多选题Which three parameters are configured in the IKE policy? ()(Choose three.)AmodeBpreshared keyCexternal interfaceDsecurity proposalsEdead peer detection settings

题目
多选题
Which three parameters are configured in the IKE policy? ()(Choose three.)
A

mode

B

preshared key

C

external interface

D

security proposals

E

dead peer detection settings


相似考题
更多“多选题Which three parameters are configured in the IKE policy? ()(Choose three.)AmodeBpreshared keyCexternal interfaceDsecurity proposalsEdead peer detection settings”相关问题
  • 第1题:

    Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)

    A. access profile

    B. client group

    C. client

    D. default profile

    E. external


    参考答案:A, B, C

  • 第2题:

    What are three valid LDP message types? ()(Choose three.)

    • A、peer discovery
    • B、label distribution
    • C、path initialization
    • D、session management
    • E、connection establishment

    正确答案:A,B,D

  • 第3题:

    Which two parameters are configured in IPsec policy?()

    • A、mode
    • B、IKE gateway
    • C、security proposal
    • D、Perfect Forward Secrecy

    正确答案:C,D

  • 第4题:

    Which three options represent IDP policy match conditions? ()(Choose three.)

    • A、service
    • B、to-zone
    • C、attacks
    • D、port
    • E、destination-address

    正确答案:B,C,E

  • 第5题:

    Which three locations in WebView allow you to confirm that the endpoints are configured properly? ()(Choose three.)

    • A、Monitor > Endpoints
    • B、Acceleration > Endpoints
    • C、Device Setup > Endpoints
    • D、Compression > Endpoints
    • E、Admin > Maintenance > Display Configuration

    正确答案:A,D,E

  • 第6题:

    Which two parameters are configured in IPsec policy? ()(Choose two.)

    • A、mode
    • B、IKE gateway
    • C、security proposal
    • D、Perfect Forward Secrecy

    正确答案:C,D

  • 第7题:

    Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)

    • A、access profile
    • B、client group
    • C、client
    • D、default profile
    • E、external

    正确答案:A,B,C

  • 第8题:

    多选题
    Which three BGP states are associated with establishing TCP connectivity?() (Choose three.)
    A

    Idle

    B

    Active

    C

    Connect

    D

    Open Sent

    E

    Established


    正确答案: E,C
    解析: 暂无解析

  • 第9题:

    多选题
    Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)
    A

    access profile

    B

    client group

    C

    client

    D

    default profile

    E

    external


    正确答案: A,C
    解析: 暂无解析

  • 第10题:

    多选题
    Which three parameters are configured in the IKE policy?()
    A

    mode

    B

    preshared key

    C

    external interface

    D

    security proposals

    E

    dead peer detection settings


    正确答案: A,B,D
    解析: 暂无解析

  • 第11题:

    多选题
    Which two parameters are configured in IPsec policy? ()(Choose two.)
    A

    mode

    B

    IKE gateway

    C

    security proposal

    D

    Perfect Forward Secrecy


    正确答案: C,A
    解析: 暂无解析

  • 第12题:

    多选题
    Which three of these items are IPv6 transition mechanisms? ()(Choose three.)
    A

    ISATAP

    B

    NATV6

    C

    manually configured overlay tunnels

    D

    dual stack configurations


    正确答案: D,C
    解析: 暂无解析

  • 第13题:

    Which three locations in WebView allow you to confirm that the endpoints are configured properly? ()(Choose three.)

    A. Monitor > Endpoints

    B. Acceleration > Endpoints

    C. Device Setup > Endpoints

    D. Compression > Endpoints

    E. Admin > Maintenance > Display Configuration


    参考答案:A, D, E

  • 第14题:

    Which three parameters are configured in the IKE policy?()

    • A、mode
    • B、preshared key
    • C、external interface
    • D、security proposals
    • E、dead peer detection settings

    正确答案:A,B,D

  • 第15题:

    Which three packet interception methods are configurable in WX devices?() (Choose three.)

    • A、OSPF
    • B、WCCP
    • C、policy based routing
    • D、route injection using RIPv1
    • E、route injection using RIPv2

    正确答案:B,C,E

  • 第16题:

    Which three of these items are IPv6 transition mechanisms? ()(Choose three.)

    • A、ISATAP
    • B、NATV6
    • C、manually configured overlay tunnels
    • D、dual stack configurations

    正确答案:A,C,D

  • 第17题:

    Which three parameters are configured in the IKE policy? ()(Choose three.)

    • A、mode
    • B、preshared key
    • C、external interface
    • D、security proposals
    • E、dead peer detection settings

    正确答案:A,B,D

  • 第18题:

    Which three represent IDP policy match conditions? ()(Choose three.)

    • A、protocol
    • B、source-address
    • C、port
    • D、application
    • E、attacks

    正确答案:B,D,E

  • 第19题:

    多选题
    Which three are necessary for antispam to function properly on a branch SRX Series device? ()(Choose three.)
    A

    an antispam license

    B

    DNS servers configured on the SRX Series device

    C

    SMTP services on SRX

    D

    a UTM profile with an antispam configuration in the appropriate security policy

    E

    antivirus (full or express)


    正确答案: B,C
    解析: 暂无解析

  • 第20题:

    多选题
    Which three applications are disabled for compression by default?() (Choose three.)
    A

    FTP

    B

    SSH

    C

    UDP

    D

    HTTPS

    E

    Traceroute


    正确答案: B,C
    解析: 暂无解析

  • 第21题:

    多选题
    Which three locations in WebView allow you to confirm that the endpoints are configured properly? ()(Choose three.)
    A

    Monitor > Endpoints

    B

    Acceleration > Endpoints

    C

    Device Setup > Endpoints

    D

    Compression > Endpoints

    E

    Admin > Maintenance > Display Configuration


    正确答案: C,B
    解析: 暂无解析

  • 第22题:

    多选题
    Which three options represent IDP policy match conditions? ()(Choose three.)
    A

    service

    B

    to-zone

    C

    attacks

    D

    port

    E

    destination-address


    正确答案: A,D
    解析: 暂无解析

  • 第23题:

    多选题
    Which three parameters are configured in the IKE policy? ()(Choose three.)
    A

    mode

    B

    preshared key

    C

    external interface

    D

    security proposals

    E

    dead peer detection settings


    正确答案: D,E
    解析: 暂无解析

  • 第24题:

    多选题
    Which three represent IDP policy match conditions? ()(Choose three.)
    A

    protocol

    B

    source-address

    C

    port

    D

    application

    E

    attacks


    正确答案: D,C
    解析: 暂无解析