网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
What is the port number of the IPsec Authentication Header packet?()
A

IP protocol 50

B

TCP port 51

C

UDP port 50

D

IP protocol 51

E

UDP port 51

F

TCP port 50


参考答案

参考解析
解析: 暂无解析
更多 “单选题What is the port number of the IPsec Authentication Header packet?()A IP protocol 50B TCP port 51C UDP port 50D IP protocol 51E UDP port 51F TCP port 50” 相关考题
考题 Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by ESP?() (Choose three.) A. data integrityB. data confidentialityC. data authenticationD. outer IP header confidentialityE. outer IP header authentication

考题 What is the port number of an IPsec Encapsulating Security Payfoad packet?()A、UOP port 50B、IP protocol 51C、TCP port 51D、TCP port 50E、IP protocol 50F、UDP port51

考题 What is the port number of the IPsec Authentication Header packet?()A、IP protocol 50B、TCP port 51C、UDP port 50D、IP protocol 51E、UDP port 51F、TCP port 50

考题 What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-treetopology?()A、lowest port MAC addressB、port priority number and MAC address.C、VTP revision numberD、highest port priority number.E、pathcost

考题 IPSec VPN is a widely-acknowledged solution for enterprise network. Which three IPsec VPNstatements are true?()A、IKE keepalives are unidirectional and sent every ten secondsB、IPsec uses the Encapsulating Security Protocol (ESP) or the Authentication Header (AH)protocol for exchanging keysC、To establish IKE SA, main mode utilizes six packets while aggressive mode utilizes only threepacketsD、IKE uses the Diffie-Hellman algorithm to generate symmetrical keys to be used by IPsec peers

考题 What is not a difference between VPN tunnel authentication and per-user authentication?()A、VPN tunnel authentication is part of the IKE specification. B、VPN tunnel authentication does not control which end user can use the IPSec SA (VPN tunnel).C、User authentication is used to control access for a specific user ID, and can be used with or without a VPN tunnel for network access authorization. D、802.1X with EAP-TLS (X.509 certificates) can be used to authenticate an IPSec tunnel.

考题 What does the number one 1 represent for interface fe-0/0/1?()A、port numberB、PCI slot numberC、channel numberD、virtual PIC number

考题 Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by ESP?() (Choose three.)A、data integrityB、data confidentialityC、data authenticationD、outer IP header confidentialityE、outer IP header authentication

考题 What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-tree topology?()A、lowest port MAC addressB、port priority number and MAC address.C、VTP revision numberD、highest port priority number.E、path cost

考题 In a network using cisco autonomous access points running wds. What port is used for authentication by the local authentication service on an access point?()A、1813B、1645C、1646D、1812

考题 What is true about Quality of Service (QoS) for VPNs?()A、QoS preclassification is only supported on generic routing encapsulation (GRE) and IPsec VPNsB、QoS preclassification is not required in Layer 2 Tunneling Protocol (L2TP), Layer2 Forwarding (L2F), and Point-to-Point Tunneling Protocol (PPTP) VPNsC、QoS preclassification is supported on IPsec AH VPNs, but not on IPsec ESP VPNsD、the QoS-for-VPNs feature (QoS preclassification) is designed for VPN transport interfacesE、with IPsec tunnel mode, the type of service (ToS) byte value is copied automatically from the original IP header to the tunnel header

考题 What is the port number of an IPsec Encapsulating Security Payload packet?()A、IP protocol 50B、IP protocol 51C、TCP port 50D、TCP port 51E、UDP port 50F、UDP port 51

考题 In a network using Cisco autonomous access points running WDS, what port is used for authentication by the local authentication service on an access point?()A、1813B、1645C、1646D、1812

考题 You work as a network administrator at, You have been asked to configure 802.1x port-based authentication. You notice that the client workstation is not compatible with 802.1x port-based authentication.  What supported authentication server should be chosen?()A、TACACS with LEAP extensionsB、RADIUS with EAP extensionsC、TACACS+D、LDAP

