1. What is the default security algorithm supported byCloudpath ES? ? a. AES-128 b. SHA-384 c. SHA-256...
Question:
1. What is the default security algorithm supported byCloudpath ES? ?
a. AES-128
b. SHA-384
c. SHA-256
d. MD5
2. Which two parameters from part of a network profileinstalled on a client? (Choose two)
a. Client IP address
b. Server Certificate Validation Details
c. Client hostname
d. Client software terms of use policy
e. Allowed SSIDs
3. Which two options are available to install theCloudpath network configuration on a Mac OS X end-user device?(Choose two)
a. Cloudpath App downloaded from the CloudpathServer
b. Safari extension
c. Mobileconfig profile downloaded from Cloudpathserver
d. Web profile installed via web browserplugin
e. Chrome extension
4. In Cloudpath 5.1, which two device’s client logs areunsupported? (Choose two)
a. Windows
b. MAC OS X
c. Linux
d. iOS
e. Chromebooks
5.
What are three key funtions of Cloudpath ES? (Choosethree)
a. Built-in client NAT functionality
b. Built-in client DHCP server
c. Built-in stateful firewall
d. Self-service, automated onboardingportal
e. Built-in RADIUS server
f. Built-in certificate infrastructure
6.
What are two funtions of Network Access Control(NAC) in Cloudpath? (Choose two) ?
a. Track client location in a wirelessnetwork
b. Install Service Packs on clients
c. Provide 802.1x credentials to clients
d. Match client to the right SSID based on OStype
e. Ensure firewalls are active in client OS
7.
In cloudpath 5.1, where do you find clients whose issuedcertificates found or in-progress? ?
a. Dashboard>Users & Divices
b. Configuration>Device Configuracion
c. Configuration>MAC Registrations
d. Dashboard>Enrollments
8.
In Cloudpath 5.1, where can we find information forindividual client session
troubleshooting?
a. Administration
b. Sponsorship
c. Dashboard
d. Configuration
9..
In which layer of the OSI reference model do mostmalicious activities occur in a wireless
network deployment?
a. Layer 2
b. Layer 4
c. Layer 1
d. Layer 3
10
Which logs are used to troubleshoot RADIUSauthentication issues?
a. RADIUS
b. OCSP
c. RADIUS accounting
d. Client session
11
Which workflow plug-in is used to send generalinformation to the end-user?
a. Perform out-of-band authentication
b. Prompt user for information
c. Redirect the user
d. Display message within the workflow
12
When using WPA2-Enterprise, which two types of deviceauthentication are supported by
the built-in Cloudpath RADIUS server? (Choosetwo)
a. Password-based
b. MAC-based . revisar pag. 137
c. Active Directory-based
d. LDAP-based
e. Certificate-based
13.
How are RADIUS policies applied to clients on aCloudpath ES server? ?
a. Issuing CA public key
b. Using a policy workflowplug-in
c. Using RADIUS attributes assigned to certificatetemplates
d. Using a RADIUS server certificates
Income Tax Fundamentals 2013
ISBN: 9781285586618
31st Edition
Authors: Gerald E. Whittenburg, Martha Altus Buller, Steven L Gill