Which IPsec security protocol should be used when confidentiality is required?()A. AHB. MD5C. PSKD. ESP

题目
Which IPsec security protocol should be used when confidentiality is required?()

A. AH

B. MD5

C. PSK

D. ESP


相似考题
更多“Which IPsec security protocol should be used when confidentiality is required?() ”相关问题
  • 第1题:

    The LAN-side of the Teleworker router is assigned private IP address space (RFC1918), and the VPN topology is IPSec-only (no GRE protocol). When is it required to configure NAT/pNAT on the Teleworker router?()

    • A、when all access to the Internet is through the IPSec tunnel
    • B、when there is direct Internet access via split-tunneling
    • C、when there is no Internet access configured through the Teleworker router
    • D、whenever you have IOS-Firewall (CBAC) configured

    正确答案:B

  • 第2题:

    Which two configuration elements are required for a policy-based VPN?()

    • A、IKE gateway
    • B、secure tunnel interface
    • C、security policy to permit the IKE traffic
    • D、security policy referencing the IPsec VPN tunnel

    正确答案:A,D

  • 第3题:

    Which IPsec security protocol should be used when confidentiality is required?()

    • A、AH
    • B、MD5
    • C、PSK
    • D、ESP

    正确答案:D

  • 第4题:

    When implementing MPLS VPNs between CE and PE routers, which of these statements is correct? ()

    • A、If using IS-IS as the PE-CE routing protocol, no redistribution is required.
    • B、If using static routes between the CE and PE routers, no redistribution of other VPN routes is required.
    • C、If the PE-CE protocol is not BGP, redistribution of other VPN routes from MP-BGP is required.
    • D、If RIP is the routing protocol that is used between the PE-CE routers, no redistribution is required, but any other protocol will require redistribution.
    • E、If using OSPF or EIGRP as the PE-CE routing protocol, redistribution is not required, but any other protocol or static route will require redistribution.

    正确答案:C

  • 第5题:

    Which of the following options should be used to obtain the latest security patches for AIX?()

    • A、FixDist
    • B、The Bonus Pack CD
    • C、OPS
    • D、The Security Maintenance CD

    正确答案:D

  • 第6题:

    A route-based VPN is required for which scenario?()

    • A、when the remote VPN peer is behind a NAT device
    • B、when multiple networks need to be reached across the tunnel and GRE cannot be used
    • C、when the remote VPN peer is a dialup or remote access client
    • D、when a dynamic routing protocol is required across the VPN and GRE cannot be used

    正确答案:D

  • 第7题:

    You are designing the settings for FinServ. You specify the permissions that will be used. You need to specify any additional settings required by the company. What should you do?()

    • A、Install a digital certificate for Encrypting File System (EFS) on FinServ
    • B、Activate failure auditing on the access to files and objects
    • C、Configure all firewalls to track when any packets addresses to FinServ are dropped
    • D、Create an IPSec policy that requires IPSec encryption between FinServ and the firewall

    正确答案:B

  • 第8题:

    单选题
    The required fireman’s outfits required for ship’s are not to be used for any other purpose EXCEPT for the().
    A

    oxygen and explosion meter when it is used for detection of flare gases

    B

    self-contained breathing apparatus,when used as protection from gas leaking from a refrigeration unit

    C

    boots and gloves that are made of rubber or electrically non-conductive material,if used when repairing electrical equipment

    D

    lifeline,if used by personnel entering a compartment which might be deficient of oxygen


    正确答案: C
    解析: 暂无解析

  • 第9题:

    单选题
    When EIGRP is used as the PE-CE routing protocol which of these statements is correct?()
    A

    EIGRP can be used only as the PE-CE routing protocol if the PE and CE routers are in the same AS

    B

    Other EIGRP AS routes are automatically advertised to the CE router and do not require a redistribution configuration command to be configured

    C

    Unlike other routing protocols that are used between PE and CE routers, EIGRP supports backdoor links

    D

    Configure of the VPN is only required on the PE router


    正确答案: C
    解析: 暂无解析

  • 第10题:

    单选题
    Network access protection (NAP) is configured for the corporate network. Users connect to the corporate network by using portable computers. The command policy required confidentiality of data when is in transmit between the portable computers and the servers. You need to ensure that users can access network resources only from computers that comply with the company policy. What should you do?()
    A

    Create an Ipsec enforcement network policy.

    B

    Create an 802.1xenforcemen tnetwork policy.

    C

    Createa wired network(IEEE802.3)Group policy.

    D

    Create an extensible authentication protocol(EAP)enforcement network policy.


