网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
RegardinganIPsecsecurityassociation(SA),whichtwostatementsaretrue?()

A.IKESAisbidirectional.

B.IPsecSAisbidirectional.

C.IKESAisestablishedduringphase2negotiations.

D.IPsecSAisestablishedduringphase2negotiations.


参考答案

更多 “ RegardinganIPsecsecurityassociation(SA),whichtwostatementsaretrue?() A.IKESAisbidirectional.B.IPsecSAisbidirectional.C.IKESAisestablishedduringphase2negotiations.D.IPsecSAisestablishedduringphase2negotiations. ” 相关考题
考题 Afterperformingacleanshutdownofthedatabaseinstanceformaintenance,youmountthedatabaseandthenexecuteacommandtoopenthedatabase:SQLALTERDATABASEOPEN;Whichtwostatementsaretrue() A.Theonlineredologfilesandonlinedatafilesareopened.B.Alltheonlinedatafileheadersarecheckedforconsistency.C.Instancerecoveryisperformedbeforeopeningthedatabase.D.Thepathandexistenceofallthelogfilemembersarechecked

考题 Referring to the exhibit, which two statements are true?() A. The route 192.168.1.0/25 is acceptedB. The route 192.168.2.0/24 is acceptedC. OSPF routes will be exported into RIPD. RIP routes will be exported into OSPF

考题 An IPsec tunnel is established on an SRX Series Gateway on an interface whose IP address was obtained using DHCP.Which two statements are true? ()(Choose two.) A. Only main mode can be used for IKE negotiationB. A local-identity must be definedC. It must be the initiator for IKED. A remote-identity must be defined

考题 You administer a network containing SRX Series firewalls. New policy requires that you implement MAG Series devices to provide access control for end users. The policy requires that the SRX Series devices dynamically enforce security policy based on the source IP address of the user. The policy also requires that the users communicate with protected resources using encrypted traffic.Which two statements are true?()A. The endpoints can use agentless access.B. Encrypted traffic flows between the endpoint and the enforcer.C. Encrypted traffic flows between the endpoint and the protected resourceD. The endpoints can use the Odyssey Access Client.

考题 Two devices on an Ethernet segment sent frames at the same time causing a collision. Which two statements are true?() A. Both devices stop transmitting, wait a random period of time, verify the wire is idle, and re- transmit.B. The device with the lowest MAC address is permitted to retransmit first.C. The device with the lowest MAC address sends a jam signal to notify all other devices of the collision.D. Both devices send a jam signal to notify all other devices of the collision.

考题 If Host Checker restrictions are applied at the role level and the "Allow access to the role if any ONE of the select policies is passed" option is unchecked, which two statements are true?() A. All roles are evaluated together.B. Each role is evaluated separately.C. Clients must pass all policies to access the role.D. Clients will pass as long as one policy is accepted.

考题 An etwork administrator has enabled OSPF across an NBMA network and has issued the command ip ospf network nonbroadcast. Given those facts, which two statements are true?() A. Interfaces will automatically detect and build adjacencies with neighbor routersB. DR and BDR elections will not occurC. DR and BDR elections will occurD. The neighbor command is required to build adjacenciesE. All routers must be configured in a fully meshed topology with all other routers

考题 A network administrator needs to configure port security on a switch.which two statements are true? () A.The network administrator can apply port security to dynamic access portsB.The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.C.The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.D.The network administrator can apply port security to EtherChannels.E.When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.

考题 Anetworkadministratorneedstoconfigureportsecurityonaswitch.whichtwostatementsaretrue?() A.ThenetworkadministratorcanapplyportsecuritytodynamicaccessportsB.Thenetworkadministratorcanconfigurestaticsecureorstickysecuremacaddressesinthevoicevlan.C.Thestickylearningfeatureallowstheadditionofdynamicallylearnedaddressestotherunningconfiguration.D.ThenetworkadministratorcanapplyportsecuritytoEtherChannels.E.Whendynamicmacaddresslearningisenabledonaninterface,theswitchcanlearnnew addresses,up tothemaximumdefined.