Which of the following protocols would MOST likely be used in the establishment of an IPSec VPN tunnel?()A、AESB、TKIPC、802.1qD、ISAKMP

Which of the following protocols would MOST likely be used in the establishment of an IPSec VPN tunnel?()

  • A、AES
  • B、TKIP
  • C、802.1q
  • D、ISAKMP

相关考题:

Which of the following expansion slots would be MOST likely used to install an additional NIC into a desktop PC?() A. PCIB. AGP 8xC. Mini PCID. PCI Express x16

Which of the following protocols would be used in order to log into a router to configure a VLAN?() A.RDPB.SMTPC.TELNETD.FTP

Which of the following would MOST likely be used with multimode fiber?() A.10GBase-LRB.10GBase-TC.10GBase-ERD.10GBase-SR

Which of the following wiring standards would MOST likely be used to interconnect two devices without the use of a hub or switch?() A.568AB.568BC.CrossoverD.Loopback

Which of the following protocols would MOST likely be used in the establishment of an IPSec VPN tunnel?() A. AESB. TKIPC. 802.1qD. ISAKMP

Which of the following devices would MOST likely integrate a DHCP server?() A.RouterB.HubC.SwitchD.Bridge

Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?() A.IDSB.VPNC.NIPSD.HIDS

During the Easy VPN Remote connection process,which phase involves pushing the IP address, Domain Name System (DNS),and split tunnel attributes to the client?()A、mode configurationB、the VPN client establishment of an ISAKMP SAC、IPsec quick mode completion of the connectionD、VPN client initiation of the IKE phase 1 process

Which two mechanisms can be used to detect IPsec GRE tunnel failures?()A、Dead Peer Detection (DPD)B、CDPC、isakmp keepalivesD、GRE keepalive mechanismE、The hello mechanism of the routing protocol across the IPsec tunnel

Which three features are benefits of using GRE tunnels in conjunction with IPsec for building site-to-site VPNs?()A、allows dynamic routing over the tunnelB、supports multi-protocol (non-IP) traffic over the tunnelC、reduces IPsec headers overhead since tunnel mode is usedD、simplifies the ACL used in the crypto mapE、uses Virtual Tunnel Interface (VTI) to simplify the IPsec VPN configuration

What is not a difference between VPN tunnel authentication and per-user authentication?()A、VPN tunnel authentication is part of the IKE specification. B、VPN tunnel authentication does not control which end user can use the IPSec SA (VPN tunnel).C、User authentication is used to control access for a specific user ID, and can be used with or without a VPN tunnel for network access authorization. D、802.1X with EAP-TLS (X.509 certificates) can be used to authenticate an IPSec tunnel.

A user is reporting that their computer is making strange noises and randomly powers off. Which of the following tools would MOST likely be used to troubleshoot this problem?()A、POST diagnostic cardB、Power supply testerC、Loop back plugD、Cable tester

Which of the following wiring standards would MOST likely be used to interconnect two devices without the use of a hub or switch?()A、568AB、568BC、CrossoverD、Loopback

Which statement correctly describes IPsec VPN backup technology?()A、The cypto isakmp keepalive command is used to configure the Stateful Switchover (SSO)protocolB、Reverse Route Injection (RRI) is configured on at the remote site to inject the central sitenetworksC、Each Hot Standby Routing Protocol (HSRP) standby group has two well-known MACaddresses and a virtual IP addressD、The cypto isakmp keepalive command is used to configure stateless failover

Which of the following protocols would MOST likely be used in the establishment of an IPSec VPN tunnel?()A、 AES B、 TKIPC、 802.1qD、 ISAKMP

An administrator has removed a SATA hard drive from a failed server. Which of the following adapters would MOST likely be used by the administrator to transfer files from the drive to a laptop?()A、SATA to SCSIB、SATA to HBAC、SATA to USBD、SATA to SAS

Which of the following would MOST likely be used with multimode fiber?()A、10GBase-LRB、10GBase-TC、10GBase-ERD、10GBase-SR

Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?()A、IDSB、VPNC、NIPSD、HIDS

Which of the following ports is MOST likely used for high-end graphics cards?()A、PCIB、PCIeC、ISAD、AGP

Which of the following expansion slots would be MOST likely used to install an additional NIC into a desktop PC?()A、PCIB、AGP 8xC、Mini PCID、PCI Express x16

Which of the following protocols would be used in order to log into a router to configure a VLAN?()A、RDPB、SMTPC、TELNETD、FTP

Which of the following commands would MOST likely be used to see where a loss of connectivity between two devices on a network is located?()A、tracertB、netstatC、nslookupD、ping

Which of the following devices would MOST likely integrate a DHCP server?()A、RouterB、HubC、SwitchD、Bridge

单选题During the Easy VPN Remote connection process,which phase involves pushing the IP address, Domain Name System (DNS),and split tunnel attributes to the client?()Amode configurationBthe VPN client establishment of an ISAKMP SACIPsec quick mode completion of the connectionDVPN client initiation of the IKE phase 1 process

单选题Which of the following protocols would MOST likely be used in the establishment of an IPSec VPN tunnel?()AAESBTKIPC802.1qDISAKMP

单选题Which of the following protocols would MOST likely be used in the establishment of an IPSec VPN tunnel?()A AES B TKIPC 802.1qD ISAKMP

单选题What is not a difference between VPN tunnel authentication and per-user authentication?()AVPN tunnel authentication is part of the IKE specification. BVPN tunnel authentication does not control which end user can use the IPSec SA (VPN tunnel).CUser authentication is used to control access for a specific user ID, and can be used with or without a VPN tunnel for network access authorization. D802.1X with EAP-TLS (X.509 certificates) can be used to authenticate an IPSec tunnel.