Regarding an IPsec security association (SA), which two statements are true?()A、IKE SA is bidirectional.B、IPsec SA is bidirectional.C、IKE SA is established during phase 2 negotiations.D、IPsec SA is established during phase 2 negotiations.

Regarding an IPsec security association (SA), which two statements are true?()

  • A、IKE SA is bidirectional.
  • B、IPsec SA is bidirectional.
  • C、IKE SA is established during phase 2 negotiations.
  • D、IPsec SA is established during phase 2 negotiations.

相关考题:

()是IPSec规定的一种用来自动管理SA的协议,包括建立、协商、修改和删除SA等。 A.SSLB.IKEC.AHCD.ESP

Click the Exhibit button.[A] establishes an IPsec tunnel with [B]. The NAT device translates the IP address 1.1.1.1 to 2.1.1.1.On which port is the IKE SA established?() A.TCP 500B.UDP 500C.TCP 4500D.UDP 4500

Which statement is true regarding IPsec VPNs?() A. There are five phases of IKE negotiation.B. There are two phases of IKE negotiation.C. IPsec VPN tunnels are not supported on SRX Series devices.D. IPsec VPNs require a tunnel PIC in SRX Series devices.

An IPsec tunnel is established on an SRX Series Gateway on an interface whose IP address was obtained using DHCP.Which two statements are true? ()(Choose two.) A. Only main mode can be used for IKE negotiationB. A local-identity must be definedC. It must be the initiator for IKED. A remote-identity must be defined

关于安全联盟SA,说法正确的是()。 A.IKE SA是单向的B.IPSEC SA是双向的C.IKE SA是双向的D.IPSEC SA是单向的

IPSECSA和IKESA的主要区别是() A.IPSEC SA是单向的,IKE SA是双向的B.通道两端只有一个IKE SA但IPSEC SA不止一对C.IKE SA没有生存期D.IPSEC SA有对端地址

Which of the following commands will display a router’s crypto map IPsec security associationsettings?()A、show crypto map ipsec saB、show crypto mapC、show crypto engine connections activeD、show ipsec crypto mapE、show crypto map saF、show ipsec crypto map sa

下列关于IPSec与IKE的说法正确的是()。A、IPSec只能通过与IKE配合方式才能建立起安全联盟B、IKE只能与IPSec配合使用C、IKE只负责为IPSec建立提供安全密钥,不参与IPSec SA协商D、IPSec SA建立后,数据转发与IKE无关

During the Easy VPN Remote connection process,which phase involves pushing the IP address, Domain Name System (DNS),and split tunnel attributes to the client?()A、mode configurationB、the VPN client establishment of an ISAKMP SAC、IPsec quick mode completion of the connectionD、VPN client initiation of the IKE phase 1 process

IPSec VPN is a widely-acknowledged solution for enterprise network. Which three IPsec VPNstatements are true?()A、IKE keepalives are unidirectional and sent every ten secondsB、IPsec uses the Encapsulating Security Protocol (ESP) or the Authentication Header (AH)protocol for exchanging keysC、To establish IKE SA, main mode utilizes six packets while aggressive mode utilizes only threepacketsD、IKE uses the Diffie-Hellman algorithm to generate symmetrical keys to be used by IPsec peers

Which operational mode command displays all active IPsec phase 2 security associations?()A、show ike security-associationsB、show ipsec security-associationsC、show security ike security-associationsD、show security ipsec security-associations

When is an IPSec SA built on the Teleworker Router?()A、when the router is booted upB、when the router administratively does a no shutdown" on the IPSec SA C、when traffic matches a line of the access-list tied into the crypto-map in the router configuration, and that particular IPSec SA is not already up D、when the ISAKMP SA completes negotiation of all IPSec SAs (one per access-list line in the crypto ACL), it will be brought up immediately