    正确答案: B
    解析: 暂无解析

  • 第11题:

    多选题
    Which two are true about authentication?()
    A

    Form-based logins should NOT be used with HTTPS.

    B

    When using Basic Authentication the target server is NOT authenticated.

    C

    J2EE compliant web containers are NOT required to support the HTTPS protocol.

    D

    Web containers are required to support unauthenticated access to unprotected web resources.


    正确答案: D,C
    解析: 暂无解析

  • 第12题:

    多选题
    IPSec VPN is a widely-acknowledged solution for enterprise network. Which three IPsec VPNstatements are true?()
    A

    IKE keepalives are unidirectional and sent every ten seconds

    B

    IPsec uses the Encapsulating Security Protocol (ESP) or the Authentication Header (AH)protocol for exchanging keys

    C

    To establish IKE SA, main mode utilizes six packets while aggressive mode utilizes only threepackets

    D

    IKE uses the Diffie-Hellman algorithm to generate symmetrical keys to be used by IPsec peers


    正确答案: D,B
    解析: 暂无解析

  • 第13题:

    A route-based VPN is required for which scenario? ()

    • A、when the remote VPN peer is behind a NAT device
    • B、when multiple networks need to be reached across the tunnel
    • C、when the remote VPN peer is a dialup or remote access client
    • D、when a dynamic routing protocol such as OSPF is required across the VPN

    正确答案:D

  • 第14题:

    Which two are true about authentication?()

    • A、Form-based logins should NOT be used with HTTPS.
    • B、When using Basic Authentication the target server is NOT authenticated.
    • C、J2EE compliant web containers are NOT required to support the HTTPS protocol.
    • D、Web containers are required to support unauthenticated access to unprotected web resources.

    正确答案:B,D

  • 第15题:

    Which statement about the ip classless router command is true?()

    • A、The ip classless command is enabled by default in recent versions of IOS.
    • B、The ip classless command should only be enabled when static routing is being used instead of a routing protocol.
    • C、The ip classless command should be enabled by the network administrator whenever RIPv1 or IGRP is being used.
    • D、The ip classless command should be enabled by the network administrator whenever OSPF, RIPv2, or EIGRP is being used.

    正确答案:A

  • 第16题:

    Which file contains the attributes used to setup a new user account when executing ‘mkuser’ without any flags?()

    • A、/etc/security/user
    • B、/etc/security/passwd
    • C、/etc/security/mkuser.sys
    • D、/etc/security/mkuser.default

    正确答案:D

  • 第17题:

    Which three JUNOS software features allow for increased security on your network?()

    • A、firewall filters
    • B、data encryption
    • C、routing protocol authentication
    • D、support for BGP path mtu discovery
    • E、automatic discovery for IPSEC neighbors

    正确答案:A,B,C

  • 第18题:

    Which two configuration elements are required for a route-based VPN?()

    • A、secure tunnel interface
    • B、security policy to permit the IKE traffic
    • C、a route for the tunneled transit traffic
    • D、tunnel policy for transit traffic referencing the IPsec VPN

    正确答案:A,C

  • 第19题:

    多选题
    Which three JUNOS software features allow for increased security on your network?()
    A

    firewall filters

    B

    data encryption

    C

    routing protocol authentication

    D

    support for BGP path mtu discovery

    E

    automatic discovery for IPSEC neighbors


    正确答案: A,D
    解析: 暂无解析

  • 第20题:

    单选题
    Which of the following options should be used to obtain the latest security patches for AIX?()
    A

    FixDist

    B

    The Bonus Pack CD

    C

    OPS

    D

    The Security Maintenance CD


    正确答案: C
    解析: 暂无解析

  • 第21题:

    单选题
    Which method should be used to dynamically elect an RP when your network is using PIM version1?()
    A

    auto-RP

    B

    static RP

    C

    discovery mode

    D

    bootstrap protocol


    正确答案: D
    解析: 暂无解析

  • 第22题:

    单选题
    Which operational mode command displays all active IPsec phase 2 security associations?()
    A

    show ike security-associations

    B

    show ipsec security-associations

    C

    show security ike security-associations

    D

    show security ipsec security-associations


    正确答案: C
    解析: 暂无解析

  • 第23题:

    多选题
    Which two mechanisms can be used to detect IPsec GRE tunnel failures?()
    A

    Dead Peer Detection (DPD)

    B

    CDP

    C

    isakmp keepalives

    D

    GRE keepalive mechanism

    E

    The hello mechanism of the routing protocol across the IPsec tunnel


    正确答案: B,D
    解析: 暂无解析