Which IPsec security protocol should be used when confidentiality is required?()A、PSKB、AHC、MD5D、ESP
Which IPsec security protocol should be used when confidentiality is required?()
- A、PSK
- B、AH
- C、MD5
- D、ESP
相关考题:
Which two parameters are configured in IPsec policy? ()(Choose two.) A. modeB. IKE gatewayC. security proposalD. Perfect Forward Secrecy
A network IPS provides which of the following?() A. The layer 3 protocol on which other protocols like TCP and UDP communicate.B. Enables the IPSec protocol on internal workstations.C. Packet-based detection and prevention of network attacks.D. Single mode IP communication for a fiber line between remote sites.
Which IPsec security protocol should be used when confidentiality is required?() A. AHB. MD5C. PSKD. ESP
Which device might be installed at a branch office to enable and manage an IPsec site-to-site VPN?() A.Cisco IOS IPsec/SSL VPN clientB.Cisco VPN ClinetC.ISDN terminal adapterD.Cisco Adaptive Security Appliance
IPsec, also known as the internet Protocol ( ) , defines the architecture for security services for IP network traffic IPsec describes the framework for providing security a the IP layer, as well as the suite of protocols designed to provide that security: through_ ( )_ and encryption of IP network packets. IPec can be used 10 protect network data, for example, by setting up circuits using IPsec ( ), in which all data being sent between two endpoints is encrypted, as with a Virtual (请作答此空) Network connection ;for encrypting application layer data ;and for providing security for routers sending routing data across the public internet. Internet traffic can also be secured from host to host without the use of IPsec, for example by encryption at the ( ) layer with HTTP Secure (TTPS)or an the transport layer wit the Transport Layer Security (TLS)protocol.A.pubic]B.private]C.personalD.proper
Which of the following commands will display a router’s crypto map IPsec security associationsettings?()A、show crypto map ipsec saB、show crypto mapC、show crypto engine connections activeD、show ipsec crypto mapE、show crypto map saF、show ipsec crypto map sa
What is the port number of an IPsec Encapsulating Security Payfoad packet?()A、UOP port 50B、IP protocol 51C、TCP port 51D、TCP port 50E、IP protocol 50F、UDP port51
Which IOS security feature is configured by the ip inspect inspection-name {in | out} command?()A、IPsec site-to-site VPNB、Cisco AutoSecureC、Cisco IOS FirewallD、IPS
IPSec VPN is a widely-acknowledged solution for enterprise network. Which three IPsec VPNstatements are true?()A、IKE keepalives are unidirectional and sent every ten secondsB、IPsec uses the Encapsulating Security Protocol (ESP) or the Authentication Header (AH)protocol for exchanging keysC、To establish IKE SA, main mode utilizes six packets while aggressive mode utilizes only threepacketsD、IKE uses the Diffie-Hellman algorithm to generate symmetrical keys to be used by IPsec peers
Which two parameters are configured in IPsec policy?()A、modeB、IKE gatewayC、security proposalD、Perfect Forward Secrecy
Which two configuration elements are required for a policy-based VPN?()A、IKE gatewayB、secure tunnel interfaceC、security policy to permit the IKE trafficD、security policy referencing the IPsec VPN tunnel
Which device might be installed at a branch office to enable and manage an IPsec site-to-site VPN?()A、Cisco IOS IPsec/SSL VPN clientB、Cisco VPN ClinetC、ISDN terminal adapterD、Cisco Adaptive Security Appliance
Which IPsec security protocol should be used when confidentiality is required?()A、AHB、MD5C、PSKD、ESP
What is the port number of an IPsec Encapsulating Security Payload packet?()A、IP protocol 50B、IP protocol 51C、TCP port 50D、TCP port 51E、UDP port 50F、UDP port 51
Which security-enabled device is recommended to provide a site-to-site IPsec VPN solution, but not SSL?()A、 Cisco Integrated Service RoutersB、 Cisco ASA 5500 Series Security ApplianceC、 CiscoWebVPN Services ModuleD、 CiscoIPsec VPN Module
A network IPS provides which of the following?()A、The layer 3 protocol on which other protocols like TCP and UDP communicate.B、Enables the IPSec protocol on internal workstations.C、Packet-based detection and prevention of network attacks.D、Single mode IP communication for a fiber line between remote sites.
