单选题For IKE phase 1 negotiations, when is aggressive mode typically used?()Awhen one of the tunnel peers has a dynamic IP addressBwhen one of the tunnel peers wants to force main mode to be usedCwhen fragmentation of the IKE packet is required between the two peersDwhen one of the tunnel peers wants to specify a different phase 1 proposal

单选题
For IKE phase 1 negotiations, when is aggressive mode typically used?()
A

when one of the tunnel peers has a dynamic IP address

B

when one of the tunnel peers wants to force main mode to be used

C

when fragmentation of the IKE packet is required between the two peers

D

when one of the tunnel peers wants to specify a different phase 1 proposal


参考解析

解析: 暂无解析

相关考题:

WhichattributeisoptionalforIKEphase2negotiations?() A.proxy-IDB.phase2proposalC.Diffie-HellmangroupkeyD.securityprotocol(ESPorAH)

She gets aggressive when she is drunk.A: offensiveB: worriedC: sleepyD: anxious

Which three statements about the Cisco Easy VPN feature are true?()A、If the VPN server is configured for Xauth, the VPN client waits for a username / password challenge.B、The Cisco Easy VPN feature only supports transform sets that provide authentication and encryption.C、The VPN client initiates aggressive mode (AM) if a pre-shared key is used for authentication during the IKE phase 1 process.D、The VPN client verifies a server username/password challenge by using a AAA authentication server that supports TACACS+ or RADIUS.E、The VPN server can only be enabled on Cisco PIX Firewalls and Cisco VPN 3000 series concentrators.F、When connecting with a VPN client,the VPN server must be configured for ISAKMP group 1,2 or 5.

During the Easy VPN Remote connection process,which phase involves pushing the IP address, Domain Name System (DNS),and split tunnel attributes to the client?()A、mode configurationB、the VPN client establishment of an ISAKMP SAC、IPsec quick mode completion of the connectionD、VPN client initiation of the IKE phase 1 process

IPSec VPN is a widely-acknowledged solution for enterprise network. Which three IPsec VPNstatements are true?()A、IKE keepalives are unidirectional and sent every ten secondsB、IPsec uses the Encapsulating Security Protocol (ESP) or the Authentication Header (AH)protocol for exchanging keysC、To establish IKE SA, main mode utilizes six packets while aggressive mode utilizes only threepacketsD、IKE uses the Diffie-Hellman algorithm to generate symmetrical keys to be used by IPsec peers

用IKE为IPSec提供自动协商交换密钥,建立SA的服务时,在IKE协商的第一阶段定义了哪种IKE交换模式()。A、主模式(Main Mode)B、快速模式(New Group Mode)C、野蛮模式(Aggressive Mode)D、信息交换模式(Informational Exchange Mode)

What is the recommended practice regarding UDLD when implementing it in all fiber-optic LAN ports?()A、Adjust the default hello timers to three seconds for aggressive mode.B、Enable it in global mode and on every interface you need to support.C、Enable it in global mode to support every individual fiber-optic interface.D、Enable it to create channels containing up to eight parallel links between switches.E、Enable it in global mode to support every individual fiber optic and Ethernet interface.

What is the recommended practice regarding UDLD when implementing it in all fiber-optic LANports?()A、 Adjust the default hello timers to three seconds for aggressive modeB、 Enable it in global mode and on every interface you need to supportC、 Enable it in global mode to support every individual fiber-optic interfaceD、 Enable it to create channels containing up to eight parallel links between switches

For the following items ,which one can be used to authenticate the IPsec peers during IKE Phase 1?()A、pre-shared keyB、integrity check valueC、XAUTHD、Diffie-Hellman Nonce

Why is NTP an important component when implementing IPSec VPN in a PKI environment?()A、 To ensure the router has the correct time when generating its private/public key pairs.B、 To ensure the router has the correct time when checking certificate validity from the remote peersC、 To ensure the router time is sync with the remote peers for encryption keys generationD、 To ensure the router time is sync with the remote peers during theDH exchangeE、 To ensure the router time is sync with the remote peers when generating the cookies during IKE phase 1

For IKE phase 1 negotiations, when is aggressive mode typically used?()A、when one of the tunnel peers has a dynamic IP addressB、when one of the tunnel peers wants to force main mode to be usedC、when fragmentation of the IKE packet is required between the two peersD、when one of the tunnel peers wants to specify a different phase 1 proposal

Which attribute is optional for IKE phase 2 negotiations?()A、proxy-IDB、phase 2 proposalC、Diffie-Hellman group keyD、security protocol (ESP or AH)

Regarding an IPsec security association (SA), which two statements are true?()A、IKE SA is bidirectional.B、IPsec SA is bidirectional.C、IKE SA is established during phase 2 negotiations.D、IPsec SA is established during phase 2 negotiations.

What Oracle process runs when the database is in ARCHIVELOG mode but not when it is in NOARCHIVELOG mode?()A、 MMONB、 LGWRC、 ARCHD、 ARWRE、 COPY

单选题Your database is running in ARCHIVELOG mode. You are performing a user-managed backup of the DATA1 tablespace.  You place the DATA1 tablespace in backup mode by issuing the following statement:   ALTER TABLESPACE data1 BEGIN BACKUP;   While you are performing the backup, an error occurs that causes the instance to terminate abnormally. Which statement about the DATA1 tablespace is true?()A The DATA1 tablespace is automatically taken out of backup mode when the instance aborts.B If you restart the database,the DATA1 tablespace will be automatically taken out of backup mode  when the database is opened.C If you restart the database,the DATA1 tablespace will be automatically taken out of backup mode  when the database is mounted.D If you restart the database,the database will not be opened.

