网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by AH?() (Choose three.)
A. data integrity
B. data confidentiality
C. data authentication
D. outer IP header confidentiality
E. outer IP header authentication
参考答案
更多 “ Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by AH?() (Choose three.) A. data integrityB. data confidentialityC. data authenticationD. outer IP header confidentialityE. outer IP header authentication ” 相关考题
考题
Which fields are included in the TCP header? (Choose three).A. Source PortB. Acknowledgement NumberC. Request NumberD. Destination AddressE. WindowF. Data
考题
Which two statements are true about AH?() (Choose two.)
A. AH provides data integrity.B. AH is identified by IP protocol 50.C. AH is identified by IP protocol 51.D. AH cannot work in conjunction with ESP
考题
Which encryption type is used to secure user data in an IPsec tunnel?()
A. symmetric key encryptionB. asymmetric key encryptionC. RSAD. digital certificates
考题
Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by ESP?() (Choose three.)
A. data integrityB. data confidentialityC. data authenticationD. outer IP header confidentialityE. outer IP header authentication
考题
Which three advanced permit actions within security policies are valid?() (Choose three.)
A. Mark permitted traffic for firewall user authentication.B. Mark permitted traffic for SCREEN options.C. Associate permitted traffic with an IPsec tunnel.D. Associate permitted traffic with a NAT rule.E. Mark permitted traffic for IDP processing.
考题
Which three must be configured for the Packet Capture tool to collect all required data? ()(Choose three.)
A. Enter the password.B. Modify the delete time to 3 hours.C. Set the interface to local, remote or both.D. Increase the snap length of the Packet Capture configuration.E. Set the Packet Capture size to greater than the actual data flow
考题
Which component of VPN technology ensures that data can be read only by its intended recipient?()
A. data integrityB. encryptionC. key exchangeD. authentication
考题
IPsec, also known as the internet Protocol ( ) , defines the architecture for security services for IP network traffic IPsec describes the framework for providing security a the IP layer, as well as the suite of protocols designed to provide that security: through_ ( )_ and encryption of IP network packets. IPec can be used 10 protect network data, for example, by setting up circuits using IPsec ( ), in which all data being sent between two endpoints is encrypted, as with a Virtual (请作答此空) Network connection ;for encrypting application layer data ;and for providing security for routers sending routing data across the public internet. Internet traffic can also be secured from host to host without the use of IPsec, for example by encryption at the ( ) layer with HTTP Secure (TTPS)or an the transport layer wit the Transport Layer Security (TLS)protocol.A.pubic]
B.private]
C.personal
D.proper
考题
IPSec VPN is a widely-acknowledged solution for enterprise network. Which three IPsec VPNstatements are true?()A、IKE keepalives are unidirectional and sent every ten secondsB、IPsec uses the Encapsulating Security Protocol (ESP) or the Authentication Header (AH)protocol for exchanging keysC、To establish IKE SA, main mode utilizes six packets while aggressive mode utilizes only threepacketsD、IKE uses the Diffie-Hellman algorithm to generate symmetrical keys to be used by IPsec peers
考题
Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by ESP?() (Choose three.)A、data integrityB、data confidentialityC、data authenticationD、outer IP header confidentialityE、outer IP header authentication
考题
Which component of VPN technology ensures that data can be read only by its intended recipient?()A、data integrityB、encryptionC、key exchangeD、authentication
考题
Routers can be used to integrate a variety of services. Which two common services are often specified by businesses?()A、 Mitigation and ResponseB、 Fibre Channel over EthernetC、 IP communicationsD、 Data Center VirtualizationE、 VPN security
考题
Which encryption type is used to secure user data in an IPsec tunnel?()A、symmetric key encryptionB、asymmetric key encryptionC、RSAD、digital certificates
考题
Which three JUNOS software features allow for increased security on your network?()A、firewall filtersB、data encryptionC、routing protocol authenticationD、support for BGP path mtu discoveryE、automatic discovery for IPSEC neighbors
考题
Which two statements are true about AH?() (Choose two.)A、AH provides data integrity.B、AH is identified by IP protocol 50.C、AH is identified by IP protocol 51.D、AH cannot work in conjunction with ESP
考题
Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by AH?() (Choose three.)A、data integrityB、data confidentialityC、data authenticationD、outer IP header confidentialityE、outer IP header authentication
考题
Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by ESP?()A、data integrityB、data confidentialityC、data authenticationD、outer IP header confidentialityE、outer IP header authentication
考题
Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by AH?()A、data integrityB、data confidentialityC、data authenticationD、outer IP header confidentialityE、outer IP header authentication
考题
Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)A、access profileB、client groupC、clientD、default profileE、external
考题
Which statement is true about the loss of system-critical data files in ARCHIVELOG mode?()A、The data files can be recovered till the last committed transaction.B、The data files can be recovered without shutting down the database.C、The data file is taken offline automatically; the database remains open.D、The data files can be recovered to the time of the most recent backup.
考题
多选题Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by ESP?() (Choose three.)Adata integrityBdata confidentialityCdata authenticationDouter IP header confidentialityEouter IP header authentication
考题
多选题Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)Aaccess profileBclient groupCclientDdefault profileEexternal
考题
多选题Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by AH?() (Choose three.)Adata integrityBdata confidentialityCdata authenticationDouter IP header confidentialityEouter IP header authentication
考题
多选题Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by AH?()Adata integrityBdata confidentialityCdata authenticationDouter IP header confidentialityEouter IP header authentication
考题
多选题Which three must be configured for the Packet Capture tool to collect all required data? ()(Choose three.)AEnter the password.BModify the delete time to 3 hours.CSet the interface to local, remote or both.DIncrease the snap length of the Packet Capture configuration.ESet the Packet Capture size to greater than the actual data flow
考题
多选题Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by ESP?()Adata integrityBdata confidentialityCdata authenticationDouter IP header confidentialityEouter IP header authentication
考题
多选题IPSec VPN is a widely-acknowledged solution for enterprise network. Which three IPsec VPNstatements are true?()AIKE keepalives are unidirectional and sent every ten secondsBIPsec uses the Encapsulating Security Protocol (ESP) or the Authentication Header (AH)protocol for exchanging keysCTo establish IKE SA, main mode utilizes six packets while aggressive mode utilizes only threepacketsDIKE uses the Diffie-Hellman algorithm to generate symmetrical keys to be used by IPsec peers
热门标签
最新试卷