网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
What is the port number of an IPsec Encapsulating Security Payfoad packet?()
A
UOP port 50
B
IP protocol 51
C
TCP port 51
D
TCP port 50
E
IP protocol 50
F
UDP port51
参考答案
参考解析
解析:
暂无解析
更多 “单选题What is the port number of an IPsec Encapsulating Security Payfoad packet?()A UOP port 50B IP protocol 51C TCP port 51D TCP port 50E IP protocol 50F UDP port51” 相关考题
考题
What is the port number of an IPsec Encapsulating Security Payfoad packet?()A、UOP port 50B、IP protocol 51C、TCP port 51D、TCP port 50E、IP protocol 50F、UDP port51
考题
What is the port number of the IPsec Authentication Header packet?()A、IP protocol 50B、TCP port 51C、UDP port 50D、IP protocol 51E、UDP port 51F、TCP port 50
考题
What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-tree topology?()A、lowest port MAC addressB、port priority number and MAC addressC、VTP revision numberD、highest port priority numberE、path cost
考题
What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-treetopology?()A、lowest port MAC addressB、port priority number and MAC address.C、VTP revision numberD、highest port priority number.E、pathcost
考题
IPSec VPN is a widely-acknowledged solution for enterprise network. Which three IPsec VPNstatements are true?()A、IKE keepalives are unidirectional and sent every ten secondsB、IPsec uses the Encapsulating Security Protocol (ESP) or the Authentication Header (AH)protocol for exchanging keysC、To establish IKE SA, main mode utilizes six packets while aggressive mode utilizes only threepacketsD、IKE uses the Diffie-Hellman algorithm to generate symmetrical keys to be used by IPsec peers
考题
What value is primarily used to determine which port becomes the root port on each non root switch in a spanning-tree topology?()A、path costB、lowest port MAC addressC、VTP revision numberD、highest port priority numberE、port priority number and MAC address
考题
The voice VLAN feature has been enabled on a new Company Catalyst switch port. What is the effect of this? ()A、The CoS is trusted for 802.1P or 802.1Q tagged traffic.B、PortFast is disabled on the port.C、Port Security is automatically enabled on a voice VLAN port.D、Untagged traffic is sent according to the default CoS priority of the port.E、None of the other alternatives apply
考题
What does the number one 1 represent for interface fe-0/0/1?()A、port numberB、PCI slot numberC、channel numberD、virtual PIC number
考题
What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-tree topology?()A、lowest port MAC addressB、port priority number and MAC address.C、VTP revision numberD、highest port priority number.E、path cost
考题
What is the port number of an IPsec Encapsulating Security Payload packet?()A、IP protocol 50B、IP protocol 51C、TCP port 50D、TCP port 51E、UDP port 50F、UDP port 51
考题
When you enable port security on an interface that is also configured with a voice VLAN, what is the maximum number of secure MAC addresses that should be set on the port?()A、No more than one secure MAC address should be set.B、The default will be set.C、The IP phone should use a dedicated port, therefore only one MAC address is needed per port.D、No value is needed if the switchport priority extend command is configured. E、No more than two secure MAC addresses should be set.
