单选题A policy-based IPsec VPN is ideal for which scenario?()A when you want to conserve tunnel resourcesB when the remote peer is a dialup or remote access clientC when you want to configure a tunnel policy with an action of denyD when a dynamic routing pro

题目
单选题
A policy-based IPsec VPN is ideal for which scenario?()
A

when you want to conserve tunnel resources

B

when the remote peer is a dialup or remote access client

C

when you want to configure a tunnel policy with an action of deny

D

when a dynamic routing protocol such as OSPF must be sent across the VPN


相似考题
更多“单选题A policy-based IPsec VPN is ideal for which scenario?()A when you want to conserve tunnel resourcesB when the remote peer is a dialup or remote access clientC when you want to configure a tunnel policy with an action of denyD when a dynamic routing pro”相关问题
  • 第1题:

    A route-based VPN is required for which scenario? ()

    • A、when the remote VPN peer is behind a NAT device
    • B、when multiple networks need to be reached across the tunnel
    • C、when the remote VPN peer is a dialup or remote access client
    • D、when a dynamic routing protocol such as OSPF is required across the VPN

    正确答案:D

  • 第2题:

    Which command is needed to change this policy to a tunnel policy for a policy-based VPN?() [edit security policies from-zone trust to-zone untrust] user@host# show policy tunnel-traffic { match { source-address local-net; destination-address remote-net; application any; then { permit; } }

    • A、set policy tunnel-traffic then tunnel remote-vpn
    • B、set policy tunnel-traffic then permit tunnel remote-vpn
    • C、set policy tunnel-traffic then tunnel ipsec-vpn remote-vpn permit
    • D、set policy tunnel-traffic then permit tunnel ipsec-vpn remote-vpn

    正确答案:D

  • 第3题:

    A route-based VPN is required for which scenario?()

    • A、when the remote VPN peer is behind a NAT device
    • B、when multiple networks need to be reached across the tunnel and GRE cannot be used
    • C、when the remote VPN peer is a dialup or remote access client
    • D、when a dynamic routing protocol is required across the VPN and GRE cannot be used

    正确答案:D

  • 第4题:

    In which scenario will you use the Flashback Transaction Query feature?()

    • A、 when you want to restore an important table that is dropped from the Recycle Bin
    • B、 when you want to obtain the SQL statements to undo the deletion of some important records from a table by a transaction
    • C、when you want to restore a dropped user’s schema
    • D、 when a row of a table is updated many times within a specific time period and you want all the versions of the row in the specified time period

    正确答案:B

  • 第5题:

    You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains Windows Server 2003 file servers. The network also contains a Windows Server 2003 computer named Server1 that runs Routing and Remote Access and Internet Authentication Service (IAS). Server1 provides VPN access to the network for users’ home computers.   You suspect that an external unauthorized user is attempting to access the network through Server1. You want to log the details of access attempts by VPN users when they attempt to access the network. You want to compare the IP addresses of users’ home computers with the IP addresses used in the access attempts to verify that the users are authorized.  You need to configure Server1 to log the details of access attempts by VPN users.   What should you do?  ()

    • A、 Configure the system event log to Do not overwrite.
    • B、 In IAS, in Remote Access Logging, enable the Authentication requests setting.
    • C、 Configure the Remote Access server to Log all events.
    • D、 Create a custom remote access policy and configure it for Authentication-Type.

    正确答案:B

  • 第6题:

    You want to configure your Windows 2000 Professional computer to remotely access your company's Windows 2000 Routing and Remote Access server. You configure a VPN connection. For security purposes, you configure the VPN connection to use MS-CHAP v2 only and to require encryption. You also configure TCP/IP to obtain an IP address automatically, to enable IPSec, and to set IPSec to Secure Server.  When you try to connect, you receive the following error message, "The encryption attempt failed because no valid certificate was found."  What should you do to connect to the server? ()

    • A、Enable the VPN connection to use MS-CHAP.
    • B、Change the data encryption setting toOptional Encryption.
    • C、Specify a TCP/IP address in theNetworkproperties.
    • D、Change the IPSec policy setting toClient.

