网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
Which IPsec security protocol should be used when confidentiality is required?()
A. AH
B. MD5
C. PSK
D. ESP
参考答案
更多 “ Which IPsec security protocol should be used when confidentiality is required?() A. AHB. MD5C. PSKD. ESP ” 相关考题
考题
A route-based VPN is required for which scenario? ()
A. when the remote VPN peer is behind a NAT deviceB. when multiple networks need to be reached across the tunnelC. when the remote VPN peer is a dialup or remote access clientD. when a dynamic routing protocol such as OSPF is required across the VPN
考题
Which method should be used to dynamically elect an RP when your network is using PIM version1?()
A. auto-RPB. static RPC. discovery modeD. bootstrap protocol
考题
IPsec, also known as the internet Protocol ( ) , defines the architecture for security services for IP network traffic IPsec describes the framework for providing security a the IP layer, as well as the suite of protocols designed to provide that security: through_ ( )_ and encryption of IP network packets. IPec can be used 10 protect network data, for example, by setting up circuits using IPsec ( ), in which all data being sent between two endpoints is encrypted, as with a Virtual (请作答此空) Network connection ;for encrypting application layer data ;and for providing security for routers sending routing data across the public internet. Internet traffic can also be secured from host to host without the use of IPsec, for example by encryption at the ( ) layer with HTTP Secure (TTPS)or an the transport layer wit the Transport Layer Security (TLS)protocol.A.pubic]
B.private]
C.personal
D.proper
考题
IPSec VPN is a widely-acknowledged solution for enterprise network. Which three IPsec VPNstatements are true?()A、IKE keepalives are unidirectional and sent every ten secondsB、IPsec uses the Encapsulating Security Protocol (ESP) or the Authentication Header (AH)protocol for exchanging keysC、To establish IKE SA, main mode utilizes six packets while aggressive mode utilizes only threepacketsD、IKE uses the Diffie-Hellman algorithm to generate symmetrical keys to be used by IPsec peers
考题
The LAN-side of the Teleworker router is assigned private IP address space (RFC1918), and the VPN topology is IPSec-only (no GRE protocol). When is it required to configure NAT/pNAT on the Teleworker router?()A、when all access to the Internet is through the IPSec tunnelB、when there is direct Internet access via split-tunnelingC、when there is no Internet access configured through the Teleworker routerD、whenever you have IOS-Firewall (CBAC) configured
考题
A route-based VPN is required for which scenario? ()A、when the remote VPN peer is behind a NAT deviceB、when multiple networks need to be reached across the tunnelC、when the remote VPN peer is a dialup or remote access clientD、when a dynamic routing protocol such as OSPF is required across the VPN
考题
Which two configuration elements are required for a policy-based VPN?()A、IKE gatewayB、secure tunnel interfaceC、security policy to permit the IKE trafficD、security policy referencing the IPsec VPN tunnel
考题
Which two are true about authentication?()A、Form-based logins should NOT be used with HTTPS.B、When using Basic Authentication the target server is NOT authenticated.C、J2EE compliant web containers are NOT required to support the HTTPS protocol.D、Web containers are required to support unauthenticated access to unprotected web resources.
考题
Which IPsec security protocol should be used when confidentiality is required?()A、AHB、MD5C、PSKD、ESP
考题
Which statement about the ip classless router command is true?()A、The ip classless command is enabled by default in recent versions of IOS.B、The ip classless command should only be enabled when static routing is being used instead of a routing protocol.C、The ip classless command should be enabled by the network administrator whenever RIPv1 or IGRP is being used.D、The ip classless command should be enabled by the network administrator whenever OSPF, RIPv2, or EIGRP is being used.
考题
When implementing MPLS VPNs between CE and PE routers, which of these statements is correct? ()A、If using IS-IS as the PE-CE routing protocol, no redistribution is required.B、If using static routes between the CE and PE routers, no redistribution of other VPN routes is required.C、If the PE-CE protocol is not BGP, redistribution of other VPN routes from MP-BGP is required.D、If RIP is the routing protocol that is used between the PE-CE routers, no redistribution is required, but any other protocol will require redistribution.E、If using OSPF or EIGRP as the PE-CE routing protocol, redistribution is not required, but any other protocol or static route will require redistribution.
