A. an ACE server B. a wireless network C. an Ethernet switch D. Odyssey Access Client
多项选择题Which two methods of authentication are used by the Infranet Controller for IPSec enforcement?()
A. dial-up VPN B. IKE authentication C. XAuth authentication D. shared IKE authentication
单项选择题When the Infranet Enforcer is set up in transparent mode, which additional resource policy must be configured to use OAC for IPsec enforcement? ()
A. IPsec Routing B. Access Control C. IP Address Pool D. Source Interface
单项选择题Which interface does the Infranet Controller use to push the configuration? ()
A. trusted port B. internal port C. trust interface D. untrust interface
单项选择题A customer has installed UAC in their network. They have both Windows and Linux endpoints andmust choose a deployment method that everyone can use. Which deployment method allows for multiple platforms? ()
A. IPsec enforcement B. 802.1X enforcement C. Source IP enforcement D. Odyssey Access Client
多项选择题Which three statements about dynamic filtering are true? ()
A. Dynamic filtering creates a query statement. B. Dynamic filtering has an option to save query. C. Dynamic filtering can select any log field to filter. D. Dynamic filtering permanently removes other log entries. E. Dynamic filtering redraws the log when you select a variable link.