Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

1. What is the default security algorithm supported byCloudpath ES? ? a. AES-128 b. SHA-384 c. SHA-256 d. MD5 2. Which two parameters from part

1. What is the default security algorithm supported byCloudpath ES? ?

a. AES-128

b. SHA-384

c. SHA-256

d. MD5

2. Which two parameters from part of a network profileinstalled on a client? (Choose two)

a. Client IP address

b. Server Certificate Validation Details

c. Client hostname

d. Client software terms of use policy

e. Allowed SSIDs

3. Which two options are available to install theCloudpath network configuration on a Mac OS X end-user device?(Choose two)

a. Cloudpath App downloaded from the CloudpathServer

b. Safari extension

c. Mobileconfig profile downloaded from Cloudpathserver

d. Web profile installed via web browserplugin

e. Chrome extension

4. In Cloudpath 5.1, which two device’s client logs areunsupported? (Choose two)

a. Windows

b. MAC OS X

c. Linux

d. iOS

e. Chromebooks

5.

What are three key funtions of Cloudpath ES? (Choosethree)

a. Built-in client NAT functionality

b. Built-in client DHCP server

c. Built-in stateful firewall

d. Self-service, automated onboardingportal

e. Built-in RADIUS server

f. Built-in certificate infrastructure

6.

What are two funtions of Network Access Control(NAC) in Cloudpath? (Choose two) ?

a. Track client location in a wirelessnetwork

b. Install Service Packs on clients

c. Provide 802.1x credentials to clients

d. Match client to the right SSID based on OStype

e. Ensure firewalls are active in client OS

7.

In cloudpath 5.1, where do you find clients whose issuedcertificates found or in-progress? ?

a. Dashboard>Users & Divices

b. Configuration>Device Configuracion

c. Configuration>MAC Registrations

d. Dashboard>Enrollments

8.

In Cloudpath 5.1, where can we find information forindividual client session

troubleshooting?

a. Administration

b. Sponsorship

c. Dashboard

d. Configuration

9..

In which layer of the OSI reference model do mostmalicious activities occur in a wireless

network deployment?

a. Layer 2

b. Layer 4

c. Layer 1

d. Layer 3

10

Which logs are used to troubleshoot RADIUSauthentication issues?

a. RADIUS

b. OCSP

c. RADIUS accounting

d. Client session

11

Which workflow plug-in is used to send generalinformation to the end-user?

a. Perform out-of-band authentication

b. Prompt user for information

c. Redirect the user

d. Display message within the workflow

12

When using WPA2-Enterprise, which two types of deviceauthentication are supported by

the built-in Cloudpath RADIUS server? (Choosetwo)

a. Password-based

b. MAC-based . revisar pag. 137

c. Active Directory-based

d. LDAP-based

e. Certificate-based

13.

How are RADIUS policies applied to clients on aCloudpath ES server? ?

a. Issuing CA public key

b. Using a policy workflowplug-in

c. Using RADIUS attributes assigned to certificatetemplates

d. Using a RADIUS server certificates

Step by Step Solution

3.48 Rating (164 Votes )

There are 3 Steps involved in it

Step: 1

The detailed answer for the above question is provided below Answer 1 c SHA256 2 a Client IP address e Allowed SSIDs 3 a Cloudpath App downloaded from the Cloudpath Server c Mobileconfig profile downl... blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Income Tax Fundamentals 2013

Authors: Gerald E. Whittenburg, Martha Altus Buller, Steven L Gill

31st Edition

1111972516, 978-1285586618, 1285586611, 978-1285613109, 978-1111972516

More Books

Students also viewed these Programming questions