A policy-based IPsec VPN is ideal for which scenario?()A、when you want to conserve tunnel resourcesB、when the remote peer is a dialup or remote access clientC、when you want to configure a tunnel policy with an action of denyD、when a dynamic routing protocol such as OSPF must be sent across the VPN

A policy-based IPsec VPN is ideal for which scenario?()

  • A、when you want to conserve tunnel resources
  • B、when the remote peer is a dialup or remote access client
  • C、when you want to configure a tunnel policy with an action of deny
  • D、when a dynamic routing protocol such as OSPF must be sent across the VPN

相关考题:

以下关于IPSec协议的叙述中,正确的是()。A.IPSec协议是IP协议安全问题的一种解决方案B.IPSec协议不提供机密性保护机制C.IPSec协议不提供认证功能D.IPSec协议不提供完整性验证机制

To securely transport EIGRP traffic, a network administrator will build VPNs between sites. What is the best method to accomplish the transport of EIGRP traffic?() A. IPSec in tunnel modeB. IPSec in transport modeC. GRE with IPSec in transport modeD. GRE with IPSec in tunnel mode

面关于GRE和IPSec隧道嵌套描述正确的是()A、GRE隧道可以嵌套在IPSec隧道里B、GRE隧道不可以嵌套在IPSec隧道里C、IPSec隧道可以嵌套在GRE隧道里D、IPSec隧道不可以嵌套在GRE隧道里

Which of the following commands will display a router’s crypto map IPsec security associationsettings?()A、show crypto map ipsec saB、show crypto mapC、show crypto engine connections activeD、show ipsec crypto mapE、show crypto map saF、show ipsec crypto map sa

下列关于IPSec与IKE的说法正确的是()。A、IPSec只能通过与IKE配合方式才能建立起安全联盟B、IKE只能与IPSec配合使用C、IKE只负责为IPSec建立提供安全密钥,不参与IPSec SA协商D、IPSec SA建立后,数据转发与IKE无关

IPSec的设计目标是什么?IPSec提供的安全服务有哪些?

关于IPSec与IKE的关系描述正确的是()。A、IKE是IPSec的信令协议B、IKE可以降低IPSec手工配置安全联盟的复杂度C、IKE为IPSec协商建立安全联盟,并把建立的参数及生成的密钥交给IPSecD、IPSec使用IKE建立的安全联盟对IP报文加密或验证处理

要清除已建立的IPSec安全联盟,应该使用以下哪个命令()。A、reset ipsecB、reset ipsec policC、reset ipsec saD、reset ike sa

下面关于GRE协议和IPSec协议描述正确的是()。A、在GRE隧道上可以再建立IPSec隧道B、在GRE隧道上不可以再建立IPSec隧道C、在IPSec隧道上可以再建立GRE隧道D、在IPSec隧道上不可以再建立GRE隧道

下列关于IPSec与IKE的说法不正确的是()。A、IPSec只能通过与IKE配合方式才能建立起安全联盟B、IKE只能与IPSec配合使用C、IKE只负责为IPSec建立提供安全密钥,不参与IPSec SA协商D、IPSec SA建立后,数据转发与IKE无关

在两台远程路由器之间抓取报文,发现数据包由lP头部、ESP头部以及被加密后的数据组成。则该数据包有可能经历如下哪些过程()。A、GRE overIPSec,IPSec采用传输模式B、GRE overIPSec,IPSec采用隧道模式C、IPSec over GRE,IPSec采用传输模式D、IPSec over GRE,IPSec采用隧道模式

采用如下哪种方式可以部署IPSEC NAT 穿越()A、 IPSEC 隧道模式+ESP 封装B、 IPSEC 隧道模式+AH 封装C、 IPSEC  传输模式+ESP  封装D、 IPSEC 传输模式+AH 封装

防火墙IPSEC VPN特性支持哪些支持()A、IPSEC VPN热备功能B、支持IPSEC VPN隧道化功能C、支持IKEV2和基于域名的协商功能D、支持手机、PAD上自带的IPSEC VPN软件进行连接