单选题Two VPN peers are negotiating IKE phase 1 using main mode. Which message pair in the negotiation contains the phase 1 proposal for the peers?()Amessage 1 and 2Bmessage 3 and 4Cmessage 5 and 6Dmessage 7 and 8

多选题Regarding an IPsec security association (SA), which two statements are true?()AIKE SA is bidirectional.BIPsec SA is bidirectional.CIKE SA is established during phase 2 negotiations.DIPsec SA is established during phase 2 negotiations.

单选题Which attribute is optional for IKE phase 2 negotiations?()Aproxy-IDBphase 2 proposalCDiffie-Hellman group keyDsecurity protocol (ESP or AH)

单选题Which attribute is required for all IKE phase 2 negotiations?()Aproxy-IDBpreshared keyCDiffie-Hellman group keyDmain or aggressive mode

单选题Click the Exhibit button. Referring to the exhibit, which statement contains the correct gateway parameters?()A [edit security ike] user@host# show gateway ike-phase1-gateway { policy ike-policy1; address 10.10.10.1; dead-peer-detection { interval 20; threshold 5; } external-interface ge-1/0/1.0; }B [edit security ike] user@host# show gateway ike-phase1-gateway { ike-policy ike-policy1; address 10.10.10.1; dead-peer-detection { interval 20; threshold 5; } external-interface ge-1/0/1.0; }C [edit security ike] user@host# show gateway ike-phase1-gateway { policy ike1-policy; address 10.10.10.1; dead-peer-detection { interval 20; threshold 5; } external-interface ge-1/0/1.0; }D [edit security ike] user@host# show gateway ike-phase1-gateway { ike-policy ike1-policy; address 10.10.10.1; dead-peer-detection { interval 20; threshold 5; } external-interface ge-1/0/1.0; }

单选题What is the recommended practice regarding UDLD when implementing it in all fiber-optic LAN ports?()AAdjust the default hello timers to three seconds for aggressive mode.BEnable it in global mode and on every interface you need to support.CEnable it in global mode to support every individual fiber-optic interface.DEnable it to create channels containing up to eight parallel links between switches.EEnable it in global mode to support every individual fiber optic and Ethernet interface.

单选题What is the recommended practice regarding UDLD when implementing it in all fiber-optic LANports?()A Adjust the default hello timers to three seconds for aggressive modeB Enable it in global mode and on every interface you need to supportC Enable it in global mode to support every individual fiber-optic interfaceD Enable it to create channels containing up to eight parallel links between switches

单选题During the Easy VPN Remote connection process,which phase involves pushing the IP address, Domain Name System (DNS),and split tunnel attributes to the client?()Amode configurationBthe VPN client establishment of an ISAKMP SACIPsec quick mode completion of the connectionDVPN client initiation of the IKE phase 1 process

多选题Which three statements about the Cisco Easy VPN feature are true?()AIf the VPN server is configured for Xauth, the VPN client waits for a username / password challenge.BThe Cisco Easy VPN feature only supports transform sets that provide authentication and encryption.CThe VPN client initiates aggressive mode (AM) if a pre-shared key is used for authentication during the IKE phase 1 process.DThe VPN client verifies a server username/password challenge by using a AAA authentication server that supports TACACS+ or RADIUS.EThe VPN server can only be enabled on Cisco PIX Firewalls and Cisco VPN 3000 series concentrators.FWhen connecting with a VPN client,the VPN server must be configured for ISAKMP group 1,2 or 5.

单选题Why is NTP an important component when implementing IPSec VPN in a PKI environment?()A To ensure the router has the correct time when generating its private/public key pairs.B To ensure the router has the correct time when checking certificate validity from the remote peersC To ensure the router time is sync with the remote peers for encryption keys generationD To ensure the router time is sync with the remote peers during theDH exchangeE To ensure the router time is sync with the remote peers when generating the cookies during IKE phase 1

单选题Which operational mode command displays all active IPsec phase 2 security associations?()Ashow ike security-associationsBshow ipsec security-associationsCshow security ike security-associationsDshow security ipsec security-associations

单选题For IKE phase 1 negotiations, when is aggressive mode typically used?()Awhen one of the tunnel peers has a dynamic IP addressBwhen one of the tunnel peers wants to force main mode to be usedCwhen fragmentation of the IKE packet is required between the two peersDwhen one of the tunnel peers wants to specify a different phase 1 proposal

多选题IPSec VPN is a widely-acknowledged solution for enterprise network. Which three IPsec VPNstatements are true?()AIKE keepalives are unidirectional and sent every ten secondsBIPsec uses the Encapsulating Security Protocol (ESP) or the Authentication Header (AH)protocol for exchanging keysCTo establish IKE SA, main mode utilizes six packets while aggressive mode utilizes only threepacketsDIKE uses the Diffie-Hellman algorithm to generate symmetrical keys to be used by IPsec peers