Which IPsec security protocol should be used when confidentiality is required?() A. AHB. MD5C. PSKD. ESP

Which IPsec security protocol should be used when confidentiality is required?()

A. AH

B. MD5

C. PSK

D. ESP


相关考题:

A route-based VPN is required for which scenario? () A. when the remote VPN peer is behind a NAT deviceB. when multiple networks need to be reached across the tunnelC. when the remote VPN peer is a dialup or remote access clientD. when a dynamic routing protocol such as OSPF is required across the VPN

Which method should be used to dynamically elect an RP when your network is using PIM version1?() A. auto-RPB. static RPC. discovery modeD. bootstrap protocol

IPsec, also known as the internet Protocol ( ) , defines the architecture for security services for IP network traffic IPsec describes the framework for providing security a the IP layer, as well as the suite of protocols designed to provide that security: through_ ( )_ and encryption of IP network packets. IPec can be used 10 protect network data, for example, by setting up circuits using IPsec ( ), in which all data being sent between two endpoints is encrypted, as with a Virtual (请作答此空) Network connection ;for encrypting application layer data ;and for providing security for routers sending routing data across the public internet. Internet traffic can also be secured from host to host without the use of IPsec, for example by encryption at the ( ) layer with HTTP Secure (TTPS)or an the transport layer wit the Transport Layer Security (TLS)protocol.A.pubic]B.private]C.personalD.proper

IPSec VPN is a widely-acknowledged solution for enterprise network. Which three IPsec VPNstatements are true?()A、IKE keepalives are unidirectional and sent every ten secondsB、IPsec uses the Encapsulating Security Protocol (ESP) or the Authentication Header (AH)protocol for exchanging keysC、To establish IKE SA, main mode utilizes six packets while aggressive mode utilizes only threepacketsD、IKE uses the Diffie-Hellman algorithm to generate symmetrical keys to be used by IPsec peers

The LAN-side of the Teleworker router is assigned private IP address space (RFC1918), and the VPN topology is IPSec-only (no GRE protocol). When is it required to configure NAT/pNAT on the Teleworker router?()A、when all access to the Internet is through the IPSec tunnelB、when there is direct Internet access via split-tunnelingC、when there is no Internet access configured through the Teleworker routerD、whenever you have IOS-Firewall (CBAC) configured

A route-based VPN is required for which scenario? ()A、when the remote VPN peer is behind a NAT deviceB、when multiple networks need to be reached across the tunnelC、when the remote VPN peer is a dialup or remote access clientD、when a dynamic routing protocol such as OSPF is required across the VPN

Which two configuration elements are required for a policy-based VPN?()A、IKE gatewayB、secure tunnel interfaceC、security policy to permit the IKE trafficD、security policy referencing the IPsec VPN tunnel

Which two are true about authentication?()A、Form-based logins should NOT be used with HTTPS.B、When using Basic Authentication the target server is NOT authenticated.C、J2EE compliant web containers are NOT required to support the HTTPS protocol.D、Web containers are required to support unauthenticated access to unprotected web resources.

Which IPsec security protocol should be used when confidentiality is required?()A、AHB、MD5C、PSKD、ESP

Which statement about the ip classless router command is true?()A、The ip classless command is enabled by default in recent versions of IOS.B、The ip classless command should only be enabled when static routing is being used instead of a routing protocol.C、The ip classless command should be enabled by the network administrator whenever RIPv1 or IGRP is being used.D、The ip classless command should be enabled by the network administrator whenever OSPF, RIPv2, or EIGRP is being used.

When implementing MPLS VPNs between CE and PE routers, which of these statements is correct? ()A、If using IS-IS as the PE-CE routing protocol, no redistribution is required.B、If using static routes between the CE and PE routers, no redistribution of other VPN routes is required.C、If the PE-CE protocol is not BGP, redistribution of other VPN routes from MP-BGP is required.D、If RIP is the routing protocol that is used between the PE-CE routers, no redistribution is required, but any other protocol will require redistribution.E、If using OSPF or EIGRP as the PE-CE routing protocol, redistribution is not required, but any other protocol or static route will require redistribution.

