Regarding the strategy for checking the screensaver settings, which of the following descriptions are correct? (Multiple choice)
Regarding MAC authentication and MAC bypass authentication, which of the following descriptions are correct? (multiple choice)
About the software SACG And hardware SACG Description, which of the following is correct?
Which of the following statement is not correct about application and identification of knowledge base upgrade?
For the terminal Wi-Fi The order of the push, which of the following is correct?
1. Any Office Mobile office system push Wi-Fi Configuration
2. Any Office The mobile office department automatically applies for a certificate.
3. The administrator configures the enterprise Wi-Fi Push.
4. The terminal automatically connects to the enterprise Wi-Fi.
URL filtering configure exact match www.test.com/news field, then not meet the URL of the filtering strategy include:
If you use a normal account for authentication, which of the following descriptions is wrong?
Security zone division means to better protect the internal network security,Based on the business type and security requirements of the intranet, divide the intranet into several granularities.
Logical area. Which of the following options does not belong Agile Controller-Campus Security domain?
Portal page push rules have priority, and the rules with higher priority are matched with the user's authentication information first. If none of the configured rules match, The default rules are used.
802.1X During the authentication, if the authentication point is at the aggregation switch, in addition to RADIUS,AAA,802.1X In addition to the conventional configuration, what special configuration is needed?
Which of the following options are relevant to Any Office The description of the solution content is correct? (Multiple choice)
WEB filtering technology is a kind of in-depth testing for WEB loophole, WEB classification and access control security management technology on the Internet.
After an enterprise deployed antivirus software, it was discovered that virus infections still occurred on a large scale. In addition to the limitations of the product's own technology, the reason for the problem is weak personal terminal security protection, which is also an important factor.
Free mobility is a special access control method, according to the user’s access location, access time, access method and terminal authorization instructions. Set permissions, as long as the user’s access conditions remain unchanged, the permissions and network experience after accessing the network--To q
There are two ways for Business Manager to download patches. When using hierarchical deployment, you can download patches directly from the management center or through Microsoft patches Server download patch.
Which of the following options is not included in the mobile terminal life cycle?
Portal authentication on the Agile Controller-Campus has been configured and is correct.
Configure the following commands on the access control switch:
[S5720] authentication free-rule 1 destination ip 10.1.31.78 mask 255.255. 255.255
Which of the following options are correct? (multiple choice)
Visitors refer to users who need temporary access to the network at a specific location.
Regarding the way SACG devices connect to the network, which of the following descriptions are correct? (multiple choice)
URL filtering, remote classification list provided and maintained by a third-party classification servers, devices can be synchronous updated automatically or manually from third-party classification servers.
MAC Certification refers to 802.1x In the protocol authentication environment, the terminal does not respond to the connection control device after accessing the network 802.1x When protocol authentication is requested, the access control does not automatically obtain the terminal’s MAC The address is sent as a credential to access the network RADIUS The server performs verification.
There are two types of accounts on the Agile Controller-Campus: one is a local account and the other is an external account.
Which of the following is not a local account?
The relationship between user groups and accounts in user management is stored in a tree on the Agile Controller-Campus. An account belongs to only one user group.
Consistent with the corporate organizational structure: If the OU (OnizbonUnit) structure stored in the AD/LDAP server is consistent with the corporate organizational structure, users are stored Under 0OU, when the Agile Controller-Campus synchronizes AD/LDAP server accounts, which synchronization method can be used?
When the account assigned by the administrator for the guest is connected to the network, the audit action that the administrator can perform on the guest does not include which of the following options?
Secure email is Any ffice Solution for corporate office 0A The killer application provided, it provides powerful email business capabilities and rich email strategies. For secure mail, which of the following descriptions are correct? (Multiple choice)
Which of the following options are relevant to MAC Certification and MAC The description of bypass authentication is correct? (Multiple choice)
Which of the following options is for Portal The statement of the gateway access process is correct?
Which of the following equipment is suitable for use MAC Authentication access network?
Which of the following cybersecurity threats exist only in WLAN In the network?
Which of the following law items is the most blessed for safety? This should be true?
Administrator creates the correct IPS strategy, applied to domain or inter-domain , but found that no matter in the IPS signature set movement is blocking or alarm, when the invasion attack, only produce the
alarm.
What is the reason for this problem?
Traditional network single--The strategy is difficult to cope with the current complex situations such as diversified users, diversified locations, diversified terminals, diversified applications, and insecure experience.
Which of the following options belong to a third-party server account? (Multiple choice)
Perform the UTM upgrade in the process of operation, appeared the following information:
Error: Executing the update, please wait.
USG may be executed (choose 3 answers)
The access control server is the implementer of the corporate security policy, responsible for implementing the corresponding access control in accordance with the security policy formulated by the customer's network(Allow, deny, leave or restrict).
Regarding the definition of WIPS/WIDS, which of the following statements is correct?
In some scenarios, an anonymous account can be used for authentication. What are the correct descriptions of the following options for the anonymous account?? (Multiple choice)
About in WLAN User isolation technology is used in the networking environment. Which of the following statements is wrong?
Which of the following description is incorrect against server loophole security threats ?
URL filtering, according to the classification of the remote or local classification, the user can create multiple urls strategy, determines the corresponding processing action in URL strategies, a URL strategy was applied to the domain, which can realize the corresponding URL filtering.
Regarding the role of each role in the Portal authentication framework, which of the following descriptions are correct? (multiple choice)
Windows in environment,Agile Controller-Campus After the installation is successful, how to manually start the management center(MC)? (Multiple choice)
Regarding the description of the account blacklist, which of the following options is wrong?
After configuring the announcement,Agile Controller-Campus The system cannot assign this announcement to which of the following objects?
Portal At the time of certification, pass Web After the browser enters the account password for authentication, it prompts"Authenticating.."The status lasts for a long time before it shows that the authentication is successful. Which of the following reasons may cause this phenomenon?
When deploying the Agile Controller-Campus, the high-reliability solution of the Windows+SQL Server platform is adopted. Which of the following components is not supported for deployment?
Regarding the identity authentication method and authentication type, which of the following descriptions is correct?
For hardware SACC Access control, if the terminal does not pass the authentication, it can access the resources of the post-authentication domain. This phenomenon may be caused by the following reasons? (Multiple choice)
Traditional access control policy passed ACL or VLAN Can not be achieved with IP Address decoupling, in IP The maintenance workload is heavy when the address changes. And because the agile network introduces the concept of security group, it can achieve the same IP Address decoupling.
Terminal security access technology does not include which of the following options?
Which of the following options is about SACG The description of the online process is wrong?
An enterprise has a large number of mobile office employees, and a mobile office system needs to be deployed to manage the employees. The number of employees in this enterprise exceeds 2000 People, and the employees’ working areas are distributed all over the country. In order to facilitate management, which deployment method is adopted?
Which of the following statement is correct about AV engine when Execute the command display av version?
According to different reliability requirements, centralized networking can provide different reliability networking solutions. Regarding these solutions, which of the following descriptions are correct? (Multiple choice)
The administrator issues notices to users in the form of announcements, such as the latest software and patch installation notices. Which of the following options of the announcement is incorrect?