两台路由器间配置IPSec polic,将策略下发到相应接口上后,使用ping命令检查被保护数据流互通性,发现数据100%通过。使用displa ike sa和displa ipsec sa俞令,显示为IPSec SA未建立。则IPSec配置失败原因在于()。A、IPSec proposal中使用了传输模式,而被保护数据流是网段到网段的数据B、IKE的remote-add ress地址不是对端路由器的接口地址C、IKE的pre-shared-ke配置不匹配D、ACL配置不正确

要清除ike建立的安全隧道,应该使用以下哪个命令()。A、reset ikeB、reset ike tunnelC、reset ipsec saD、reset ike sa

要清除已建立的IPSec安全联盟,应该使用以下哪个命令()。A、reset ipsecB、reset ipsec policC、reset ipsec saD、reset ike sa

下列关于IPSec与IKE的说法不正确的是()。A、IPSec只能通过与IKE配合方式才能建立起安全联盟B、IKE只能与IPSec配合使用C、IKE只负责为IPSec建立提供安全密钥,不参与IPSec SA协商D、IPSec SA建立后,数据转发与IKE无关

用IKE为IPSec提供自动协商交换密钥,建立SA的服务时,在IKE协商的第一阶段定义了哪种IKE交换模式()。A、主模式(Main Mode)B、快速模式(New Group Mode)C、野蛮模式(Aggressive Mode)D、信息交换模式(Informational Exchange Mode)

下列关于IKE协议的说话,正确的是()。A、IKE阶段一协商包括两种模式:主模式和野蛮模式B、如果网络中存在NAT,或者一端动态获取IP地址,则IKE协商必须使用野蛮模式C、在IKE阶段一协商时,主要目的是协商出IKE SAD、IKE SA用于加密保护VPN两端的通信数据IPsec SA保护数据

关于安全联盟SA,说法正确的是()  A、 IKE SA 是单向的B、 IPSEC SA 是双向的C、 IKE SA 是双向的D、 IPSEC SA 是单向的

关于IPSec SA和IKE SA的说法,正确的是()A、IPSec SA是双向的,IKE SA是单向的B、IPSec SA是双向的,IKE SA是双向的C、IPSec SA是单向的,IKE SA是单向的D、IPSec SA是单向的,IKE SA是双向的

For the following items ,which one can be used to authenticate the IPsec peers during IKE Phase 1?()A、pre-shared keyB、integrity check valueC、XAUTHD、Diffie-Hellman Nonce

Which statement is true regarding IPsec VPNs?()A、There are five phases of IKE negotiation.B、There are two phases of IKE negotiation.C、IPsec VPN tunnels are not supported on SRX Series devices.D、IPsec VPNs require a tunnel PIC in SRX Series devices.

An IPsec tunnel is established on an SRX Series Gateway on an interface whose IP address was obtained using DHCP.Which two statements are true? ()(Choose two.)A、Only main mode can be used for IKE negotiationB、A local-identity must be definedC、It must be the initiator for IKED、A remote-identity must be defined

多选题Regarding an IPsec security association (SA), which two statements are true?()AIKE SA is bidirectional.BIPsec SA is bidirectional.CIKE SA is established during phase 2 negotiations.DIPsec SA is established during phase 2 negotiations.

单选题Which of the following commands will display a router’s crypto map IPsec security associationsettings?()Ashow crypto map ipsec saBshow crypto mapCshow crypto engine connections activeDshow ipsec crypto mapEshow crypto map saFshow ipsec crypto map sa

多选题IPSECSA和IKESA的主要区别是()AIPSEC SA是单向的,IKE SA是双向的B通道两端只有一个IKE SA但IPSEC SA不止一对CIKE SA没有生存期DIPSEC SA有对端地址

多选题IPSec VPN is a widely-acknowledged solution for enterprise network. Which three IPsec VPNstatements are true?()AIKE keepalives are unidirectional and sent every ten secondsBIPsec uses the Encapsulating Security Protocol (ESP) or the Authentication Header (AH)protocol for exchanging keysCTo establish IKE SA, main mode utilizes six packets while aggressive mode utilizes only threepacketsDIKE uses the Diffie-Hellman algorithm to generate symmetrical keys to be used by IPsec peers