单选题Which IPsec security protocol should be used when confidentiality is required?()AAHBMD5CPSKDESP
单选题
Which IPsec security protocol should be used when confidentiality is required?()
A
AH
B
MD5
C
PSK
D
ESP
参考解析
解析:
暂无解析
相关考题:
Which method should be used to dynamically elect an RP when your network is using PIM version1?() A. auto-RPB. static RPC. discovery modeD. bootstrap protocol
When implementing MPLS VPNs between CE and PE routers, which of these statements is correct? () A. If using IS-IS as the PE-CE routing protocol, no redistribution is required.B. If using static routes between the CE and PE routers, no redistribution of other VPN routes is required.C. If the PE-CE protocol is not BGP, redistribution of other VPN routes from MP-BGP is required.D. If RIP is the routing protocol that is used between the PE-CE routers, no redistribution is required, but any other protocol will require redistribution.E. If using OSPF or EIGRP as the PE-CE routing protocol, redistribution is not required, but any other protocol or static route will require redistribution.
Which IPsec security protocol should be used when confidentiality is required?() A. AHB. MD5C. PSKD. ESP
IPsec, also known as the internet Protocol ( ) , defines the architecture for security services for IP network traffic IPsec describes the framework for providing security a the IP layer, as well as the suite of protocols designed to provide that security: through_ ( )_ and encryption of IP network packets. IPec can be used 10 protect network data, for example, by setting up circuits using IPsec ( ), in which all data being sent between two endpoints is encrypted, as with a Virtual (请作答此空) Network connection ;for encrypting application layer data ;and for providing security for routers sending routing data across the public internet. Internet traffic can also be secured from host to host without the use of IPsec, for example by encryption at the ( ) layer with HTTP Secure (TTPS)or an the transport layer wit the Transport Layer Security (TLS)protocol.A.pubic]B.private]C.personalD.proper
Which two mechanisms can be used to detect IPsec GRE tunnel failures?()A、Dead Peer Detection (DPD)B、CDPC、isakmp keepalivesD、GRE keepalive mechanismE、The hello mechanism of the routing protocol across the IPsec tunnel
IPSec VPN is a widely-acknowledged solution for enterprise network. Which three IPsec VPNstatements are true?()A、IKE keepalives are unidirectional and sent every ten secondsB、IPsec uses the Encapsulating Security Protocol (ESP) or the Authentication Header (AH)protocol for exchanging keysC、To establish IKE SA, main mode utilizes six packets while aggressive mode utilizes only threepacketsD、IKE uses the Diffie-Hellman algorithm to generate symmetrical keys to be used by IPsec peers
When EIGRP is used as the PE-CE routing protocol which of these statements is correct?()A、EIGRP can be used only as the PE-CE routing protocol if the PE and CE routers are in the same ASB、Other EIGRP AS routes are automatically advertised to the CE router and do not require a redistribution configuration command to be configuredC、Unlike other routing protocols that are used between PE and CE routers, EIGRP supports backdoor linksD、Configure of the VPN is only required on the PE router
Which two configuration elements are required for a policy-based VPN?()A、IKE gatewayB、secure tunnel interfaceC、security policy to permit the IKE trafficD、security policy referencing the IPsec VPN tunnel
Which method should be used to dynamically elect an RP when your network is using PIM version1?()A、auto-RPB、static RPC、discovery modeD、bootstrap protocol
Which two are true about authentication?()A、Form-based logins should NOT be used with HTTPS.B、When using Basic Authentication the target server is NOT authenticated.C、J2EE compliant web containers are NOT required to support the HTTPS protocol.D、Web containers are required to support unauthenticated access to unprotected web resources.
