The visitor management process includes page customization, account application, user authentication, audit, and logout. After the user successfully applies for an account, he needs to change.
When the account is distributed to users, what stage does the distribution of the account belong to?
Inenterprises where terminal host access control management is relatively strict, administrators hope to bind terminal hosts and accounts to prevent terminal users from accessing the controlled network from unauthorized terminal hosts at will. Regarding thedescription of binding the terminal host and account, which of the following is correct?
The user access security solution is one-kind"End to end"Security architecture. The user access security architecture includes three key components:Terminal equipment, network access equipment and access server.
802.1X During the authentication, if the authentication point is at the aggregation switch, in addition to RADIUS,AAA,802.1X In addition to theconventional configuration, what special configuration is needed?
Identity authentication determines whether to allow access by identifying the identity of the access device or user.
In WPA2, because of the more secureencryption technology-TKIP/MIC, WPA2 is more secure than WPA.
Sort all services according to user group andaccount: By the end IP The address range is time-sharing, if it is a user group, a small terminal with an account IP Address range allocation for the same business(Chen Gongji outside business) I The business assigned to the one with the highest priority will take effect.
Which of the following is correct regarding the order of priority?
A policy template is a collection of several policies. In order to audit thesecurity status of different terminal hosts and the behavior of end users, the administrator needs to customize.
The same policy template is used to protect and manage terminal hosts. Regarding the policy template, which of the following option descriptions are correct? (multiple choice)
Regarding WLAN, which of the following descriptions is correct?
An account can belong to multiple roles, that is, a user may hold multiple positions.
Which of the following options are right 802. 1X The description of the access process is correct? (Multiple choice).
About the software SACG And hardware SACG Description, which of the following is correct?
Regarding the application scenarios of Agile Controller-Campus centralized deployment and distributed deployment, which of the following options are correct? (Multiple select)
Typical application scenarios of terminal security include: Desktop management, illegal outreach and computer peripheral management.
For hardware SACC Access control, if the terminal does not pass the authentication, it can access the resources of the post-authentication domain. This phenomenon may be caused by the following reasons? (Multiple choice)
Regarding the definition of WIPS/WIDS, which of the following statements is correct?
Regarding the description of the ACL used in the linkage between SACG equipment and the TSM system, which of the following statements is correct!?
When managing guest accounts, you need to create a guest account policy and set the account creation method. For the account creation method, which of the following descriptions is wrong?
The multi-level defense system is mainly reflected in the network level and the system level. Which of the following options are used for security defense at the network level? (Multiple choice)
Which of the following options is not included in the mobile terminal life cycle?
Traditional network single--The strategy is difficult to cope with the current complex situations such as diversified users, diversified locations, diversified terminals, diversified applications, and insecure experience.
When a guest needs to access the network through an account, which of the following methods can be used to access? (Multiple choice)
Security zone division means to better protect the internal network security,Based on the business type and security requirements of the intranet, divide the intranet into several granularities.
Logical area. Which of the following options does not belong Agile Controller-Campus Security domain?
A network adopts Portal Authentication, the user finds the pushed Web No username entered on the page/The place of the password. This failure may Which of the following causes?
Wired 802.1X During authentication, if the access control equipment is deployed at the Jiangju layer, this deployment method has the characteristics of high security performance, multiple management equipment, and complex management.