网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which attribute is required for all IKE phase 2 negotiations?()
A

proxy-ID

B

preshared key

C

Diffie-Hellman group key

D

main or aggressive mode


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which attribute is required for all IKE phase 2 negotiations?()A proxy-IDB preshared keyC Diffie-Hellman group keyD main or aggressive mode” 相关考题
考题 As project manager, you wish to impose a standard method by which subordinates calculate project costs. Which level of communication should be required for this effort?A Face-to-faceB TelephoneC WrittenD Non-verbalE All of the above should be required.

考题 Which phase of the project life cycle typically has the highest uncertainty and risk associated with it?A conceptB developmentC executionD conclusionE All of the above.

考题 Which is not a negotiation tactic?A Imposing deadlinesB surprisesC person with authority is absentD reasoning togetherE all are negotiations tactics

考题 64 Which is not a negotiation tactic?A. Imposing deadlinesB. surprisesC. person with authority is absentD. reasoning togetherE. all are negotiations tactics

考题 WhichattributeisoptionalforIKEphase2negotiations?() A.proxy-IDB.phase2proposalC.Diffie-HellmangroupkeyD.securityprotocol(ESPorAH)

考题 Which of the following statements is correct?A.The definition phase results in the Software Requirements Specification.B.Testing is optional in software life cycle.C.CASE tools can only aid in the design phase of a software life cycle.D.A change during a later phase does not require the documentation of all earlier phases to be updated.

考题 Which one of the following is NOT a supported IKE attribute?()A、 PFS group.B、 Encryption algorithm.C、 Hashing Algorithm.D、 Authenticationmethod.E、 Lifetime duration.

考题 During the Easy VPN Remote connection process,which phase involves pushing the IP address, Domain Name System (DNS),and split tunnel attributes to the client?()A、mode configurationB、the VPN client establishment of an ISAKMP SAC、IPsec quick mode completion of the connectionD、VPN client initiation of the IKE phase 1 process

考题 Which two configuration elements are required for a policy-based VPN?()A、IKE gatewayB、secure tunnel interfaceC、security policy to permit the IKE trafficD、security policy referencing the IPsec VPN tunnel

考题 For the following items ,which one can be used to authenticate the IPsec peers during IKE Phase 1?()A、pre-shared keyB、integrity check valueC、XAUTHD、Diffie-Hellman Nonce

考题 During which boot phase is the rootvg first activated()A、Phase 1B、Phase 2C、Phase 3D、POST Phase

考题 Which attribute is optional for IKE phase 2 negotiations?()A、proxy-IDB、phase 2 proposalC、Diffie-Hellman group keyD、security protocol (ESP or AH)

考题 Regarding an IPsec security association (SA), which two statements are true?()A、IKE SA is bidirectional.B、IPsec SA is bidirectional.C、IKE SA is established during phase 2 negotiations.D、IPsec SA is established during phase 2 negotiations.

考题 Which two configuration elements are required for a route-based VPN?()A、secure tunnel interfaceB、security policy to permit the IKE trafficC、a route for the tunneled transit trafficD、tunnel policy for transit traffic referencing the IPsec VPN

考题 When a job exceeds the date specified in its END_DATE attribute, which of the following will happen?()A、The job will be dropped automatically if the value of the AUTO_DROP attribute is TRUEB、The job will only be disabled if the value of the AUTO_DROP attribute is FALSEC、The STATE attribute of the job will be set to COMPLETED if the value of the AUTO_DROP attribute is FALSED、All objects referenced by the job will be dropped if the value of the AUTO_DROP attribute is TRUE and the value of the CASCADE attribute is TRUEE、The STATE column of the job table will be set to COMPLETED for the job

考题 单选题Two VPN peers are negotiating IKE phase 1 using main mode. Which message pair in the negotiation contains the phase 1 proposal for the peers?()A message 1 and 2B message 3 and 4C message 5 and 6D message 7 and 8

考题 多选题Regarding an IPsec security association (SA), which two statements are true?()AIKE SA is bidirectional.BIPsec SA is bidirectional.CIKE SA is established during phase 2 negotiations.DIPsec SA is established during phase 2 negotiations.

考题 单选题Which one of the following is NOT a supported IKE attribute?()A  PFS group.B  Encryption algorithm.C  Hashing Algorithm.D  Authenticationmethod.E  Lifetime duration.

考题 单选题Which attribute is optional for IKE phase 2 negotiations?()A proxy-IDB phase 2 proposalC Diffie-Hellman group keyD security protocol (ESP or AH)

考题 单选题Click the Exhibit button. Referring to the exhibit, which statement contains the correct gateway parameters?()A [edit security ike] user@host# show gateway ike-phase1-gateway { policy ike-policy1; address 10.10.10.1; dead-peer-detection { interval 20; threshold 5; } external-interface ge-1/0/1.0; }B [edit security ike] user@host# show gateway ike-phase1-gateway { ike-policy ike-policy1; address 10.10.10.1; dead-peer-detection { interval 20; threshold 5; } external-interface ge-1/0/1.0; }C [edit security ike] user@host# show gateway ike-phase1-gateway { policy ike1-policy; address 10.10.10.1; dead-peer-detection { interval 20; threshold 5; } external-interface ge-1/0/1.0; }D [edit security ike] user@host# show gateway ike-phase1-gateway { ike-policy ike1-policy; address 10.10.10.1; dead-peer-detection { interval 20; threshold 5; } external-interface ge-1/0/1.0; }

考题 单选题A system administrator has been instructed to verify that all filesets have all required requisites and are completely installed. Which command will provide this information?()A lslppB lppchkC instfixD installp

考题 单选题During the Easy VPN Remote connection process,which phase involves pushing the IP address, Domain Name System (DNS),and split tunnel attributes to the client?()A mode configurationB the VPN client establishment of an ISAKMP SAC IPsec quick mode completion of the connectionD VPN client initiation of the IKE phase 1 process

考题 单选题Which operational mode command displays all active IPsec phase 2 security associations?()A show ike security-associationsB show ipsec security-associationsC show security ike security-associationsD show security ipsec security-associations

考题 多选题Which two configuration elements are required for a policy-based VPN?()AIKE gatewayBsecure tunnel interfaceCsecurity policy to permit the IKE trafficDsecurity policy referencing the IPsec VPN tunnel

考题 单选题In a Junos Pulse Access Control Service active/active clustered environment, which statement is true about VIPs?()A VIP is not required when using only agentless access for all endpoint platforms.B VIP is not required when using Junos Pulse or Odyssey Access Client for all endpoint platforms.C VIP is not required when using Junos Pulse and agentless access for all endpoint platforms.D VIP is not required when using Odyssey Access Client and agentless access for all endpoint platforms.

考题 单选题For IKE phase 1 negotiations, when is aggressive mode typically used?()A when one of the tunnel peers has a dynamic IP addressB when one of the tunnel peers wants to force main mode to be usedC when fragmentation of the IKE packet is required between the two peersD when one of the tunnel peers wants to specify a different phase 1 proposal

考题 多选题Which two configuration elements are required for a route-based VPN?()Asecure tunnel interfaceBsecurity policy to permit the IKE trafficCa route for the tunneled transit trafficDtunnel policy for transit traffic referencing the IPsec VPN