<dfn id="w48us"></dfn><ul id="w48us"></ul>
  • <ul id="w48us"></ul>
  • <del id="w48us"></del>
    <ul id="w48us"></ul>
  • 保護思科無線企業網絡考試要點最新

    時間:2024-09-05 05:19:44 思科認證 我要投稿
    • 相關推薦

    保護思科無線企業網絡考試要點(最新)

      WISECURE(300-375)考試檢驗考生是否具備實施客戶端設備安全,基于身份認證和服務,以及保護和監控企業無線基礎設施的能力。下面是小編整理的考試主要內容:

    保護思科無線企業網絡考試要點(最新)

      1.0 Integrate Client Device Security19%Hide Details

      1.1. Describe Extensible Authentication Protocol (EAP) authentication process

      1.2. Configure client for secure EAP authentication

      1.2.a. Native OS (iOS, Android, Windows, MAC OS, year 2013+) or AnyConnect client

      1.3. Describe the impact of security configurations on application and client roaming

      1.3.a. Key caching

      1.3.b. 802.11r

      1.4. Implement 802.11w Protected Management Frame (PMF) on the WLAN

      1.4.a. Client support

      1.4.b. PMF modes

      1.4.c. Relevant timer settings

      1.5. Implement Cisco Management Frame Protection (MFP)

      1.5.a. Cisco Compatible Extensions (CCX)

      1.5.b. Infrastructure mode

      1.5.c. Client and infrastructure mode

      1.6. Describe and configure client profiling

      1.6.a. ISE

      1.6.b. WLC

      2.0 Implement Secure Distribution System Connectivity Services on the Wireless Infrastructure24%Hide Details

      2.1. Describe the impact of BYOD on wireless security

      2.1.a Additional security risks

      2.1.b Loss of device control

      2.1.c Increased complexity of policy enforcement

      2.2. Implement BYOD policies

      2.2.a. Single vs dual SSID

      2.2.b.Self registration

      2.2.c. mDNS sharing

      2.2.d.Wi-Fi Direct

      2.3. Implement AAA based Layer 3 security on the controller

      2.3.a. Local Web Auth (LWA)

      2.3.a.[i] External authentication)

