Question 71
Which of the following statement is wrong about NIP?
Question 72
Wired 802.1X During authentication, if the access control equipment is deployed at the Jiangju layer, this deployment method has the characteristics of high security performance, multiple management equipment, and complex management.
Question 73
Traditional access control policy are implemented through ACI or VLAN and can't be resolved with IP address. Maintenance workload is large when the IP address changes. Because the agile network introduces the concept of security groups, it can achieve decoupling from IP addresses.
Question 74
Deployed by an enterprise network managerAgile Controller-Campus withSACG Later;Identity authentication is successful but cannot access the post-authentication domain, This phenomenon may be caused by any reason? (Multiple choice)
Question 75
Regarding CAPWAP encryption, which of the following statements is wrong?
