网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

Which of the following protocols would MOST likely be used in the establishment of an IPSec VPN tunnel?()

  • A、AES
  • B、TKIP
  • C、802.1q
  • D、ISAKMP

参考答案

更多 “Which of the following protocols would MOST likely be used in the establishment of an IPSec VPN tunnel?()A、AESB、TKIPC、802.1qD、ISAKMP” 相关考题
考题 Which of the following expansion slots would be MOST likely used to install an additional NIC into a desktop PC?() A. PCIB. AGP 8xC. Mini PCID. PCI Express x16

考题 Which of the following protocols would be used in order to log into a router to configure a VLAN?() A.RDPB.SMTPC.TELNETD.FTP

考题 Which of the following would MOST likely be used with multimode fiber?() A.10GBase-LRB.10GBase-TC.10GBase-ERD.10GBase-SR

考题 Which of the following wiring standards would MOST likely be used to interconnect two devices without the use of a hub or switch?() A.568AB.568BC.CrossoverD.Loopback

考题 Which of the following protocols would MOST likely be used in the establishment of an IPSec VPN tunnel?() A. AESB. TKIPC. 802.1qD. ISAKMP

考题 Which of the following devices would MOST likely integrate a DHCP server?() A.RouterB.HubC.SwitchD.Bridge

考题 Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?() A.IDSB.VPNC.NIPSD.HIDS

考题 During the Easy VPN Remote connection process,which phase involves pushing the IP address, Domain Name System (DNS),and split tunnel attributes to the client?()A、mode configurationB、the VPN client establishment of an ISAKMP SAC、IPsec quick mode completion of the connectionD、VPN client initiation of the IKE phase 1 process

考题 Which two mechanisms can be used to detect IPsec GRE tunnel failures?()A、Dead Peer Detection (DPD)B、CDPC、isakmp keepalivesD、GRE keepalive mechanismE、The hello mechanism of the routing protocol across the IPsec tunnel

考题 Which three features are benefits of using GRE tunnels in conjunction with IPsec for building site-to-site VPNs?()A、allows dynamic routing over the tunnelB、supports multi-protocol (non-IP) traffic over the tunnelC、reduces IPsec headers overhead since tunnel mode is usedD、simplifies the ACL used in the crypto mapE、uses Virtual Tunnel Interface (VTI) to simplify the IPsec VPN configuration

考题 What is not a difference between VPN tunnel authentication and per-user authentication?()A、VPN tunnel authentication is part of the IKE specification. B、VPN tunnel authentication does not control which end user can use the IPSec SA (VPN tunnel).C、User authentication is used to control access for a specific user ID, and can be used with or without a VPN tunnel for network access authorization. D、802.1X with EAP-TLS (X.509 certificates) can be used to authenticate an IPSec tunnel.

考题 A user is reporting that their computer is making strange noises and randomly powers off. Which of the following tools would MOST likely be used to troubleshoot this problem?()A、POST diagnostic cardB、Power supply testerC、Loop back plugD、Cable tester

考题 Which of the following wiring standards would MOST likely be used to interconnect two devices without the use of a hub or switch?()A、568AB、568BC、CrossoverD、Loopback

考题 Which statement correctly describes IPsec VPN backup technology?()A、The cypto isakmp keepalive command is used to configure the Stateful Switchover (SSO)protocolB、Reverse Route Injection (RRI) is configured on at the remote site to inject the central sitenetworksC、Each Hot Standby Routing Protocol (HSRP) standby group has two well-known MACaddresses and a virtual IP addressD、The cypto isakmp keepalive command is used to configure stateless failover

考题 Which of the following protocols would MOST likely be used in the establishment of an IPSec VPN tunnel?()A、 AES B、 TKIPC、 802.1qD、 ISAKMP

考题 An administrator has removed a SATA hard drive from a failed server. Which of the following adapters would MOST likely be used by the administrator to transfer files from the drive to a laptop?()A、SATA to SCSIB、SATA to HBAC、SATA to USBD、SATA to SAS

考题 Which of the following would MOST likely be used with multimode fiber?()A、10GBase-LRB、10GBase-TC、10GBase-ERD、10GBase-SR

考题 Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?()A、IDSB、VPNC、NIPSD、HIDS

考题 Which of the following ports is MOST likely used for high-end graphics cards?()A、PCIB、PCIeC、ISAD、AGP

考题 Which of the following expansion slots would be MOST likely used to install an additional NIC into a desktop PC?()A、PCIB、AGP 8xC、Mini PCID、PCI Express x16

考题 Which of the following protocols would be used in order to log into a router to configure a VLAN?()A、RDPB、SMTPC、TELNETD、FTP

考题 Which of the following commands would MOST likely be used to see where a loss of connectivity between two devices on a network is located?()A、tracertB、netstatC、nslookupD、ping

考题 Which of the following devices would MOST likely integrate a DHCP server?()A、RouterB、HubC、SwitchD、Bridge

考题 单选题During the Easy VPN Remote connection process,which phase involves pushing the IP address, Domain Name System (DNS),and split tunnel attributes to the client?()A mode configurationB the VPN client establishment of an ISAKMP SAC IPsec quick mode completion of the connectionD VPN client initiation of the IKE phase 1 process

考题 单选题Which of the following protocols would MOST likely be used in the establishment of an IPSec VPN tunnel?()A AESB TKIPC 802.1qD ISAKMP

考题 单选题Which of the following protocols would MOST likely be used in the establishment of an IPSec VPN tunnel?()A  AES B  TKIPC  802.1qD  ISAKMP

考题 单选题What is not a difference between VPN tunnel authentication and per-user authentication?()A VPN tunnel authentication is part of the IKE specification. B VPN tunnel authentication does not control which end user can use the IPSec SA (VPN tunnel).C User authentication is used to control access for a specific user ID, and can be used with or without a VPN tunnel for network access authorization. D 802.1X with EAP-TLS (X.509 certificates) can be used to authenticate an IPSec tunnel.