以下关于IPSec协议的叙述中,正确的是()A、IPSec协议是解决IP协议安全问题的一B、IPSec协议不能提供完整性C、IPSec协议不能提供机密性保护D、IPSec协议不能提供认证功能

AR支持以下哪种IPsec的应用()。A、GRE over IPsecB、L2TP over IPsecC、IPsec over PPPD、IPsec over GRE

Which two models are the models of DiffServ-Aware Traffic Engineering? ()A、Policy-based ModelB、Class based ModelC、Russian Doll ModelD、Global Tunnel ModelE、Maximum Allocation Model

Which key method is used to detect and prevent attacks by use of IDS and/or IPS technologies?()A、Signature-based detectionB、Anomaly-based detectionC、Honey pot detectionD、Policy-based detection

To securely transport EIGRP traffic, a network administrator will build VPNs between sites. What is the best method to accomplish the transport of EIGRP traffic?()A、IPSec in tunnel modeB、IPSec in transport modeC、GRE with IPSec in transport modeD、GRE with IPSec in tunnel mode

Which storage subsystem provides integrated support of policy-based automated placement andsubsequent tiering and migration of data?()A、SONAS B、DS5000 C、DS8000 D、N series

Regarding a route-based versus policy-based IPsec VPN, which statement is true?()A、A route-based VPN generally uses less resources than a policy-based VPN.B、A route-based VPN cannot have a deny action in a policy; a policy-based VPN can have a deny action.C、A route-based VPN is better suited for dialup or remote access compared to a policy-based VPN.D、A route-based VPN uses a policy referencing the IPsec VPN; a policy-based VPN policy does not use apolicy referencing the IPsec VPN

What are two features of Packet Flow Acceleration?() (Choose two.)A、Policy-Based MultipathB、TCP Acceleration (AFP)C、Forward Error CorrectionD、Molecular Sequence Reduction

单选题Which command is needed to change this policy to a tunnel policy for a policy-based VPN?() [edit security policies from-zone trust to-zone untrust] user@host# show policy tunnel-traffic { match { source-address local-net; destination-address remote-net; application any; then { permit; } }Aset policy tunnel-traffic then tunnel remote-vpnBset policy tunnel-traffic then permit tunnel remote-vpnCset policy tunnel-traffic then tunnel ipsec-vpn remote-vpn permitDset policy tunnel-traffic then permit tunnel ipsec-vpn remote-vpn

单选题Regarding a route-based versus policy-based IPsec VPN, which statement is true?()AA route-based VPN generally uses less resources than a policy-based VPN.BA route-based VPN cannot have a deny action in a policy; a policy-based VPN can have a deny action.CA route-based VPN is better suited for dialup or remote access compared to a policy-based VPN.DA route-based VPN uses a policy referencing the IPsec VPN; a policy-based VPN policy does not use apolicy referencing the IPsec VPN

单选题A policy-based IPsec VPN is ideal for which scenario?()Awhen you want to conserve tunnel resourcesBwhen the remote peer is a dialup or remote access clientCwhen you want to configure a tunnel policy with an action of denyDwhen a dynamic routing protocol such as OSPF must be sent across the VPN

单选题Policy-based routing allows network administrators to implement routing policies to allow or deny paths based on all of these factors except which one?()AEnd systemBProtocolCApplicationDThroughput

问答题IPSec的设计目标是什么?IPSec提供的安全服务有哪些?

单选题Which of the following commands will display a router’s crypto map IPsec security associationsettings?()Ashow crypto map ipsec saBshow crypto mapCshow crypto engine connections activeDshow ipsec crypto mapEshow crypto map saFshow ipsec crypto map sa

多选题Which two configuration elements are required for a policy-based VPN?()AIKE gatewayBsecure tunnel interfaceCsecurity policy to permit the IKE trafficDsecurity policy referencing the IPsec VPN tunnel