Which IPsec security protocol should be used when confidentiality is required?()A、AHB、MD5C、PSKD、ESP
Which IPsec security protocol should be used when confidentiality is required?()A、AHB、MB5C、PSKD、ESP
Which IPsec security protocol should be used when confidentiality is required?()A、PSKB、AHC、MD5D、ESP
Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by ESP?()A、data integrityB、data confidentialityC、data authenticationD、outer IP header confidentialityE、outer IP header authentication
Which attribute is optional for IKE phase 2 negotiations?()A、proxy-IDB、phase 2 proposalC、Diffie-Hellman group keyD、security protocol (ESP or AH)
A route-based VPN is required for which scenario?()A、when the remote VPN peer is behind a NAT deviceB、when multiple networks need to be reached across the tunnel and GRE cannot be usedC、when the remote VPN peer is a dialup or remote access clientD、when a dynamic routing protocol is required across the VPN and GRE cannot be used
多选题Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by ESP?() (Choose three.)Adata integrityBdata confidentialityCdata authenticationDouter IP header confidentialityEouter IP header authentication
单选题Which method should be used to dynamically elect an RP when your network is using PIM version1?()Aauto-RPBstatic RPCdiscovery modeDbootstrap protocol
多选题Which two are true about authentication?()AForm-based logins should NOT be used with HTTPS.BWhen using Basic Authentication the target server is NOT authenticated.CJ2EE compliant web containers are NOT required to support the HTTPS protocol.DWeb containers are required to support unauthenticated access to unprotected web resources.
单选题When implementing MPLS VPNs between CE and PE routers, which of these statements is correct? ()AIf using IS-IS as the PE-CE routing protocol, no redistribution is required.BIf using static routes between the CE and PE routers, no redistribution of other VPN routes is required.CIf the PE-CE protocol is not BGP, redistribution of other VPN routes from MP-BGP is required.DIf RIP is the routing protocol that is used between the PE-CE routers, no redistribution is required, but any other protocol will require redistribution.EIf using OSPF or EIGRP as the PE-CE routing protocol, redistribution is not required, but any other protocol or static route will require redistribution.
单选题The required fireman’s outfits required for ship’s are not to be used for any other purpose EXCEPT for the().Aoxygen and explosion meter when it is used for detection of flare gasesBself-contained breathing apparatus,when used as protection from gas leaking from a refrigeration unitCboots and gloves that are made of rubber or electrically non-conductive material,if used when repairing electrical equipmentDlifeline,if used by personnel entering a compartment which might be deficient of oxygen
单选题Network access protection (NAP) is configured for the corporate network. Users connect to the corporate network by using portable computers. The command policy required confidentiality of data when is in transmit between the portable computers and the servers. You need to ensure that users can access network resources only from computers that comply with the company policy. What should you do?()ACreate an Ipsec enforcement network policy.BCreate an 802.1xenforcemen tnetwork policy.CCreatea wired network(IEEE802.3)Group policy.DCreate an extensible authentication protocol(EAP)enforcement network policy.
单选题When EIGRP is used as the PE-CE routing protocol which of these statements is correct?()AEIGRP can be used only as the PE-CE routing protocol if the PE and CE routers are in the same ASBOther EIGRP AS routes are automatically advertised to the CE router and do not require a redistribution configuration command to be configuredCUnlike other routing protocols that are used between PE and CE routers, EIGRP supports backdoor linksDConfigure of the VPN is only required on the PE router
单选题Which IPsec security protocol should be used when confidentiality is required?()AAHBMD5CPSKDESP
多选题Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by ESP?()Adata integrityBdata confidentialityCdata authenticationDouter IP header confidentialityEouter IP header authentication
单选题Which of the following options should be used to obtain the latest security patches for AIX?()AFixDistBThe Bonus Pack CDCOPSDThe Security Maintenance CD
多选题IPSec VPN is a widely-acknowledged solution for enterprise network. Which three IPsec VPNstatements are true?()AIKE keepalives are unidirectional and sent every ten secondsBIPsec uses the Encapsulating Security Protocol (ESP) or the Authentication Header (AH)protocol for exchanging keysCTo establish IKE SA, main mode utilizes six packets while aggressive mode utilizes only threepacketsDIKE uses the Diffie-Hellman algorithm to generate symmetrical keys to be used by IPsec peers