    正确答案:D

  • 第7题:

    单选题
    In which scenario will you use the Flashback Transaction Query feature?()
    A

     when you want to restore an important table that is dropped from the Recycle Bin

    B

     when you want to obtain the SQL statements to undo the deletion of some important records from a table by a transaction

    C

    when you want to restore a dropped user’s schema

    D

     when a row of a table is updated many times within a specific time period and you want all the versions of the row in the specified time period


    正确答案: D
    解析: 暂无解析

  • 第8题:

    单选题
    A route-based VPN is required for which scenario? ()
    A

    when the remote VPN peer is behind a NAT device

    B

    when multiple networks need to be reached across the tunnel

    C

    when the remote VPN peer is a dialup or remote access client

    D

    when a dynamic routing protocol such as OSPF is required across the VPN


    正确答案: A
    解析: 暂无解析

  • 第9题:

    单选题
    Which command is needed to change this policy to a tunnel policy for a policy-based VPN?() [edit security policies from-zone trust to-zone untrust] user@host# show policy tunnel-traffic { match { source-address local-net; destination-address remote-net; application any; then { permit; } }
    A

    set policy tunnel-traffic then tunnel remote-vpn

    B

    set policy tunnel-traffic then permit tunnel remote-vpn

    C

    set policy tunnel-traffic then tunnel ipsec-vpn remote-vpn permit

    D

    set policy tunnel-traffic then permit tunnel ipsec-vpn remote-vpn


    正确答案: A
    解析: 暂无解析

  • 第10题:

    单选题
    You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains Windows Server 2003 file servers. The network also contains a Windows Server 2003 computer named Server1 that runs Routing and Remote Access and Internet Authentication Service (IAS). Server1 provides VPN access to the network for users’ home computers.   You suspect that an external unauthorized user is attempting to access the network through Server1. You want to log the details of access attempts by VPN users when they attempt to access the network. You want to compare the IP addresses of users’ home computers with the IP addresses used in the access attempts to verify that the users are authorized.  You need to configure Server1 to log the details of access attempts by VPN users.   What should you do?  ()
    A

     Configure the system event log to Do not overwrite.

    B

     In IAS, in Remote Access Logging, enable the Authentication requests setting.

    C

     Configure the Remote Access server to Log all events.

    D

     Create a custom remote access policy and configure it for Authentication-Type.


    正确答案: D
    解析: 暂无解析

  • 第11题:

    单选题
    In which scenario will you use the Flashback Version Query feature?()
    A

     when you want to restore a table that has been dropped from the Recycle Bin

    B

     when you want to identify the transaction ID of the transaction that deleted some important records from a table

    C

     when you want to recover the schema of a dropped user

    D

    when you want to restore a dropped tablespace


    正确答案: C
    解析: 暂无解析

  • 第12题:

    单选题
    You are designing a remote access strategy to meet the business and technical Requirement. What should you do?()
    A

    Configure each server running Routing and Remote Access as a RADIUS Client.  

    B

    Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as VPN access.  

    C

    Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as dialup access.  

    D

    Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as wireless access.  


    正确答案: A
    解析: 暂无解析

  • 第13题:

    A policy-based IPsec VPN is ideal for which scenario?()

    • A、when you want to conserve tunnel resources
    • B、when the remote peer is a dialup or remote access client
    • C、when you want to configure a tunnel policy with an action of deny
    • D、when a dynamic routing protocol such as OSPF must be sent across the VPN

    正确答案:B

  • 第14题:

    Regarding a route-based versus policy-based IPsec VPN, which statement is true?()

    • A、A route-based VPN generally uses less resources than a policy-based VPN.
    • B、A route-based VPN cannot have a deny action in a policy; a policy-based VPN can have a deny action.
    • C、A route-based VPN is better suited for dialup or remote access compared to a policy-based VPN.
    • D、A route-based VPN uses a policy referencing the IPsec VPN; a policy-based VPN policy does not use apolicy referencing the IPsec VPN

    正确答案:A

  • 第15题:

    You are configuring captive portal on your SRX Series device for guest user access.When would you use the redirect-traffic all command?()

    • A、When you want all unauthenticated traffic to be redirected
    • B、When you want all clear text traffic to be redirected.
    • C、When you want all authenticated traffic to be redirected.
    • D、When you want all encrypted traffic to be redirected.