考题
Which feature would prevent guest users from gaining network access by unplugging an IP phone and connecting a laptop computer?()A、IPSec VPNB、SSL VPNC、port securityD、port security with statically configured MAC addressesE、private VLANs
考题
When configuring port security on a Cisco Catalyst switch port, what is the default action taken by the switch if a violation occurs? ()A、protect (drop packets with unknown source addresses)B、restrict (increment SecurityViolation counter)C、shut down (access or trunk port)D、transition (the access port to a trunking port)
考题
A Company switch was configured as shown below: switchport mode access switchport port-security switchport port-security maximum 2 switchport port-security mac-address 0002.0002.0002 switchport port-security violation shutdown Given the configuration output shown above, what happens when a host with the MAC address of 0003.0003.0003 is directly connected to the switch port? ()A、 The host will be allowed to connect.B、 The port will shut down.C、 The host can only connect through a hub/switch where 0002.0002.0002 is already connected. D、 The host will be refused access.E、 None of the other alternatives apply
考题
You need to design a method of communication between the IT and HR departments. Your solution must meet business requirements. What should you do?()A、Design a custom IPSec policy to implement Encapsulating Security Payload (ESP) for all IP traffic Design the IPSec policy to use certificate-based authentication between the two departments’ computersB、Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computersC、Design a customer IPSec policy to implement Encapsulating Payload (ESP) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computersD、Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use certificate-based authentication between the two departments’ computers
考题
单选题The voice VLAN feature has been enabled on a new Company Catalyst switch port. What is the effect of this? ()A
The CoS is trusted for 802.1P or 802.1Q tagged traffic.B
PortFast is disabled on the port.C
Port Security is automatically enabled on a voice VLAN port.D
Untagged traffic is sent according to the default CoS priority of the port.E
None of the other alternatives apply
考题
单选题A Company switch was configured as shown below: switchport mode access switchport port-security switchport port-security maximum 2 switchport port-security mac-address 0002.0002.0002 switchport port-security violation shutdown Given the configuration output shown above, what happens when a host with the MAC address of 0003.0003.0003 is directly connected to the switch port? ()A
The host will be allowed to connect.B
The port will shut down.C
The host can only connect through a hub/switch where 0002.0002.0002 is already connected. D
The host will be refused access.E
None of the other alternatives apply
考题
单选题What is the port number of the IPsec Authentication Header packet?()A
IP protocol 50B
TCP port 51C
UDP port 50D
IP protocol 51E
UDP port 51F
TCP port 50
考题
单选题Companycom wants to reduce the number of copper, Ethernet adapters on their 4 way p5 570 running AIX 5.3 used in each of the four LPARs. Companycom has one database LPAR, two application LPARs, and one web LPAR. Only the Web LPAR needs to communicate with the outside world. What is the minimum number of Ethernet adapters that should be provided to ensure redundancy and no single point of failure?()A
One single port Ethernet adapterB
Four dual port Ethernet adaptersC
Two single port Ethernet adaptersD
Eight single port Ethernet adapters
考题
单选题What value is primarily used to determine which port becomes the root port on each non root switch in a spanning-tree topology?()A
path costB
lowest port MAC addressC
VTP revision numberD
highest port priority numberE
port priority number and MAC address
考题
单选题What value is primarily used to determine which port becomes the root port on each nonroot switch in aspanning-tree topology?()A
lowest port MAC addressB
port priority number and MAC address.C
VTP revision numberD
highest port priority number.E
path cost
考题
单选题Which operational mode command displays all active IPsec phase 2 security associations?()A
show ike security-associationsB
show ipsec security-associationsC
show security ike security-associationsD
show security ipsec security-associations
考题
单选题What is the port number of an IPsec Encapsulating Security Payload packet?()A
IP protocol 50B
IP protocol 51C
TCP port 50D
TCP port 51E
UDP port 50F
UDP port 51
考题
单选题What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-treetopology?()A
lowest port MAC addressB
port priority number and MAC address.C
VTP revision numberD
highest port priority number.E
pathcost
考题
单选题When you enable port security on an interface that is also configured with a voice VLAN, what is the maximum number of secure MAC addresses that should be set on the port?()A
No more than one secure MAC address should be set.B
The default will be set.C
The IP phone should use a dedicated port, therefore only one MAC address is needed per port.D
No value is needed if the switchport priority extend command is configured. E
No more than two secure MAC addresses should be set.
考题
单选题What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-tree topology?()A
lowest port MAC addressB
port priority number and MAC addressC
VTP revision numberD
highest port priority numberE
path cost
考题
多选题IPSec VPN is a widely-acknowledged solution for enterprise network. Which three IPsec VPNstatements are true?()AIKE keepalives are unidirectional and sent every ten secondsBIPsec uses the Encapsulating Security Protocol (ESP) or the Authentication Header (AH)protocol for exchanging keysCTo establish IKE SA, main mode utilizes six packets while aggressive mode utilizes only threepacketsDIKE uses the Diffie-Hellman algorithm to generate symmetrical keys to be used by IPsec peers
热门标签
最新试卷