单选题What is the port number of the IPsec Authentication Header packet?()AIP protocol 50BTCP port 51CUDP port 50DIP protocol 51EUDP port 51FTCP port 50

单选题
What is the port number of the IPsec Authentication Header packet?()
A

IP protocol 50

B

TCP port 51

C

UDP port 50

D

IP protocol 51

E

UDP port 51

F

TCP port 50


参考解析

解析: 暂无解析

相关考题:

Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by ESP?() (Choose three.) A. data integrityB. data confidentialityC. data authenticationD. outer IP header confidentialityE. outer IP header authentication

What is the port number of an IPsec Encapsulating Security Payfoad packet?()A、UOP port 50B、IP protocol 51C、TCP port 51D、TCP port 50E、IP protocol 50F、UDP port51

What is the port number of the IPsec Authentication Header packet?()A、IP protocol 50B、TCP port 51C、UDP port 50D、IP protocol 51E、UDP port 51F、TCP port 50

What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-treetopology?()A、lowest port MAC addressB、port priority number and MAC address.C、VTP revision numberD、highest port priority number.E、pathcost

IPSec VPN is a widely-acknowledged solution for enterprise network. Which three IPsec VPNstatements are true?()A、IKE keepalives are unidirectional and sent every ten secondsB、IPsec uses the Encapsulating Security Protocol (ESP) or the Authentication Header (AH)protocol for exchanging keysC、To establish IKE SA, main mode utilizes six packets while aggressive mode utilizes only threepacketsD、IKE uses the Diffie-Hellman algorithm to generate symmetrical keys to be used by IPsec peers

What is not a difference between VPN tunnel authentication and per-user authentication?()A、VPN tunnel authentication is part of the IKE specification. B、VPN tunnel authentication does not control which end user can use the IPSec SA (VPN tunnel).C、User authentication is used to control access for a specific user ID, and can be used with or without a VPN tunnel for network access authorization. D、802.1X with EAP-TLS (X.509 certificates) can be used to authenticate an IPSec tunnel.

What does the number one 1 represent for interface fe-0/0/1?()A、port numberB、PCI slot numberC、channel numberD、virtual PIC number

Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by ESP?() (Choose three.)A、data integrityB、data confidentialityC、data authenticationD、outer IP header confidentialityE、outer IP header authentication

What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-tree topology?()A、lowest port MAC addressB、port priority number and MAC address.C、VTP revision numberD、highest port priority number.E、path cost

In a network using cisco autonomous access points running wds. What port is used for authentication by the local authentication service on an access point?()A、1813B、1645C、1646D、1812

What is true about Quality of Service (QoS) for VPNs?()A、QoS preclassification is only supported on generic routing encapsulation (GRE) and IPsec VPNsB、QoS preclassification is not required in Layer 2 Tunneling Protocol (L2TP), Layer2 Forwarding (L2F), and Point-to-Point Tunneling Protocol (PPTP) VPNsC、QoS preclassification is supported on IPsec AH VPNs, but not on IPsec ESP VPNsD、the QoS-for-VPNs feature (QoS preclassification) is designed for VPN transport interfacesE、with IPsec tunnel mode, the type of service (ToS) byte value is copied automatically from the original IP header to the tunnel header

What is the port number of an IPsec Encapsulating Security Payload packet?()A、IP protocol 50B、IP protocol 51C、TCP port 50D、TCP port 51E、UDP port 50F、UDP port 51

In a network using Cisco autonomous access points running WDS, what port is used for authentication by the local authentication service on an access point?()A、1813B、1645C、1646D、1812

You work as a network administrator at, You have been asked to configure 802.1x port-based authentication. You notice that the client workstation is not compatible with 802.1x port-based authentication.  What supported authentication server should be chosen?()A、TACACS with LEAP extensionsB、RADIUS with EAP extensionsC、TACACS+D、LDAP

Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by ESP?()A、data integrityB、data confidentialityC、data authenticationD、outer IP header confidentialityE、outer IP header authentication

Your company has a main office and one branch office. All servers run Windows Server 2003 Service Pack 2 (SP2).The main office has a third-party gateway device named Gateway1. Gateway1 is connected to the internal network and the Internet. Gateway1 supports IPSec. In the branch office, you have a server named Server1. You create an IPSec policy on Server1.You need to ensure that Server1 can establish an IPSec tunnel to Gateway1.  What should you use to configure the IPSec policy?()A、an IP filter that allows only Internet Control Message Protocol (ICMP) traffic B、an IP filter that allows only TCP traffic on port 1701 C、a pre-shared key for authentication D、Kerberos authentication

You need to design a method of communication between the IT and HR departments. Your solution must meet business requirements. What should you do?()A、Design a custom IPSec policy to implement Encapsulating Security Payload (ESP) for all IP traffic Design the IPSec policy to use certificate-based authentication between the two departments’ computersB、Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computersC、Design a customer IPSec policy to implement Encapsulating Payload (ESP) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computersD、Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use certificate-based authentication between the two departments’ computers

多选题Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by AH?() (Choose three.)Adata integrityBdata confidentialityCdata authenticationDouter IP header confidentialityEouter IP header authentication

单选题Refer to the exhibit. With an IPSec tunnel established between remote Router A and head-end router B, with Compressed Real-Time Protocol (cRTP) configured on the serial interface of Router A, what impact will the cRTP configuration have on the Voice over IP packets flowing through the IPSec tunnel from a Cisco 7960 IP phone?()A Twenty bytes of header will be replaced with five bytes. B If the IPSec transform set includes Authentication Header, the receiving IPSec peer will discard the packets. C The IPSec packets will be dropped by Router A's compression logic.D The voice packets will not be compressed.

多选题Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by ESP?()Adata integrityBdata confidentialityCdata authenticationDouter IP header confidentialityEouter IP header authentication

单选题What is the port number of an IPsec Encapsulating Security Payfoad packet?()AUOP port 50BIP protocol 51CTCP port 51DTCP port 50EIP protocol 50FUDP port51

单选题What is the port number of the IPsec Authentication Header packet?()AIP protocol 50BTCP port 51CUDP port 50DIP protocol 51EUDP port 51FTCP port 50

单选题Companycom wants to reduce the number of copper, Ethernet adapters on their 4 way p5 570 running AIX 5.3 used in each of the four LPARs. Companycom has one database LPAR, two application LPARs, and one web LPAR. Only the Web LPAR needs to communicate with the outside world. What is the minimum number of Ethernet adapters that should be provided to ensure redundancy and no single point of failure?()AOne single port Ethernet adapterBFour dual port Ethernet adaptersCTwo single port Ethernet adaptersDEight single port Ethernet adapters

单选题What value is primarily used to determine which port becomes the root port on each nonroot switch in aspanning-tree topology?()Alowest port MAC addressBport priority number and MAC address.CVTP revision numberDhighest port priority number.Epath cost

单选题In a network using cisco autonomous access points running wds. What port is used for authentication by the local authentication service on an access point?()A1813B1645C1646D1812

单选题What is the port number of an IPsec Encapsulating Security Payload packet?()AIP protocol 50BIP protocol 51CTCP port 50DTCP port 51EUDP port 50FUDP port 51

单选题What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-treetopology?()Alowest port MAC addressBport priority number and MAC address.CVTP revision numberDhighest port priority number.Epathcost

单选题What is not a difference between VPN tunnel authentication and per-user authentication?()AVPN tunnel authentication is part of the IKE specification. BVPN tunnel authentication does not control which end user can use the IPSec SA (VPN tunnel).CUser authentication is used to control access for a specific user ID, and can be used with or without a VPN tunnel for network access authorization. D802.1X with EAP-TLS (X.509 certificates) can be used to authenticate an IPSec tunnel.