考题
Which file contains the attributes used to setup a new user account when executing ‘mkuser’ without any flags?()A、/etc/security/userB、/etc/security/passwdC、/etc/security/mkuser.sysD、/etc/security/mkuser.default
考题
Which of the following options should be used to obtain the latest security patches for AIX?()A、FixDistB、The Bonus Pack CDC、OPSD、The Security Maintenance CD
考题
Which three JUNOS software features allow for increased security on your network?()A、firewall filtersB、data encryptionC、routing protocol authenticationD、support for BGP path mtu discoveryE、automatic discovery for IPSEC neighbors
考题
A route-based VPN is required for which scenario?()A、when the remote VPN peer is behind a NAT deviceB、when multiple networks need to be reached across the tunnel and GRE cannot be usedC、when the remote VPN peer is a dialup or remote access clientD、when a dynamic routing protocol is required across the VPN and GRE cannot be used
考题
Which two configuration elements are required for a route-based VPN?()A、secure tunnel interfaceB、security policy to permit the IKE trafficC、a route for the tunneled transit trafficD、tunnel policy for transit traffic referencing the IPsec VPN
考题
You are designing the settings for FinServ. You specify the permissions that will be used. You need to specify any additional settings required by the company. What should you do?()A、Install a digital certificate for Encrypting File System (EFS) on FinServB、Activate failure auditing on the access to files and objectsC、Configure all firewalls to track when any packets addresses to FinServ are droppedD、Create an IPSec policy that requires IPSec encryption between FinServ and the firewall
考题
多选题Which three JUNOS software features allow for increased security on your network?()Afirewall filtersBdata encryptionCrouting protocol authenticationDsupport for BGP path mtu discoveryEautomatic discovery for IPSEC neighbors
考题
单选题The required fireman’s outfits required for ship’s are not to be used for any other purpose EXCEPT for the().A
oxygen and explosion meter when it is used for detection of flare gasesB
self-contained breathing apparatus,when used as protection from gas leaking from a refrigeration unitC
boots and gloves that are made of rubber or electrically non-conductive material,if used when repairing electrical equipmentD
lifeline,if used by personnel entering a compartment which might be deficient of oxygen
考题
单选题Which of the following options should be used to obtain the latest security patches for AIX?()A
FixDistB
The Bonus Pack CDC
OPSD
The Security Maintenance CD
考题
单选题When EIGRP is used as the PE-CE routing protocol which of these statements is correct?()A
EIGRP can be used only as the PE-CE routing protocol if the PE and CE routers are in the same ASB
Other EIGRP AS routes are automatically advertised to the CE router and do not require a redistribution configuration command to be configuredC
Unlike other routing protocols that are used between PE and CE routers, EIGRP supports backdoor linksD
Configure of the VPN is only required on the PE router
考题
单选题Which method should be used to dynamically elect an RP when your network is using PIM version1?()A
auto-RPB
static RPC
discovery modeD
bootstrap protocol
考题
单选题Network access protection (NAP) is configured for the corporate network. Users connect to the corporate network by using portable computers. The command policy required confidentiality of data when is in transmit between the portable computers and the servers. You need to ensure that users can access network resources only from computers that comply with the company policy. What should you do?()A
Create an Ipsec enforcement network policy.B
Create an 802.1xenforcemen tnetwork policy.C
Createa wired network(IEEE802.3)Group policy.D
Create an extensible authentication protocol(EAP)enforcement network policy.
考题
单选题Which operational mode command displays all active IPsec phase 2 security associations?()A
show ike security-associationsB
show ipsec security-associationsC
show security ike security-associationsD
show security ipsec security-associations
考题
多选题Which two are true about authentication?()AForm-based logins should NOT be used with HTTPS.BWhen using Basic Authentication the target server is NOT authenticated.CJ2EE compliant web containers are NOT required to support the HTTPS protocol.DWeb containers are required to support unauthenticated access to unprotected web resources.
考题
多选题Which two mechanisms can be used to detect IPsec GRE tunnel failures?()ADead Peer Detection (DPD)BCDPCisakmp keepalivesDGRE keepalive mechanismEThe hello mechanism of the routing protocol across the IPsec tunnel
考题
多选题IPSec VPN is a widely-acknowledged solution for enterprise network. Which three IPsec VPNstatements are true?()AIKE keepalives are unidirectional and sent every ten secondsBIPsec uses the Encapsulating Security Protocol (ESP) or the Authentication Header (AH)protocol for exchanging keysCTo establish IKE SA, main mode utilizes six packets while aggressive mode utilizes only threepacketsDIKE uses the Diffie-Hellman algorithm to generate symmetrical keys to be used by IPsec peers
热门标签
最新试卷