网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
多选题
You need to configure a GRE tunnel on a IPSec router. When you are using the SDM to configurea GRE tunnel over IPsec, which two parameters are required when defining the tunnel interfaceinformation?()
A
The crypto ACL number
B
The IPSEC mode (tunnel or transport)
C
The GRE tunnel interface IP address
D
The GRE tunnel source interface or IP address, and tunnel destination IP address
E
The MTU size of the GRE tunnel interface
参考答案
参考解析
解析:
暂无解析
更多 “多选题You need to configure a GRE tunnel on a IPSec router. When you are using the SDM to configurea GRE tunnel over IPsec, which two parameters are required when defining the tunnel interfaceinformation?()AThe crypto ACL numberBThe IPSEC mode (tunnel or transport)CThe GRE tunnel interface IP addressDThe GRE tunnel source interface or IP address, and tunnel destination IP addressEThe MTU size of the GRE tunnel interface” 相关考题
考题
You are configuring an SRX210 as a firewall enforcer that will tunnel IPsec traffic from several Junos Pulse users.Which two parameters must you configure on the SRX210?()
A. access profileB. IKE parametersC. tunneled interfaceD. redirect policy
考题
Router R1, a branch router, connects to the Internet using DSL. Some traffic flows through a GRE and IPsec tunnel, over the DSL connection, destined for an Enterprise network.Which of the following answers best describes the router‘s logic that tells the router, for a given packet, to apply GRE encapsulation to the packet?()A. When the packet received on the LAN interface is permitted by the ACL listed on the tunnel greacl command under the incoming interfaceB. When routing the packet, matching a route whose outgoing interface is the GRE tunnel interfaceC. When routing the packet, matching a route whose outgoing interface is the IPsec tunnel interfaceD. When permitted by an ACL that was referenced in the associated crypto map
考题
Refer to the exhibit. A new TAC engineer came to you for advice. A GRE over IPsec tunnel was configured, but the tunnel is not coming up. W hat did the TAC engineer configure incorrectly?()
A. The crypto isakmp configuration is not correct.B. The crypto map configuration is not correct.C. The interface tunnel configuration is not correct.D. The network configuration is not correct; netw ork 172.16.1.0 is missing.
考题
To securely transport EIGRP traffic, a network administrator will build VPNs between sites. What is the best method to accomplish the transport of EIGRP traffic?()
A. IPSec in tunnel modeB. IPSec in transport modeC. GRE with IPSec in transport modeD. GRE with IPSec in tunnel mode
考题
You work as a network engineer, do you know an IPsec tunnel is negotiated within the protection of whichtype of tunnel?()A、L2F tunnelB、L2TP tunnelC、GRE tunnelD、ISAKMP tunnel
考题
Router R1, a branch router, connects to the Internet using DSL. Some traffic flows through a GRE and IPsec tunnel, over the DSL connection, destined for an Enterprise network. Which of the following answers best describes the router's logic that tells the router, for a given packet, to apply GRE encapsulation to the packet?()A、When the packet received on the LAN interface is permitted by the ACL listed on the tunnel greacl command under the incoming interfaceB、When routing the packet, matching a route whose outgoing interface is the GRE tunnel interfaceC、When routing the packet, matching a route whose outgoing interface is the IPsec tunnel interfaceD、When permitted by an ACL that was referenced in the associated crypto map
考题
When configuring a multipoint GRE (mGRE) tunnel interface, which one of the following is NOT a valid configuration option:()A、 tunnel sourceB、 tunnel destinationC、 tunnel keyD、 ip addressE、 tunnelvrf
考题
Which two mechanisms can be used to detect IPsec GRE tunnel failures?()A、Dead Peer Detection (DPD)B、CDPC、isakmp keepalivesD、GRE keepalive mechanismE、The hello mechanism of the routing protocol across the IPsec tunnel
考题
You need to configure a GRE tunnel on a IPSec router. When you are using the SDM to configurea GRE tunnel over IPsec, which two parameters are required when defining the tunnel interfaceinformation?()A、The crypto ACL numberB、The IPSEC mode (tunnel or transport)C、The GRE tunnel interface IP addressD、The GRE tunnel source interface or IP address, and tunnel destination IP addressE、The MTU size of the GRE tunnel interface
考题
The LAN-side of the Teleworker router is assigned private IP address space (RFC1918), and the VPN topology is IPSec-only (no GRE protocol). When is it required to configure NAT/pNAT on the Teleworker router?()A、when all access to the Internet is through the IPSec tunnelB、when there is direct Internet access via split-tunnelingC、when there is no Internet access configured through the Teleworker routerD、whenever you have IOS-Firewall (CBAC) configured
考题
our company has a main office and one branch office. All servers run Windows Server 2003 Service Pack 2 (SP2). The main office has a third-party gateway device named Gateway1. Gateway1 is connected to the internal network and the Internet. Gateway1 supports IPSec. In the branch office, you have a server named Server1. You create an IPSec policy on Server1. You need to ensure that Server1 can establish an IPSec tunnel to Gateway1. What should you use to configure the IPSec policy?()A、an IP filter that allows only Internet Control Message Protocol (ICMP) trafficB、an IP filter that allows only TCP traffic on port 1701C、a pre-shared key for authenticationD、Kerberos authentication
考题
A policy-based IPsec VPN is ideal for which scenario?()A、when you want to conserve tunnel resourcesB、when the remote peer is a dialup or remote access clientC、when you want to configure a tunnel policy with an action of denyD、when a dynamic routing protocol such as OSPF must be sent across the VPN
考题
To securely transport EIGRP traffic, a network administrator will build VPNs between sites. What is the best method to accomplish the transport of EIGRP traffic?()A、IPSec in tunnel modeB、IPSec in transport modeC、GRE with IPSec in transport modeD、GRE with IPSec in tunnel mode
考题
A route-based VPN is required for which scenario?()A、when the remote VPN peer is behind a NAT deviceB、when multiple networks need to be reached across the tunnel and GRE cannot be usedC、when the remote VPN peer is a dialup or remote access clientD、when a dynamic routing protocol is required across the VPN and GRE cannot be used
考题
Your company has a main office and a branch office. You discover that when you disable IPv4 on a computer in the branch office, the computer authenticates by using a domain controller in the main office. You need to ensure that IPv6-only computers authenticate to domain controllers in the same site. What should you do()A、Configure the NTDS Site Settings object.B、Create Active Directory subnet objects.C、Create Active Directory Domain Services connection objects.D、Install an Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) router.
