A. AH
B. MD5
C. PSK
D. ESP
第1题:
The LAN-side of the Teleworker router is assigned private IP address space (RFC1918), and the VPN topology is IPSec-only (no GRE protocol). When is it required to configure NAT/pNAT on the Teleworker router?()
第2题:
Which two configuration elements are required for a policy-based VPN?()
第3题:
Which IPsec security protocol should be used when confidentiality is required?()
第4题:
When implementing MPLS VPNs between CE and PE routers, which of these statements is correct? ()
第5题:
Which of the following options should be used to obtain the latest security patches for AIX?()
第6题:
A route-based VPN is required for which scenario?()
第7题:
You are designing the settings for FinServ. You specify the permissions that will be used. You need to specify any additional settings required by the company. What should you do?()
第8题:
oxygen and explosion meter when it is used for detection of flare gases
self-contained breathing apparatus,when used as protection from gas leaking from a refrigeration unit
boots and gloves that are made of rubber or electrically non-conductive material,if used when repairing electrical equipment
lifeline,if used by personnel entering a compartment which might be deficient of oxygen
第9题:
EIGRP can be used only as the PE-CE routing protocol if the PE and CE routers are in the same AS
Other EIGRP AS routes are automatically advertised to the CE router and do not require a redistribution configuration command to be configured
Unlike other routing protocols that are used between PE and CE routers, EIGRP supports backdoor links
Configure of the VPN is only required on the PE router
第10题:
Create an Ipsec enforcement network policy.
Create an 802.1xenforcemen tnetwork policy.
Createa wired network(IEEE802.3)Group policy.
Create an extensible authentication protocol(EAP)enforcement network policy.
第11题:
Form-based logins should NOT be used with HTTPS.
When using Basic Authentication the target server is NOT authenticated.
J2EE compliant web containers are NOT required to support the HTTPS protocol.
Web containers are required to support unauthenticated access to unprotected web resources.
第12题:
IKE keepalives are unidirectional and sent every ten seconds
IPsec uses the Encapsulating Security Protocol (ESP) or the Authentication Header (AH)protocol for exchanging keys
To establish IKE SA, main mode utilizes six packets while aggressive mode utilizes only threepackets
IKE uses the Diffie-Hellman algorithm to generate symmetrical keys to be used by IPsec peers
第13题:
A route-based VPN is required for which scenario? ()
第14题:
Which two are true about authentication?()
第15题:
Which statement about the ip classless router command is true?()
第16题:
Which file contains the attributes used to setup a new user account when executing ‘mkuser’ without any flags?()
第17题:
Which three JUNOS software features allow for increased security on your network?()
第18题:
Which two configuration elements are required for a route-based VPN?()
第19题:
firewall filters
data encryption
routing protocol authentication
support for BGP path mtu discovery
automatic discovery for IPSEC neighbors
第20题:
FixDist
The Bonus Pack CD
OPS
The Security Maintenance CD
第21题:
auto-RP
static RP
discovery mode
bootstrap protocol
第22题:
show ike security-associations
show ipsec security-associations
show security ike security-associations
show security ipsec security-associations
第23题:
Dead Peer Detection (DPD)
CDP
isakmp keepalives
GRE keepalive mechanism
The hello mechanism of the routing protocol across the IPsec tunnel