Which three JUNOS software features allow for increased security on your network?()A、firewall filtersB、data encryptionC、routing protocol authenticationD、support for BGP path mtu discoveryE、automatic discovery for IPSEC neighbors
Which two parameters are configured in IPsec policy? ()(Choose two.)A、modeB、IKE gatewayC、security proposalD、Perfect Forward Secrecy
Regarding an IPsec security association (SA), which two statements are true?()A、IKE SA is bidirectional.B、IPsec SA is bidirectional.C、IKE SA is established during phase 2 negotiations.D、IPsec SA is established during phase 2 negotiations.
单选题Which security-enabled device is recommended to provide a site-to-site IPsec VPN solution, but not SSL?()A Cisco Integrated Service RoutersB Cisco ASA 5500 Series Security ApplianceC CiscoWebVPN Services ModuleD CiscoIPsec VPN Module
多选题Which three JUNOS software features allow for increased security on your network?()Afirewall filtersBdata encryptionCrouting protocol authenticationDsupport for BGP path mtu discoveryEautomatic discovery for IPSEC neighbors
单选题Which statement contains the correct parameters for a route-based IPsec VPN?()A[edit security ipsec] user@host# show proposal ike1-proposal { protocol esp; authentication-algorithm hmac-md5-96; encryption-algorithm 3des-cbc; lifetime-seconds 3200; }policy ipsec1-policy { perfect-forward-secrecy { keys group2; } proposals ike1-proposal; } vpn VpnTunnel { interface ge-0/0/1.0; ike { gateway ike1-gateway; ipsec-policy ipsec1-policy; } establish-tunnels immediately; }B[edit security ipsec] user@host# show proposal ike1-proposal { protocol esp; authentication-algorithm hmac-md5-96; encryption-algorithm 3des-cbc; lifetime-seconds 3200; } policy ipsec1-policy { perfect-forward-secrecy { keys group2; } proposals ike1-proposal; } vpn VpnTunnel { interface st0.0; ike { gateway ike1-gateway; ipsec-policy ipsec1-policy; } establish-tunnels immediately; }C[edit security ipsec] user@host# show proposal ike1-proposal { protocol esp; authentication-algorithm hmac-md5-96; encryption-algorithm 3des-cbc; lifetime-seconds 3200;} policy ipsec1-policy { perfect-forward-secrecy { keys group2; } proposals ike1-proposal; } vpn VpnTunnel { bind-interface ge-0/0/1.0; ike { gateway ike1-gateway; ipsec-policy ipsec1-policy; } establish-tunnels immediately; }D[edit security ipsec] user@host# show proposal ike1-proposal { protocol esp; authentication-algorithm hmac-md5-96; encryption-algorithm 3des-cbc; lifetime-seconds 3200; }policy ipsec1-policy { perfect-forward-secrecy { keys group2; } proposals ike1-proposal; } vpn VpnTunnel { bind-interface st0.0; ike { gateway ike1-gateway; ipsec-policy ipsec1-policy; } establish-tunnels immediately; }
单选题What is the port number of an IPsec Encapsulating Security Payfoad packet?()AUOP port 50BIP protocol 51CTCP port 51DTCP port 50EIP protocol 50FUDP port51
单选题Which of the following commands will display a router’s crypto map IPsec security associationsettings?()Ashow crypto map ipsec saBshow crypto mapCshow crypto engine connections activeDshow ipsec crypto mapEshow crypto map saFshow ipsec crypto map sa
单选题Which operational mode command displays all active IPsec phase 2 security associations?()Ashow ike security-associationsBshow ipsec security-associationsCshow security ike security-associationsDshow security ipsec security-associations
单选题What is the port number of an IPsec Encapsulating Security Payload packet?()AIP protocol 50BIP protocol 51CTCP port 50DTCP port 51EUDP port 50FUDP port 51
多选题Which two mechanisms can be used to detect IPsec GRE tunnel failures?()ADead Peer Detection (DPD)BCDPCisakmp keepalivesDGRE keepalive mechanismEThe hello mechanism of the routing protocol across the IPsec tunnel
多选题IPSec VPN is a widely-acknowledged solution for enterprise network. Which three IPsec VPNstatements are true?()AIKE keepalives are unidirectional and sent every ten secondsBIPsec uses the Encapsulating Security Protocol (ESP) or the Authentication Header (AH)protocol for exchanging keysCTo establish IKE SA, main mode utilizes six packets while aggressive mode utilizes only threepacketsDIKE uses the Diffie-Hellman algorithm to generate symmetrical keys to be used by IPsec peers