单选题 Which additional configuration must be completed when setting up role restrictions using certificates? ()
Set up a certificate authentication server.
Configure the authentication realm to remember certificate information.
Configure the authentication realm to use a certificate server for authentication.
Configure a role mapping rule requiring certification information to map user to role.
单选题 Which statement is correct about defining an Infranet Enforcer for use as a RADIUS Client? ()
You do not need to configure a RADIUS client policy.
You must know the exact model number of the Infranet Enforcer.
You must specify the NACN password of the device in the RADIUS client policy.
You do not need to designate a location group to which the Infranet Enforcer will belong.
单选题 What will serve as a RADIUS Client to the Infranet Controller for 802.1x authentication? ()
an ACE server
a wireless network
an Ethernet switch
Odyssey Access Client
单选题 When the Infranet Enforcer is set up in transparent mode, which additional resource policy must be configured to use OAC for IPsec enforcement? ()
IPsec Routing
Access Control
IP Address Pool
Source Interface
多选题 Which two statements are true about applying Host Checker at the realm level?()
If Evaluate is checked then the client must pass policy to get the sign-in page.
If Evaluate is checked then the client can fail policy and still get the sign-in page.
If Require and Enforce is checked then the client must pass policy to get the sign-in page.
If Require and Enforce is checked then the client can fail policy and still get the sign-in page.
单选题 Which configuration option can be set either in the initial console menu or the Admin UI of the Infranet Controller? ()
VLAN ID
Hostname
Domain name
Administrative timeout
单选题 Which action is optional when adding an authentication realm for use on an Infranet Controller? ()
Modify sign-in policy.
Configure role mapping.
Assign authentication server.
Configure authentication policy.
单选题 A customer has installed UAC in their network. They have both Windows and Linux endpoints andmust choose a deployment method that everyone can use. Which deployment method allows for multiple platforms? ()
IPsec enforcement
802.1X enforcement
Source IP enforcement
Odyssey Access Client
多选题 On a pre-existing OAC, which three options can the Infranet Controller overwrite when the useraccesses the Infranet Controller?()
SSID
login name
MAC address
wired adapters
encryption method