考题 Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by ESP?()A、data integrityB、data confidentialityC、data authenticationD、outer IP header confidentialityE、outer IP header authentication

考题 Your company has a main office and one branch office. All servers run Windows Server 2003 Service Pack 2 (SP2).The main office has a third-party gateway device named Gateway1. Gateway1 is connected to the internal network and the Internet. Gateway1 supports IPSec. In the branch office, you have a server named Server1. You create an IPSec policy on Server1.You need to ensure that Server1 can establish an IPSec tunnel to Gateway1.  What should you use to configure the IPSec policy?()A、an IP filter that allows only Internet Control Message Protocol (ICMP) traffic B、an IP filter that allows only TCP traffic on port 1701 C、a pre-shared key for authentication D、Kerberos authentication

考题 You need to design a method of communication between the IT and HR departments. Your solution must meet business requirements. What should you do?()A、Design a custom IPSec policy to implement Encapsulating Security Payload (ESP) for all IP traffic Design the IPSec policy to use certificate-based authentication between the two departments’ computersB、Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computersC、Design a customer IPSec policy to implement Encapsulating Payload (ESP) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computersD、Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use certificate-based authentication between the two departments’ computers

考题 多选题Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by AH?() (Choose three.)Adata integrityBdata confidentialityCdata authenticationDouter IP header confidentialityEouter IP header authentication

考题 单选题Refer to the exhibit. With an IPSec tunnel established between remote Router A and head-end router B, with Compressed Real-Time Protocol (cRTP) configured on the serial interface of Router A, what impact will the cRTP configuration have on the Voice over IP packets flowing through the IPSec tunnel from a Cisco 7960 IP phone?()A Twenty bytes of header will be replaced with five bytes. B If the IPSec transform set includes Authentication Header, the receiving IPSec peer will discard the packets. C The IPSec packets will be dropped by Router A's compression logic.D The voice packets will not be compressed.

考题 多选题Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by ESP?()Adata integrityBdata confidentialityCdata authenticationDouter IP header confidentialityEouter IP header authentication

考题 单选题What is the port number of an IPsec Encapsulating Security Payfoad packet?()A UOP port 50B IP protocol 51C TCP port 51D TCP port 50E IP protocol 50F UDP port51

考题 单选题What is the port number of the IPsec Authentication Header packet?()A IP protocol 50B TCP port 51C UDP port 50D IP protocol 51E UDP port 51F TCP port 50

考题 单选题Companycom wants to reduce the number of copper, Ethernet adapters on their 4 way p5 570 running AIX 5.3 used in each of the four LPARs. Companycom has one database LPAR, two application LPARs, and one web LPAR. Only the Web LPAR needs to communicate with the outside world. What is the minimum number of Ethernet adapters that should be provided to ensure redundancy and no single point of failure?()A One single port Ethernet adapterB Four dual port Ethernet adaptersC Two single port Ethernet adaptersD Eight single port Ethernet adapters

考题 单选题What value is primarily used to determine which port becomes the root port on each nonroot switch in aspanning-tree topology?()A lowest port MAC addressB port priority number and MAC address.C VTP revision numberD highest port priority number.E path cost

考题 单选题In a network using cisco autonomous access points running wds. What port is used for authentication by the local authentication service on an access point?()A 1813B 1645C 1646D 1812

考题 单选题What is the port number of an IPsec Encapsulating Security Payload packet?()A IP protocol 50B IP protocol 51C TCP port 50D TCP port 51E UDP port 50F UDP port 51

考题 单选题What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-treetopology?()A lowest port MAC addressB port priority number and MAC address.C VTP revision numberD highest port priority number.E pathcost

考题 单选题What is not a difference between VPN tunnel authentication and per-user authentication?()A VPN tunnel authentication is part of the IKE specification. B VPN tunnel authentication does not control which end user can use the IPSec SA (VPN tunnel).C User authentication is used to control access for a specific user ID, and can be used with or without a VPN tunnel for network access authorization. D 802.1X with EAP-TLS (X.509 certificates) can be used to authenticate an IPSec tunnel.