Question
1. What is the default security algorithm supported byCloudpath ES? ? a. AES-128 b. SHA-384 c. SHA-256 d. MD5 2. Which two parameters from part
1. What is the default security algorithm supported byCloudpath ES? ?
a. AES-128
b. SHA-384
c. SHA-256
d. MD5
2. Which two parameters from part of a network profileinstalled on a client? (Choose two)
a. Client IP address
b. Server Certificate Validation Details
c. Client hostname
d. Client software terms of use policy
e. Allowed SSIDs
3. Which two options are available to install theCloudpath network configuration on a Mac OS X end-user device?(Choose two)
a. Cloudpath App downloaded from the CloudpathServer
b. Safari extension
c. Mobileconfig profile downloaded from Cloudpathserver
d. Web profile installed via web browserplugin
e. Chrome extension
4. In Cloudpath 5.1, which two device’s client logs areunsupported? (Choose two)
a. Windows
b. MAC OS X
c. Linux
d. iOS
e. Chromebooks
5.
What are three key funtions of Cloudpath ES? (Choosethree)
a. Built-in client NAT functionality
b. Built-in client DHCP server
c. Built-in stateful firewall
d. Self-service, automated onboardingportal
e. Built-in RADIUS server
f. Built-in certificate infrastructure
6.
What are two funtions of Network Access Control(NAC) in Cloudpath? (Choose two) ?
a. Track client location in a wirelessnetwork
b. Install Service Packs on clients
c. Provide 802.1x credentials to clients
d. Match client to the right SSID based on OStype
e. Ensure firewalls are active in client OS
7.
In cloudpath 5.1, where do you find clients whose issuedcertificates found or in-progress? ?
a. Dashboard>Users & Divices
b. Configuration>Device Configuracion
c. Configuration>MAC Registrations
d. Dashboard>Enrollments
8.
In Cloudpath 5.1, where can we find information forindividual client session
troubleshooting?
a. Administration
b. Sponsorship
c. Dashboard
d. Configuration
9..
In which layer of the OSI reference model do mostmalicious activities occur in a wireless
network deployment?
a. Layer 2
b. Layer 4
c. Layer 1
d. Layer 3
10
Which logs are used to troubleshoot RADIUSauthentication issues?
a. RADIUS
b. OCSP
c. RADIUS accounting
d. Client session
11
Which workflow plug-in is used to send generalinformation to the end-user?
a. Perform out-of-band authentication
b. Prompt user for information
c. Redirect the user
d. Display message within the workflow
12
When using WPA2-Enterprise, which two types of deviceauthentication are supported by
the built-in Cloudpath RADIUS server? (Choosetwo)
a. Password-based
b. MAC-based . revisar pag. 137
c. Active Directory-based
d. LDAP-based
e. Certificate-based
13.
How are RADIUS policies applied to clients on aCloudpath ES server? ?
a. Issuing CA public key
b. Using a policy workflowplug-in
c. Using RADIUS attributes assigned to certificatetemplates
d. Using a RADIUS server certificates
Step by Step Solution
3.48 Rating (164 Votes )
There are 3 Steps involved in it
Step: 1
The detailed answer for the above question is provided below Answer 1 c SHA256 2 a Client IP address e Allowed SSIDs 3 a Cloudpath App downloaded from the Cloudpath Server c Mobileconfig profile downl...Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started