考题
Your portable computer is in sleep mode. When you resume work on the portable computer, you are not prompted for a password. You need to ensure that you are prompted for a password each time the portable computer recovers from sleep mode. What should you do?()A、Configure the computer to hibernate when not in use.B、In the current power plan settings, configure the computer to require a password when recovering from sleep mode.C、Configure the computer to use the High Performance power plan.D、Configure the screen saver settings to require a password on resumption of work.
考题
You need to design a remote access strategy for the customer support users when they work from home. Your solution must meet security requirements. What should you do?()A、Deploy an L2TP/IPsec VPN server in each call center. Configure the portable computers as L2TP VPN clientsB、Create IPSec tunnel mode connections between the customer support users home and the company’s Internet-facing routersC、Create IP packet filters on the company’s Internet-facing routers to allow the Remote Desktop Protocol (RDP).Create IPSec filters on the terminal servers to allow only connections that use RDPD、Create IP packet filters on the company’s Internet-facing routers to allow the IPSec protocols. Assign the Secure Server (Require Security) IPSec policy to the terminal servers. Assign the Client (Respond only) IPSec policy to the portable computers
考题
You are designing the settings for FinServ. You specify the permissions that will be used. You need to specify any additional settings required by the company. What should you do?()A、Install a digital certificate for Encrypting File System (EFS) on FinServB、Activate failure auditing on the access to files and objectsC、Configure all firewalls to track when any packets addresses to FinServ are droppedD、Create an IPSec policy that requires IPSec encryption between FinServ and the firewall
考题
Your computer has a wired network adapter and a wireless network adapter. You use the wireless network adapter only when you are traveling. You need to configure the network adapter profile settings to ensure that the computer discovers other network devices only when you are at home. Which two actions should you perform?()A、When you configure access to the wired network at home, set the wired network adapter location type to Public.B、When you configure access to the wired network at home, set the wired network adapter location type to Private.C、When you configure access to the public wireless access points, set the wireless network adapter location type to Public.D、When you configure access to the public wireless access points, set the wireless network adapter location type to Private.
考题
单选题To securely transport EIGRP traffic, a network administrator will build VPNs between sites. Whatis the best method to accomplish the transport of EIGRP traffic?()A
IPSec in tunnel modeB
IPSec in transport modeC
GRE with IPSec in transport modeD
GRE with IPSec in tunnel mode
考题
单选题You work as a network engineer, do you know an IPsec tunnel is negotiated within the protection of whichtype of tunnel?()A
L2F tunnelB
L2TP tunnelC
GRE tunnelD
ISAKMP tunnel
考题
单选题A policy-based IPsec VPN is ideal for which scenario?()A
when you want to conserve tunnel resourcesB
when the remote peer is a dialup or remote access clientC
when you want to configure a tunnel policy with an action of denyD
when a dynamic routing protocol such as OSPF must be sent across the VPN
考题
多选题You are configuring an SRX210 as a firewall enforcer that will tunnel IPsec traffic from several Junos Pulse users.Which two parameters must you configure on the SRX210?()Aaccess profileBIKE parametersCtunneled interfaceDredirect policy
考题
单选题When configuring a multipoint GRE (mGRE) tunnel interface, which one of the following is NOT a valid configuration option:()A
tunnel sourceB
tunnel destinationC
tunnel keyD
ip addressE
tunnelvrf
考题
单选题Router R1, a branch router, connects to the Internet using DSL. Some traffic flows through a GRE and IPsec tunnel, over the DSL connection, destined for an Enterprise network. Which of the following answers best describes the router's logic that tells the router, for a given packet, to apply GRE encapsulation to the packet?()A
When the packet received on the LAN interface is permitted by the ACL listed on the tunnel greacl command under the incoming interfaceB
When routing the packet, matching a route whose outgoing interface is the GRE tunnel interfaceC
When routing the packet, matching a route whose outgoing interface is the IPsec tunnel interfaceD
When permitted by an ACL that was referenced in the associated crypto map
考题
单选题The LAN-side of the Teleworker router is assigned private IP address space (RFC1918), and the VPN topology is IPSec-only (no GRE protocol). When is it required to configure NAT/pNAT on the Teleworker router?()A
when all access to the Internet is through the IPSec tunnelB
when there is direct Internet access via split-tunnelingC
when there is no Internet access configured through the Teleworker routerD
whenever you have IOS-Firewall (CBAC) configured
考题
多选题Which two mechanisms can be used to detect IPsec GRE tunnel failures?()ADead Peer Detection (DPD)BCDPCisakmp keepalivesDGRE keepalive mechanismEThe hello mechanism of the routing protocol across the IPsec tunnel
热门标签
最新试卷