网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which attribute is optional for IKE phase 2 negotiations?()
A

proxy-ID

B

phase 2 proposal

C

Diffie-Hellman group key

D

security protocol (ESP or AH)


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which attribute is optional for IKE phase 2 negotiations?()A proxy-IDB phase 2 proposalC Diffie-Hellman group keyD security protocol (ESP or AH)” 相关考题
考题 Which is not a negotiation tactic?A Imposing deadlinesB surprisesC person with authority is absentD reasoning togetherE all are negotiations tactics

考题 Viruses usually have two phases to their execution, the infection phase and the(75)phase. The later phase is optional, since stone viruses simply reproduce.A.reproduceB.proliferationC.defendD.attack

考题 WhichattributeisoptionalforIKEphase2negotiations?() A.proxy-IDB.phase2proposalC.Diffie-HellmangroupkeyD.securityprotocol(ESPorAH)

考题 RegardinganIPsecsecurityassociation(SA),whichtwostatementsaretrue?() A.IKESAisbidirectional.B.IPsecSAisbidirectional.C.IKESAisestablishedduringphase2negotiations.D.IPsecSAisestablishedduringphase2negotiations.

考题 Which two methods of authentication are used by the Infranet Controller for IPSec enforcement?() A. dial-up VPNB. IKE authenticationC. XAuth authenticationD. shared IKE authentication

考题 Which of the following statements is correct?A.The definition phase results in the Software Requirements Specification.B.Testing is optional in software life cycle.C.CASE tools can only aid in the design phase of a software life cycle.D.A change during a later phase does not require the documentation of all earlier phases to be updated.

考题 Which one of the following is NOT a supported IKE attribute?()A、 PFS group.B、 Encryption algorithm.C、 Hashing Algorithm.D、 Authenticationmethod.E、 Lifetime duration.

考题 During the Easy VPN Remote connection process,which phase involves pushing the IP address, Domain Name System (DNS),and split tunnel attributes to the client?()A、mode configurationB、the VPN client establishment of an ISAKMP SAC、IPsec quick mode completion of the connectionD、VPN client initiation of the IKE phase 1 process

考题 Which of the following options lists the steps in PPP session establishment in the correct order?()A、Optional authentication phase, link establishment phase, network layer protocol phase.B、Network layer protocol phase, link establishment phase, optional authentication phase.C、Network layer protocol phase, optional authentication phase, link establishment phase.D、Link establishment phase, network layer protocol phase, optional authentication phase.E、Link establishment phase, optional authentication phase, network layer protocol phase.F、Optional authentication phase, network layer protocol phase, link establishment phase.

考题 Which two configuration elements are required for a policy-based VPN?()A、IKE gatewayB、secure tunnel interfaceC、security policy to permit the IKE trafficD、security policy referencing the IPsec VPN tunnel

考题 For the following items ,which one can be used to authenticate the IPsec peers during IKE Phase 1?()A、pre-shared keyB、integrity check valueC、XAUTHD、Diffie-Hellman Nonce

考题 During which phase of the boot process is the rootvg volume group varied on and the root file system (hd4) checked?()  A、Boot phase 1B、Boot phase 2C、Boot phase 3D、Boot phase 4

考题 During which boot phase is the rootvg first activated()A、Phase 1B、Phase 2C、Phase 3D、POST Phase

考题 Which two methods of authentication are used by the Infranet Controller for IPSec enforcement?()A、dial-up VPNB、IKE authenticationC、XAuth authenticationD、shared IKE authentication

考题 Which attribute is optional for IKE phase 2 negotiations?()A、proxy-IDB、phase 2 proposalC、Diffie-Hellman group keyD、security protocol (ESP or AH)

考题 Regarding an IPsec security association (SA), which two statements are true?()A、IKE SA is bidirectional.B、IPsec SA is bidirectional.C、IKE SA is established during phase 2 negotiations.D、IPsec SA is established during phase 2 negotiations.

考题 单选题Which of the following options lists the steps in PPP session establishment in the correct order?()A Optional authentication phase, link establishment phase, network layer protocol phase.B Network layer protocol phase, link establishment phase, optional authentication phase.C Network layer protocol phase, optional authentication phase, link establishment phase.D Link establishment phase, network layer protocol phase, optional authentication phase.E Link establishment phase, optional authentication phase, network layer protocol phase.F Optional authentication phase, network layer protocol phase, link establishment phase.

考题 单选题Two VPN peers are negotiating IKE phase 1 using main mode. Which message pair in the negotiation contains the phase 1 proposal for the peers?()A message 1 and 2B message 3 and 4C message 5 and 6D message 7 and 8

考题 单选题During which boot phase is the rootvg first activated()A Phase 1B Phase 2C Phase 3D POST Phase

考题 多选题Regarding an IPsec security association (SA), which two statements are true?()AIKE SA is bidirectional.BIPsec SA is bidirectional.CIKE SA is established during phase 2 negotiations.DIPsec SA is established during phase 2 negotiations.

考题 单选题Which one of the following is NOT a supported IKE attribute?()A  PFS group.B  Encryption algorithm.C  Hashing Algorithm.D  Authenticationmethod.E  Lifetime duration.

考题 单选题Which attribute is required for all IKE phase 2 negotiations?()A proxy-IDB preshared keyC Diffie-Hellman group keyD main or aggressive mode

考题 单选题Click the Exhibit button. Referring to the exhibit, which statement contains the correct gateway parameters?()A [edit security ike] user@host# show gateway ike-phase1-gateway { policy ike-policy1; address 10.10.10.1; dead-peer-detection { interval 20; threshold 5; } external-interface ge-1/0/1.0; }B [edit security ike] user@host# show gateway ike-phase1-gateway { ike-policy ike-policy1; address 10.10.10.1; dead-peer-detection { interval 20; threshold 5; } external-interface ge-1/0/1.0; }C [edit security ike] user@host# show gateway ike-phase1-gateway { policy ike1-policy; address 10.10.10.1; dead-peer-detection { interval 20; threshold 5; } external-interface ge-1/0/1.0; }D [edit security ike] user@host# show gateway ike-phase1-gateway { ike-policy ike1-policy; address 10.10.10.1; dead-peer-detection { interval 20; threshold 5; } external-interface ge-1/0/1.0; }

考题 单选题During the Easy VPN Remote connection process,which phase involves pushing the IP address, Domain Name System (DNS),and split tunnel attributes to the client?()A mode configurationB the VPN client establishment of an ISAKMP SAC IPsec quick mode completion of the connectionD VPN client initiation of the IKE phase 1 process

考题 单选题Which operational mode command displays all active IPsec phase 2 security associations?()A show ike security-associationsB show ipsec security-associationsC show security ike security-associationsD show security ipsec security-associations

考题 单选题To implement the optional phase zero when using eap-fast for authentication, which of the following parameters must be set on the cisco secure acs?()A eap-fast master serverB allow automatic pac provisioningC client initial messageD authority id info

考题 单选题For IKE phase 1 negotiations, when is aggressive mode typically used?()A when one of the tunnel peers has a dynamic IP addressB when one of the tunnel peers wants to force main mode to be usedC when fragmentation of the IKE packet is required between the two peersD when one of the tunnel peers wants to specify a different phase 1 proposal