      2.3.a.[ii] Locally significant certificates

      2.3.a.[iii] Pre-authentication ACL

      2.3.a.[iv] Pass through configuration

      2.4. Describe regulatory compliance considerations for protecting data and access and providing accountability

      2.4.a. PCI

      2.5. Utilize security audit tools for Distribution Systems

      2.5.a. PI reports

      2.5.b. PCI audit

      3.0 Implement Secure Client Connectivity Services on the Wireless Infrastructure27%Hide Details

      3.1. Implement 802.1x wireless client authentication

      3.1.a. AireOS

      3.1.a.[i] Local

      3.1.a.[ii] Central

      3.1.b. IOS-XE

      3.1.c. Autonomous

      3.1.c.[i] Local authentication

      3.1.c.[ii] Remote authentication

      3.1.d. FlexConnect

      3.1.d.[i] Local authentication

      3.1.d.[ii] Remote authentication

      3.2. Implement Identity Based Networking (IBN)

      3.2.a. AireOS

      3.2.a.[i] VLANs

      3.2.a.[ii] QoS

      3.2.a.[iii] ACLs

      3.2.b. IOS-XE

      3.2.b.[i] VLANs

      3.2.b.[ii] QoS

      3.2.b.[iii] ACLs

      3.2.c. Autonomous

      3.2.c.[i] VLAN

      3.2.d. FlexConnect

      3.2.d.[i] VLAN

      3.2.d.[ii] ACLs

      3.2.d.[iii] QoS

      3.3. Implement ISE AAA parameters for integration with the wireless network

      3.3.a. Network device

      3.3.b. IBN profile

      3.4. Implement AAA based Layer 3 security using ISE

      3.4.a. Utilizing ISE as AAA service

      3.4.a.[i] Locally significant certificates on ISE

      3.4.a.[ii] Using captive portal capabilities for guest access

      3.4.b. Central Web Auth (CWA

      3.4.b.[i] Returned values and overrides

      3.4.b.[ii] Access accept

      3.4.b.[iii] AAA override statement

      3.5. Configure MSE based web authentication

      3.6. Utilize security audit tools for client connectivity

      3.6.a. PI reports

      3.6.b. PCI audit

      4.0 Implement Secure Management Access on the WLAN Infrastructure14%Hide Details

      4.1. Controlling administrative access to the wireless infrastructure

      4.1.a. RADIUS

      4.1.b. TACACS

      4.1.c. Controller and ISE integration

      4.1.d. Access point administration credentials

      4.2. Configure APs and switches for 802.1x access to the wired infrastructure

      4.2.a. Controller based

      4.2.b. Autonomous

      4.3. Implement SNMPv3 on the wireless infrastructure

      4.3.a. AireOS

      4.3.b. IOS-XE

      4.3.c. Autonomous

      5.0 Monitoring Security on the WLAN Infrastructure16%Hide Details

      5.1. Execute Security reports on PI

      5.2. Perform Rogue Management

      5.2.a. Rogue Containment on WLC and PI

      5.2.b. RLDP on WLC and PI

      5.2.c. SwitchPort tracing on PI

      5.2.d. Location on PI

      5.2.e. Rogue Rules on WLC and PI

      5.3. Monitor rogue APs and clients

      5.3.a. PI Maps

      5.3.b. Controller

      5.4. Monitor Alarms

      5.4.a. 2 items

      5.4.b. PI Security Tab

      5.4.c. Controller Trap Logs

      5.5. Identify RF related Security interferers on WLC and PI Maps

      5.5.a. Jammers

      5.5.b. Inverted Wi-Fi

      5.5.c. Wi-Fi invalid channel

      5.6. Implement wIPS

      5.6.a. Enhanced Local Mode (ELM)

    【保護思科無線企業網絡考試要點最新】相關文章:

    實施思科統一無線語音網絡IUWVN考試要點06-30

    思科網絡安全運營考試要點09-07

    思科認證CUWSS考試要點08-02

    思科認證CLDFND考試要點07-19

    思科認證ARCH考試要點08-15

    思科認證SIMOS考試要點09-06

    思科CCIE安全實驗考試要點09-13

    思科認證互聯網專家無線CCIE筆試要點07-16

    實施思科IP交換網絡(SWITCH 642-813)考試要點09-03

    思科入門級網絡認證路由和交換綜合考試要點10-05

    主站蜘蛛池模板: 久久久久无码国产精品不卡| 人妻一区二区三区无码精品一区| 国产精品亚洲综合一区| 人妻AV一区二区三区精品 | 凹凸国产熟女精品视频app| 蜜臀精品无码AV在线播放| 亚洲精品欧美综合| 国产精品国产三级国产专播| 久久亚洲日韩精品一区二区三区| 日批日出水久久亚洲精品tv| 国产成人综合精品一区| 久久精品国产精品青草| 国产久热精品无码激情| 无码人妻精品一区二区三区在线 | 国产精品无码AV一区二区三区| 亚洲精品宾馆在线精品酒店| 欧美XXXX黑人又粗又长精品| 精品国偷自产在线视频| 国产精品99久久久久久猫咪 | 亚洲国产精品成人| 免费精品精品国产欧美在线| 久久精品国产99久久丝袜| 国产综合色产在线精品| 国产午夜精品久久久久九九电影| 成人国产一区二区三区精品| 99精品欧美一区二区三区| 影视网欧洲精品| 99热成人精品国产免男男| 99国内精品久久久久久久| 四虎影视884a精品国产四虎 | 国产精品久久国产精品99盘| 2022精品天堂在线视频| 国产精品综合色区在线观看| 97久久精品无码一区二区天美| 3D动漫精品一区二区三区| 国产精品99久久精品| 久久99精品国产一区二区三区| 国产精品麻豆高清在线观看 | 日韩精品中文字幕第2页| 午夜精品久久影院蜜桃 | 亚洲欧美精品丝袜一区二区|