单选题What is the port number of an IPsec Encapsulating Security Payload packet?()AIP protocol 50BIP protocol 51CTCP port 50DTCP port 51EUDP port 50FUDP port 51

单选题
What is the port number of an IPsec Encapsulating Security Payload packet?()
A

IP protocol 50

B

IP protocol 51

C

TCP port 50

D

TCP port 51

E

UDP port 50

F

UDP port 51


参考解析

解析: 暂无解析

相关考题:

What is the port number of an IPsec Encapsulating Security Payfoad packet?()A、UOP port 50B、IP protocol 51C、TCP port 51D、TCP port 50E、IP protocol 50F、UDP port51

What is the port number of the IPsec Authentication Header packet?()A、IP protocol 50B、TCP port 51C、UDP port 50D、IP protocol 51E、UDP port 51F、TCP port 50

What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-tree topology?()A、lowest port MAC addressB、port priority number and MAC addressC、VTP revision numberD、highest port priority numberE、path cost

What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-treetopology?()A、lowest port MAC addressB、port priority number and MAC address.C、VTP revision numberD、highest port priority number.E、pathcost

IPSec VPN is a widely-acknowledged solution for enterprise network. Which three IPsec VPNstatements are true?()A、IKE keepalives are unidirectional and sent every ten secondsB、IPsec uses the Encapsulating Security Protocol (ESP) or the Authentication Header (AH)protocol for exchanging keysC、To establish IKE SA, main mode utilizes six packets while aggressive mode utilizes only threepacketsD、IKE uses the Diffie-Hellman algorithm to generate symmetrical keys to be used by IPsec peers

What value is primarily used to determine which port becomes the root port on each non root switch in a spanning-tree topology?()A、path costB、lowest port MAC addressC、VTP revision numberD、highest port priority numberE、port priority number and MAC address

The voice VLAN feature has been enabled on a new Company Catalyst switch port.  What is the  effect of this? ()A、The CoS is trusted for 802.1P or 802.1Q tagged traffic.B、PortFast is disabled on the port.C、Port Security is automatically enabled on a voice VLAN port.D、Untagged traffic is sent according to the default CoS priority of the port.E、None of the other alternatives apply

What does the number one 1 represent for interface fe-0/0/1?()A、port numberB、PCI slot numberC、channel numberD、virtual PIC number

What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-tree topology?()A、lowest port MAC addressB、port priority number and MAC address.C、VTP revision numberD、highest port priority number.E、path cost

What is the port number of an IPsec Encapsulating Security Payload packet?()A、IP protocol 50B、IP protocol 51C、TCP port 50D、TCP port 51E、UDP port 50F、UDP port 51

When you enable port security on an interface that is also configured with a voice VLAN,  what is the maximum number of secure MAC addresses that should be set on the port?()A、No more than one secure MAC address should be set.B、The default will be set.C、The IP phone should use a dedicated port, therefore only one MAC address is needed per port.D、No value is needed if the switchport priority extend command is configured. E、No more than two secure MAC addresses should be set.

Which feature would prevent guest users from gaining network access by unplugging an IP phone and connecting a laptop computer?()A、IPSec VPNB、SSL VPNC、port securityD、port security with statically configured MAC addressesE、private VLANs

When configuring port security on a Cisco Catalyst switch port, what is the default action taken by the switch if a violation occurs? ()A、protect (drop packets with unknown source addresses)B、restrict (increment SecurityViolation counter)C、shut down (access or trunk port)D、transition (the access port to a trunking port)

A Company switch was configured as shown below:  switchport mode access  switchport port-security   switchport port-security maximum 2 switchport port-security mac-address 0002.0002.0002   switchport port-security violation shutdown   Given the configuration output shown above,  what happens when a host with the MAC address of  0003.0003.0003 is directly connected to the switch port? ()A、 The host will be allowed to connect.B、 The port will shut down.C、 The host can only connect through a hub/switch where 0002.0002.0002 is already connected.  D、 The host will be refused access.E、 None of the other alternatives apply

