • C、TCP port 2002
  • D、UDP port 1645

正确答案:A,D

第6题:

Which of the following is required if ports from VLANs on two separate switches need to broadcastto each other?()

A. Port mirroring

B. VPN

C. Trunking

D. Port authentication


参考答案:C

第7题:

Which two statements are true about the protocols that are used for transmitting voice traffic?()

  • A、RTP multiplexing is used to keep multiple phone conversations separate
  • B、RTP provides end-to-end delivery services for voice traffic
  • C、UDP is used to ensure a reliable transmission from sender to receiver
  • D、RTP is used to provide resource reservation for the voice stream
  • E、UDP provides multiplexing

正确答案:E

第8题:

Which two authentication protocols can be configured for RIP on an ERX Edge Router? ()

A.A

B.B

C.C

D.D


参考答案:B, D

第9题:

In the use of 802.1X access control, which three protocols are allowed through the switch port  before authentication takes place? ()

  • A、 STP
  • B、 CDP
  • C、 EAP MD5
  • D、 TACACS+
  • E、 EAP-over-LAN
  • F、 protocols not filtered by an ACL

正确答案:A,B,E

第10题:

Which two commands are used during the password recovery process?()

  • A、clear system login
  • B、boot -s
  • C、recovery
  • D、delete system root-authentication

正确答案:B,C

更多相关问题