    正确答案:B

  • 第16题:

    In which scenario will you use the Flashback Version Query feature?()

    • A、 when you want to restore a table that has been dropped from the Recycle Bin
    • B、 when you want to identify the transaction ID of the transaction that deleted some important records from a table
    • C、 when you want to recover the schema of a dropped user
    • D、when you want to restore a dropped tablespace

    正确答案:B

  • 第17题:

    You are designing a remote access strategy to meet the business and technical Requirement.  What should you do?()

    • A、 Configure each server running Routing and Remote Access as a RADIUS Client.
    • B、 Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as VPN access.
    • C、 Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as dialup access.
    • D、 Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as wireless access.

    正确答案:A

  • 第18题:

    单选题
    You want to configure your Windows 2000 Professional computer to remotely access your company’s Windows 2000 routing and remote access server. You configure a VPN connection. For security purposes, you configure the VPN connection to use MS-CHAP v2 only and to require encryption. You also configure TCP/IP to obtain an IP address automatically, to enable IPSec, and to set IPSec to secure server. When you try to connect, you receive the following error message, “The encryption attempt failed because no valid certificate was found.” What should you do to connect to the server? ()
    A

    Enable the VPN connection to use MS-CHAP.

    B

    Change the data encryption setting to Optional Encryption.

    C

    Specify a TCP/IP address in the network properties.

    D

    Change the IPSec policy setting to Client.


    正确答案: D
    解析: 暂无解析

  • 第19题:

    单选题
    You are designing a remote access strategy to meet the business and technical Requirement.  What should you do?()
    A

     Configure each server running Routing and Remote Access as a RADIUS Client.

    B

     Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as VPN access.

    C

     Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as dialup access.

    D

     Add a Remote Access policy to each server running Routing and Remote Access. Configure the Access method as wireless access.


    正确答案: C
    解析: 暂无解析

  • 第20题:

    单选题
    Which command is needed to change this policy to a tunnel policy for a policy-based VPN?() [edit security policies from-zone trust to-zone untrust] user@host# show policy tunnel-traffic { match { source-address local-net; destination-address remote-net; application any; then { permit; } }
    A

    set policy tunnel-traffic then tunnel remote-vpn

    B

    set policy tunnel-traffic then permit tunnel remote-vpn

    C

    set policy tunnel-traffic then tunnel ipsec-vpn remote-vpn permit

    D

    set policy tunnel-traffic then permit tunnel ipsec-vpn remote-vpn


    正确答案: B
    解析: 暂无解析

  • 第21题:

    多选题
    You need to configure a GRE tunnel on a IPSec router. When you are using the SDM to configurea GRE tunnel over IPsec, which two parameters are required when defining the tunnel interfaceinformation?()
    A

    The crypto ACL number

    B

    The IPSEC mode (tunnel or transport)

    C

    The GRE tunnel interface IP address

    D

    The GRE tunnel source interface or IP address, and tunnel destination IP address

    E

    The MTU size of the GRE tunnel interface


    正确答案: A,D
    解析: 暂无解析

  • 第22题:

    单选题
    Regarding a route-based versus policy-based IPsec VPN, which statement is true?()
    A

    A route-based VPN generally uses less resources than a policy-based VPN.

    B

    A route-based VPN cannot have a deny action in a policy; a policy-based VPN can have a deny action.

    C

    A route-based VPN is better suited for dialup or remote access compared to a policy-based VPN.

    D

    A route-based VPN uses a policy referencing the IPsec VPN; a policy-based VPN policy does not use apolicy referencing the IPsec VPN


    正确答案: B
    解析: 暂无解析

  • 第23题:

    单选题
    A route-based VPN is required for which scenario?()
    A

    when the remote VPN peer is behind a NAT device

    B

    when multiple networks need to be reached across the tunnel and GRE cannot be used

    C

    when the remote VPN peer is a dialup or remote access client

    D

    when a dynamic routing protocol is required across the VPN and GRE cannot be used


    正确答案: B
    解析: 暂无解析