Which file contains the attributes used to setup a new user account when executing ‘mkuser’ without any flags?()A、/etc/security/userB、/etc/security/passwdC、/etc/security/mkuser.sysD、/etc/security/mkuser.default

Which of the following options should be used to obtain the latest security patches for AIX?()A、FixDistB、The Bonus Pack CDC、OPSD、The Security Maintenance CD

Which three JUNOS software features allow for increased security on your network?()A、firewall filtersB、data encryptionC、routing protocol authenticationD、support for BGP path mtu discoveryE、automatic discovery for IPSEC neighbors

A route-based VPN is required for which scenario?()A、when the remote VPN peer is behind a NAT deviceB、when multiple networks need to be reached across the tunnel and GRE cannot be usedC、when the remote VPN peer is a dialup or remote access clientD、when a dynamic routing protocol is required across the VPN and GRE cannot be used

Which two configuration elements are required for a route-based VPN?()A、secure tunnel interfaceB、security policy to permit the IKE trafficC、a route for the tunneled transit trafficD、tunnel policy for transit traffic referencing the IPsec VPN

You are designing the settings for FinServ. You specify the permissions that will be used. You need to specify any additional settings required by the company. What should you do?()A、Install a digital certificate for Encrypting File System (EFS) on FinServB、Activate failure auditing on the access to files and objectsC、Configure all firewalls to track when any packets addresses to FinServ are droppedD、Create an IPSec policy that requires IPSec encryption between FinServ and the firewall

多选题Which three JUNOS software features allow for increased security on your network?()Afirewall filtersBdata encryptionCrouting protocol authenticationDsupport for BGP path mtu discoveryEautomatic discovery for IPSEC neighbors

单选题The required fireman’s outfits required for ship’s are not to be used for any other purpose EXCEPT for the().Aoxygen and explosion meter when it is used for detection of flare gasesBself-contained breathing apparatus,when used as protection from gas leaking from a refrigeration unitCboots and gloves that are made of rubber or electrically non-conductive material,if used when repairing electrical equipmentDlifeline,if used by personnel entering a compartment which might be deficient of oxygen

单选题Which of the following options should be used to obtain the latest security patches for AIX?()AFixDistBThe Bonus Pack CDCOPSDThe Security Maintenance CD

单选题When EIGRP is used as the PE-CE routing protocol which of these statements is correct?()AEIGRP can be used only as the PE-CE routing protocol if the PE and CE routers are in the same ASBOther EIGRP AS routes are automatically advertised to the CE router and do not require a redistribution configuration command to be configuredCUnlike other routing protocols that are used between PE and CE routers, EIGRP supports backdoor linksDConfigure of the VPN is only required on the PE router

单选题Which method should be used to dynamically elect an RP when your network is using PIM version1?()Aauto-RPBstatic RPCdiscovery modeDbootstrap protocol

单选题Network access protection (NAP) is configured for the corporate network. Users connect to the corporate network by using portable computers. The command policy required confidentiality of data when is in transmit between the portable computers and the servers. You need to ensure that users can access network resources only from computers that comply with the company policy. What should you do?()ACreate an Ipsec enforcement network policy.BCreate an 802.1xenforcemen tnetwork policy.CCreatea wired network(IEEE802.3)Group policy.DCreate an extensible authentication protocol(EAP)enforcement network policy.

单选题Which operational mode command displays all active IPsec phase 2 security associations?()Ashow ike security-associationsBshow ipsec security-associationsCshow security ike security-associationsDshow security ipsec security-associations

多选题Which two are true about authentication?()AForm-based logins should NOT be used with HTTPS.BWhen using Basic Authentication the target server is NOT authenticated.CJ2EE compliant web containers are NOT required to support the HTTPS protocol.DWeb containers are required to support unauthenticated access to unprotected web resources.

多选题Which two mechanisms can be used to detect IPsec GRE tunnel failures?()ADead Peer Detection (DPD)BCDPCisakmp keepalivesDGRE keepalive mechanismEThe hello mechanism of the routing protocol across the IPsec tunnel

多选题IPSec VPN is a widely-acknowledged solution for enterprise network. Which three IPsec VPNstatements are true?()AIKE keepalives are unidirectional and sent every ten secondsBIPsec uses the Encapsulating Security Protocol (ESP) or the Authentication Header (AH)protocol for exchanging keysCTo establish IKE SA, main mode utilizes six packets while aggressive mode utilizes only threepacketsDIKE uses the Diffie-Hellman algorithm to generate symmetrical keys to be used by IPsec peers