第1题:
A. The layer 3 protocol on which other protocols like TCP and UDP communicate.
B. Enables the IPSec protocol on internal workstations.
C. Packet-based detection and prevention of network attacks.
D. Single mode IP communication for a fiber line between remote sites.
第2题:
第3题:
目前电子商务网站较常采用下列哪一种的安全机制是()。
第4题:
IPSec VPN is a widely-acknowledged solution for enterprise network. Which three IPsec VPNstatements are true?()
第5题:
Which feature would prevent guest users from gaining network access by unplugging an IP phone and connecting a laptop computer?()
第6题:
Which of the following BEST describes the function of a DNS server?()
第7题:
Your company has a main office and one branch office. All servers run Windows Server 2003 Service Pack 2 (SP2).The main office has a third-party gateway device named Gateway1. Gateway1 is connected to the internal network and the Internet. Gateway1 supports IPSec. In the branch office, you have a server named Server1. You create an IPSec policy on Server1.You need to ensure that Server1 can establish an IPSec tunnel to Gateway1. What should you use to configure the IPSec policy?()
第8题:
Your network contains a DNS server that has a reverse lookup zone for all of your network segments. You have a server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). An IP security policy is assigned to Server1. You verify IPSec traffic and see that the current security associations display only by IP address. You need to view the fully qualified domain names for all security associations. What should you do?()
第9题:
You need to design a method of communication between the IT and HR departments. Your solution must meet business requirements. What should you do?()
第10题:
data integrity
data confidentiality
data authentication
outer IP header confidentiality
outer IP header authentication
第11题:
Use Local Security Policy to view the Security Options for Server1.
Use Resultant Set of Policy (RSoP) to run an RSoP logging mode query to view the IP Security Policies on Local Computer for Server1.
Use Resultant Set of Policy (RSoP) to run an RSoP planning mode query to view the Security Options for Server1.
Use IP Security Monitor to view the Active Policy for Server1.
Use IP Security Monitor to view the IKE Policies for Server1.
第12题:
show ike security-associations
show ipsec security-associations
show security ike security-associations
show security ipsec security-associations
第13题:
第14题:
以下关于互联网协议安全(Internet Protocol Security,IPsec)协议说法错误的是()
第15题:
What is the port number of an IPsec Encapsulating Security Payfoad packet?()
第16题:
What is the port number of an IPsec Encapsulating Security Payload packet?()
第17题:
A network IPS provides which of the following?()
第18题:
You are the network administrator for Humongous Insurance. The network consists of a single Active Directory domain named humongous.com. The domain contains Windows Server 2003 computers and Windows XP Professional computers. You configure several Group Policy objects (GPOs) to enforce the use of IPSec for certain types of communication between specified computers. A server named Server2 runs the Telnet service. A GPO is supposed to ensure that all Telnet connections to Server2 are encrypted by using IPSec. However, when you monitor network traffic, you notice that Telnet connections are not being encrypted.You need to view all of the IPSec settings that are applied to Server2 by GPOs. Which tool should you use?()
第19题:
You need to design a remote access strategy for the customer support users when they work from home. Your solution must meet security requirements. What should you do?()
第20题:
Your network contains a server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). Server1 has IPSec enabled. Several users report that they cannot connect to Server1. You need to see how many IPSec connection attempts failed due to authentication failures. What should you do?()
第21题:
firewall filters
data encryption
routing protocol authentication
support for BGP path mtu discovery
automatic discovery for IPSEC neighbors
第22题:
Configure a packet filter for the network adapter on the test network to block the Internet Key Exchange (IKE) port.
Configure the network adapter on the test network to disable IEEE 802.1x authentication.
Configure the network adapter on the test network to enable TCP/IP filtering, and then permit all traffic.
Use the netsh command to assign a persistent IPSec policy that permits all traffic on the network adapter on the test.
Assign an IPSec policy in the local computer policy that permits all traffic on the network adapter on the test.
第23题:
在传送模式中,保护的是IP负载
验证头协议(Authentication Head,AH)和IP封装安全载荷协议(Encapsulating Security Payload,ESP)都能以传输模式和隧道模式工作
在隧道模式中,保护的是整个互联网协议(Internet Protocol,IP)包,包括IP头
IPsec仅能保证传输数据的可认证性和保密性