Question 11
According to the format and content of the user name used by the access device to verify the identity of the user, the user name format used for MAC authentication can be divided into three types. Which of the following formats is not included?
Question 12
In 802.1X authentication, if the authentication point is at the aggregation layer switch, which special configurations are required in addition to the conventional configurations such as RADIUS, AAA and 802.1X?
Question 13
How to check whether the SM and SC silverware start normally after installing the Agile Controller-Campus) (multiple delivery)
Question 14
Perform the UTM upgrade in the process of operation, appeared the following information:
Error: Executing the update, please wait.
USG may be executed (choose 3 answers)
Question 15
Which of the following descriptions is wrong about the principle of MAC authentication?
