网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which attribute is optional for IKE phase 2 negotiations?()
A
proxy-ID
B
phase 2 proposal
C
Diffie-Hellman group key
D
security protocol (ESP or AH)
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which attribute is optional for IKE phase 2 negotiations?()A proxy-IDB phase 2 proposalC Diffie-Hellman group keyD security protocol (ESP or AH)” 相关考题
考题
Which is not a negotiation tactic?A Imposing deadlinesB surprisesC person with authority is absentD reasoning togetherE all are negotiations tactics
考题
Viruses usually have two phases to their execution, the infection phase and the(75)phase. The later phase is optional, since stone viruses simply reproduce.A.reproduceB.proliferationC.defendD.attack
考题
WhichattributeisoptionalforIKEphase2negotiations?()
A.proxy-IDB.phase2proposalC.Diffie-HellmangroupkeyD.securityprotocol(ESPorAH)
考题
RegardinganIPsecsecurityassociation(SA),whichtwostatementsaretrue?()
A.IKESAisbidirectional.B.IPsecSAisbidirectional.C.IKESAisestablishedduringphase2negotiations.D.IPsecSAisestablishedduringphase2negotiations.
考题
Which two methods of authentication are used by the Infranet Controller for IPSec enforcement?()
A. dial-up VPNB. IKE authenticationC. XAuth authenticationD. shared IKE authentication
考题
Which of the following statements is correct?A.The definition phase results in the Software Requirements Specification.B.Testing is optional in software life cycle.C.CASE tools can only aid in the design phase of a software life cycle.D.A change during a later phase does not require the documentation of all earlier phases to be updated.
考题
Which one of the following is NOT a supported IKE attribute?()A、 PFS group.B、 Encryption algorithm.C、 Hashing Algorithm.D、 Authenticationmethod.E、 Lifetime duration.
考题
During the Easy VPN Remote connection process,which phase involves pushing the IP address, Domain Name System (DNS),and split tunnel attributes to the client?()A、mode configurationB、the VPN client establishment of an ISAKMP SAC、IPsec quick mode completion of the connectionD、VPN client initiation of the IKE phase 1 process
考题
Which of the following options lists the steps in PPP session establishment in the correct order?()A、Optional authentication phase, link establishment phase, network layer protocol phase.B、Network layer protocol phase, link establishment phase, optional authentication phase.C、Network layer protocol phase, optional authentication phase, link establishment phase.D、Link establishment phase, network layer protocol phase, optional authentication phase.E、Link establishment phase, optional authentication phase, network layer protocol phase.F、Optional authentication phase, network layer protocol phase, link establishment phase.
考题
Which two configuration elements are required for a policy-based VPN?()A、IKE gatewayB、secure tunnel interfaceC、security policy to permit the IKE trafficD、security policy referencing the IPsec VPN tunnel
考题
For the following items ,which one can be used to authenticate the IPsec peers during IKE Phase 1?()A、pre-shared keyB、integrity check valueC、XAUTHD、Diffie-Hellman Nonce
考题
During which phase of the boot process is the rootvg volume group varied on and the root file system (hd4) checked?() A、Boot phase 1B、Boot phase 2C、Boot phase 3D、Boot phase 4
考题
During which boot phase is the rootvg first activated()A、Phase 1B、Phase 2C、Phase 3D、POST Phase
考题
Which two methods of authentication are used by the Infranet Controller for IPSec enforcement?()A、dial-up VPNB、IKE authenticationC、XAuth authenticationD、shared IKE authentication
考题
Which attribute is optional for IKE phase 2 negotiations?()A、proxy-IDB、phase 2 proposalC、Diffie-Hellman group keyD、security protocol (ESP or AH)
考题
Regarding an IPsec security association (SA), which two statements are true?()A、IKE SA is bidirectional.B、IPsec SA is bidirectional.C、IKE SA is established during phase 2 negotiations.D、IPsec SA is established during phase 2 negotiations.
考题
单选题Which of the following options lists the steps in PPP session establishment in the correct order?()A
Optional authentication phase, link establishment phase, network layer protocol phase.B
Network layer protocol phase, link establishment phase, optional authentication phase.C
Network layer protocol phase, optional authentication phase, link establishment phase.D
Link establishment phase, network layer protocol phase, optional authentication phase.E
Link establishment phase, optional authentication phase, network layer protocol phase.F
Optional authentication phase, network layer protocol phase, link establishment phase.
考题
单选题Two VPN peers are negotiating IKE phase 1 using main mode. Which message pair in the negotiation contains the phase 1 proposal for the peers?()A
message 1 and 2B
message 3 and 4C
message 5 and 6D
message 7 and 8
考题
单选题During which boot phase is the rootvg first activated()A
Phase 1B
Phase 2C
Phase 3D
POST Phase
考题
多选题Regarding an IPsec security association (SA), which two statements are true?()AIKE SA is bidirectional.BIPsec SA is bidirectional.CIKE SA is established during phase 2 negotiations.DIPsec SA is established during phase 2 negotiations.
考题
单选题Which one of the following is NOT a supported IKE attribute?()A
PFS group.B
Encryption algorithm.C
Hashing Algorithm.D
Authenticationmethod.E
Lifetime duration.
考题
单选题Which attribute is required for all IKE phase 2 negotiations?()A
proxy-IDB
preshared keyC
Diffie-Hellman group keyD
main or aggressive mode
考题
单选题Click the Exhibit button. Referring to the exhibit, which statement contains the correct gateway parameters?()A
[edit security ike] user@host# show gateway ike-phase1-gateway { policy ike-policy1; address 10.10.10.1; dead-peer-detection { interval 20; threshold 5; } external-interface ge-1/0/1.0; }B
[edit security ike] user@host# show gateway ike-phase1-gateway { ike-policy ike-policy1; address 10.10.10.1; dead-peer-detection { interval 20; threshold 5; } external-interface ge-1/0/1.0; }C
[edit security ike] user@host# show gateway ike-phase1-gateway { policy ike1-policy; address 10.10.10.1; dead-peer-detection { interval 20; threshold 5; } external-interface ge-1/0/1.0; }D
[edit security ike] user@host# show gateway ike-phase1-gateway { ike-policy ike1-policy; address 10.10.10.1; dead-peer-detection { interval 20; threshold 5; } external-interface ge-1/0/1.0; }
考题
单选题During the Easy VPN Remote connection process,which phase involves pushing the IP address, Domain Name System (DNS),and split tunnel attributes to the client?()A
mode configurationB
the VPN client establishment of an ISAKMP SAC
IPsec quick mode completion of the connectionD
VPN client initiation of the IKE phase 1 process
考题
单选题Which operational mode command displays all active IPsec phase 2 security associations?()A
show ike security-associationsB
show ipsec security-associationsC
show security ike security-associationsD
show security ipsec security-associations
考题
单选题To implement the optional phase zero when using eap-fast for authentication, which of the following parameters must be set on the cisco secure acs?()A
eap-fast master serverB
allow automatic pac provisioningC
client initial messageD
authority id info
考题
单选题For IKE phase 1 negotiations, when is aggressive mode typically used?()A
when one of the tunnel peers has a dynamic IP addressB
when one of the tunnel peers wants to force main mode to be usedC
when fragmentation of the IKE packet is required between the two peersD
when one of the tunnel peers wants to specify a different phase 1 proposal
热门标签
最新试卷