网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
Which of the following protocols would MOST likely be used in the establishment of an IPSec VPN tunnel?()
- A、AES
- B、TKIP
- C、802.1q
- D、ISAKMP
参考答案
更多 “Which of the following protocols would MOST likely be used in the establishment of an IPSec VPN tunnel?()A、AESB、TKIPC、802.1qD、ISAKMP” 相关考题
考题
Which of the following expansion slots would be MOST likely used to install an additional NIC into a desktop PC?()
A. PCIB. AGP 8xC. Mini PCID. PCI Express x16
考题
Which of the following protocols would be used in order to log into a router to configure a VLAN?()
A.RDPB.SMTPC.TELNETD.FTP
考题
Which of the following would MOST likely be used with multimode fiber?()
A.10GBase-LRB.10GBase-TC.10GBase-ERD.10GBase-SR
考题
Which of the following wiring standards would MOST likely be used to interconnect two devices without the use of a hub or switch?()
A.568AB.568BC.CrossoverD.Loopback
考题
Which of the following protocols would MOST likely be used in the establishment of an IPSec VPN tunnel?()
A. AESB. TKIPC. 802.1qD. ISAKMP
考题
Which of the following devices would MOST likely integrate a DHCP server?()
A.RouterB.HubC.SwitchD.Bridge
考题
Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?()
A.IDSB.VPNC.NIPSD.HIDS
考题
During the Easy VPN Remote connection process,which phase involves pushing the IP address, Domain Name System (DNS),and split tunnel attributes to the client?()A、mode configurationB、the VPN client establishment of an ISAKMP SAC、IPsec quick mode completion of the connectionD、VPN client initiation of the IKE phase 1 process
考题
Which two mechanisms can be used to detect IPsec GRE tunnel failures?()A、Dead Peer Detection (DPD)B、CDPC、isakmp keepalivesD、GRE keepalive mechanismE、The hello mechanism of the routing protocol across the IPsec tunnel
考题
Which three features are benefits of using GRE tunnels in conjunction with IPsec for building site-to-site VPNs?()A、allows dynamic routing over the tunnelB、supports multi-protocol (non-IP) traffic over the tunnelC、reduces IPsec headers overhead since tunnel mode is usedD、simplifies the ACL used in the crypto mapE、uses Virtual Tunnel Interface (VTI) to simplify the IPsec VPN configuration
考题
What is not a difference between VPN tunnel authentication and per-user authentication?()A、VPN tunnel authentication is part of the IKE specification. B、VPN tunnel authentication does not control which end user can use the IPSec SA (VPN tunnel).C、User authentication is used to control access for a specific user ID, and can be used with or without a VPN tunnel for network access authorization. D、802.1X with EAP-TLS (X.509 certificates) can be used to authenticate an IPSec tunnel.
考题
A user is reporting that their computer is making strange noises and randomly powers off. Which of the following tools would MOST likely be used to troubleshoot this problem?()A、POST diagnostic cardB、Power supply testerC、Loop back plugD、Cable tester
考题
Which of the following wiring standards would MOST likely be used to interconnect two devices without the use of a hub or switch?()A、568AB、568BC、CrossoverD、Loopback
考题
Which statement correctly describes IPsec VPN backup technology?()A、The cypto isakmp keepalive command is used to configure the Stateful Switchover (SSO)protocolB、Reverse Route Injection (RRI) is configured on at the remote site to inject the central sitenetworksC、Each Hot Standby Routing Protocol (HSRP) standby group has two well-known MACaddresses and a virtual IP addressD、The cypto isakmp keepalive command is used to configure stateless failover
考题
Which of the following protocols would MOST likely be used in the establishment of an IPSec VPN tunnel?()A、 AES B、 TKIPC、 802.1qD、 ISAKMP
考题
An administrator has removed a SATA hard drive from a failed server. Which of the following adapters would MOST likely be used by the administrator to transfer files from the drive to a laptop?()A、SATA to SCSIB、SATA to HBAC、SATA to USBD、SATA to SAS
考题
Which of the following would MOST likely be used with multimode fiber?()A、10GBase-LRB、10GBase-TC、10GBase-ERD、10GBase-SR
考题
Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?()A、IDSB、VPNC、NIPSD、HIDS
考题
Which of the following ports is MOST likely used for high-end graphics cards?()A、PCIB、PCIeC、ISAD、AGP
考题
Which of the following expansion slots would be MOST likely used to install an additional NIC into a desktop PC?()A、PCIB、AGP 8xC、Mini PCID、PCI Express x16
考题
Which of the following protocols would be used in order to log into a router to configure a VLAN?()A、RDPB、SMTPC、TELNETD、FTP
考题
Which of the following commands would MOST likely be used to see where a loss of connectivity between two devices on a network is located?()A、tracertB、netstatC、nslookupD、ping
考题
Which of the following devices would MOST likely integrate a DHCP server?()A、RouterB、HubC、SwitchD、Bridge
考题
单选题During the Easy VPN Remote connection process,which phase involves pushing the IP address, Domain Name System (DNS),and split tunnel attributes to the client?()A
mode configurationB
the VPN client establishment of an ISAKMP SAC
IPsec quick mode completion of the connectionD
VPN client initiation of the IKE phase 1 process
考题
单选题Which of the following protocols would MOST likely be used in the establishment of an IPSec VPN tunnel?()A
AESB
TKIPC
802.1qD
ISAKMP
考题
单选题Which of the following protocols would MOST likely be used in the establishment of an IPSec VPN tunnel?()A
AES B
TKIPC
802.1qD
ISAKMP
考题
单选题What is not a difference between VPN tunnel authentication and per-user authentication?()A
VPN tunnel authentication is part of the IKE specification. B
VPN tunnel authentication does not control which end user can use the IPSec SA (VPN tunnel).C
User authentication is used to control access for a specific user ID, and can be used with or without a VPN tunnel for network access authorization. D
802.1X with EAP-TLS (X.509 certificates) can be used to authenticate an IPSec tunnel.
热门标签
最新试卷