There are two types of accounts on the Agile Controller-Campus: one is a local account and theother is an external account.
Which of the following is not a local account?
About the software SACG And hardware SACG Description, which of the following is correct?
In the park, users frequently enter and leave the wireless signal coverage area due to office needs. If youneed to ensure the user's Internet experience, after the user passes an authentication, when he accesses the network again, no important authentication is required:Which of the following authentication methods is recommended?
Regarding the use of MAC authentication to access the network in the WLAN networking environment, which of the following statements is wrong en.
Configuring WLAN device detection can realize the monitoring of the entire network, but you need to set the working mode of the AP first, which of the following options are.
What is the working mode of AP? (multiple choice)
In the scenario of SACG linkage in bypass mode, only the traffic initiated by the terminal user will pass through the firewall, and the server will return to the terminal in use.
The traffic does not need to go through the firewall y. For the firewall, it belongs to the scenario ofinconsistent traffic back and forth paths, this needs to turn off the session state check function.
Which of the following methods can be used to protect enterprise terminal security?
The terminal host access control function does not take effect, the following is SACG View information on:
Advanced ACL 3099 ,25 rules,not bingding with vpn-instance Ad's step is 1
rule 1000 permit ip (1280 times matched)
rule 1001 permit ip destination 172.18.11.2210 (581 times matched)
rule 1002 permit ip destination 172:18.11.2230 (77 times matched)
rule 1003 permit ip destination 172.19.0.0 0.0 255.255 (355 Book times matched)
rule 1004 deny ip (507759 times matched)
Which of the following statements is correct?
Using Agile Controller-Campus for visitor management, users can obtain the account they applied for in a variety of ways, but which of the following are not included A way?
When the -aa command is used on the access control device to test the connectivity with the Radius server, the running result showssuccess, but the user cannot Normal access, the possible reason does not include which of the following options?
View on the switch Agile Controller-Campus The policy issued by the server is as follows:
For this strategy, which of the following options are correct? (Multiple choice)
Deploying on Windows platform, using SQL Server database About the HA function of Agile Cotoller-Campus, which of the following descriptions Is it correct? (multiple choice)
If youdeploy Free Mobility, in the logic architecture of Free Mobility, which of the following options should be concerned by the administrator?
Which of the following options are correct for thedescription of visitor management? (Multiple choice)
Use on the terminalPortal The authentication is connected to the network, but you cannot jump to the authentication page. The possible reason does not include which of the following options?
Accordingto the different user name format and content used by the access device to verify user identity, the user name format used for MAC authentication can be changed.
There are three types. Which of the following formats is not included?
Traditional network single--The strategy is difficult to cope with the current complex situations such as diversified users, diversified locations, diversified terminals, diversified applications, and insecure experience.
When configuring the antivirus software policy, if you set"The required antivirus software violation level is not installed or running"for"generally"And check"out Now serious violation of the rules prohibits access to the network"Options. When the user uses Any office Certify, The certification is passed, but the result of the security check Can the user access the network when the virus software is not turned on?
In WPA2, because of the more secureencryption technology-TKIP/MIC, WPA2 is more secure than WPA.
Which of the following options is for Portal The statement of the gateway access process is correct?
Security zone division means to better protect the internal network security,Based on the business type and security requirements of the intranet, divide the intranet into several granularities.
Logical area. Which of the following options does not belong Agile Controller-Campus Security domain?