You need to design a method of communication between the IT and HR departments. Your solution must meet business requirements. What should you do?()A、Design a custom IPSec policy to implement Encapsulating Security Payload (ESP) for all IP traffic Design the IPSec policy to use certificate-based authentication between the two departments’ computersB、Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computersC、Design a customer IPSec policy to implement Encapsulating Payload (ESP) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computersD、Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use certificate-based authentication between the two departments’ computers

单选题The voice VLAN feature has been enabled on a new Company Catalyst switch port.  What is the  effect of this? ()AThe CoS is trusted for 802.1P or 802.1Q tagged traffic.BPortFast is disabled on the port.CPort Security is automatically enabled on a voice VLAN port.DUntagged traffic is sent according to the default CoS priority of the port.ENone of the other alternatives apply

单选题A Company switch was configured as shown below:  switchport mode access  switchport port-security   switchport port-security maximum 2 switchport port-security mac-address 0002.0002.0002   switchport port-security violation shutdown   Given the configuration output shown above,  what happens when a host with the MAC address of  0003.0003.0003 is directly connected to the switch port? ()A The host will be allowed to connect.B The port will shut down.C The host can only connect through a hub/switch where 0002.0002.0002 is already connected.  D The host will be refused access.E None of the other alternatives apply

单选题What is the port number of an IPsec Encapsulating Security Payfoad packet?()AUOP port 50BIP protocol 51CTCP port 51DTCP port 50EIP protocol 50FUDP port51

单选题What is the port number of the IPsec Authentication Header packet?()AIP protocol 50BTCP port 51CUDP port 50DIP protocol 51EUDP port 51FTCP port 50

单选题Companycom wants to reduce the number of copper, Ethernet adapters on their 4 way p5 570 running AIX 5.3 used in each of the four LPARs. Companycom has one database LPAR, two application LPARs, and one web LPAR. Only the Web LPAR needs to communicate with the outside world. What is the minimum number of Ethernet adapters that should be provided to ensure redundancy and no single point of failure?()AOne single port Ethernet adapterBFour dual port Ethernet adaptersCTwo single port Ethernet adaptersDEight single port Ethernet adapters

单选题What value is primarily used to determine which port becomes the root port on each non root switch in a spanning-tree topology?()Apath costBlowest port MAC addressCVTP revision numberDhighest port priority numberEport priority number and MAC address

单选题What value is primarily used to determine which port becomes the root port on each nonroot switch in aspanning-tree topology?()Alowest port MAC addressBport priority number and MAC address.CVTP revision numberDhighest port priority number.Epath cost

单选题Which operational mode command displays all active IPsec phase 2 security associations?()Ashow ike security-associationsBshow ipsec security-associationsCshow security ike security-associationsDshow security ipsec security-associations

单选题What is the port number of an IPsec Encapsulating Security Payload packet?()AIP protocol 50BIP protocol 51CTCP port 50DTCP port 51EUDP port 50FUDP port 51

单选题What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-treetopology?()Alowest port MAC addressBport priority number and MAC address.CVTP revision numberDhighest port priority number.Epathcost

单选题When you enable port security on an interface that is also configured with a voice VLAN,  what is the maximum number of secure MAC addresses that should be set on the port?()ANo more than one secure MAC address should be set.BThe default will be set.CThe IP phone should use a dedicated port, therefore only one MAC address is needed per port.DNo value is needed if the switchport priority extend command is configured. ENo more than two secure MAC addresses should be set.

单选题What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-tree topology?()Alowest port MAC addressBport priority number and MAC addressCVTP revision numberDhighest port priority numberEpath cost

多选题IPSec VPN is a widely-acknowledged solution for enterprise network. Which three IPsec VPNstatements are true?()AIKE keepalives are unidirectional and sent every ten secondsBIPsec uses the Encapsulating Security Protocol (ESP) or the Authentication Header (AH)protocol for exchanging keysCTo establish IKE SA, main mode utilizes six packets while aggressive mode utilizes only threepacketsDIKE uses the Diffie-Hellman algorithm to generate symmetrical keys to be used by IPsec peers