网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which IPsec security protocol should be used when confidentiality is required?()
A

AH

B

MB5

C

PSK

D

ESP


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which IPsec security protocol should be used when confidentiality is required?()A AHB MB5C PSKD ESP” 相关考题
考题 Which method should be used to dynamically elect an RP when your network is using PIM version1?() A. auto-RPB. static RPC. discovery modeD. bootstrap protocol

考题 Which IPsec security protocol should be used when confidentiality is required?() A. AHB. MD5C. PSKD. ESP

考题 For security reasons, the network administrator needs to prevent pings into the corporate networks from hosts outside the internetwork. Which protocol should be blocked with access control lists()。 A.IPB.ICMPC.TCPD.UDP

考题 IPsec, also known as the internet Protocol ( ) , defines the architecture for security services for IP network traffic IPsec describes the framework for providing security a the IP layer, as well as the suite of protocols designed to provide that security: through_ ( )_ and encryption of IP network packets. IPec can be used 10 protect network data, for example, by setting up circuits using IPsec ( ), in which all data being sent between two endpoints is encrypted, as with a Virtual (请作答此空) Network connection ;for encrypting application layer data ;and for providing security for routers sending routing data across the public internet. Internet traffic can also be secured from host to host without the use of IPsec, for example by encryption at the ( ) layer with HTTP Secure (TTPS)or an the transport layer wit the Transport Layer Security (TLS)protocol.A.pubic] B.private] C.personal D.proper

考题 IPSec VPN is a widely-acknowledged solution for enterprise network. Which three IPsec VPNstatements are true?()A、IKE keepalives are unidirectional and sent every ten secondsB、IPsec uses the Encapsulating Security Protocol (ESP) or the Authentication Header (AH)protocol for exchanging keysC、To establish IKE SA, main mode utilizes six packets while aggressive mode utilizes only threepacketsD、IKE uses the Diffie-Hellman algorithm to generate symmetrical keys to be used by IPsec peers

考题 Which type of intrusion prevention technology will be primarily used by the Cisco IPS security appliances?()A、signature-basedB、profile-basedC、rule-basedD、protocol analysis-based

考题 When installing a security system, which of the following connectors would be used to connect the security system to the telephone service demarcation?()A、RJ-31xB、RJ-11C、RS-232D、DB-9

考题 A policy-based IPsec VPN is ideal for which scenario?()A、when you want to conserve tunnel resourcesB、when the remote peer is a dialup or remote access clientC、when you want to configure a tunnel policy with an action of denyD、when a dynamic routing protocol such as OSPF must be sent across the VPN

考题 Which IPsec security protocol should be used when confidentiality is required?()A、AHB、MD5C、PSKD、ESP

考题 Which statement about the ip classless router command is true?()A、The ip classless command is enabled by default in recent versions of IOS.B、The ip classless command should only be enabled when static routing is being used instead of a routing protocol.C、The ip classless command should be enabled by the network administrator whenever RIPv1 or IGRP is being used.D、The ip classless command should be enabled by the network administrator whenever OSPF, RIPv2, or EIGRP is being used.

考题 Which of the following security policies is BEST to use when trying to mitigate the risks involved with allowing a user to access company email via their cell phone?()A、The cell phone should require a password after a set period of inactivity.B、The cell phone should only be used for company related emails.C、The cell phone data should be encrypted according to NIST standards.D、The cell phone should have data connection abilities disabled.

考题 Which file contains the attributes used to setup a new user account when executing ‘mkuser’ without any flags?()A、/etc/security/userB、/etc/security/passwdC、/etc/security/mkuser.sysD、/etc/security/mkuser.default

考题 Which of the following options should be used to obtain the latest security patches for AIX?()A、FixDistB、The Bonus Pack CDC、OPSD、The Security Maintenance CD

考题 Which three JUNOS software features allow for increased security on your network?()A、firewall filtersB、data encryptionC、routing protocol authenticationD、support for BGP path mtu discoveryE、automatic discovery for IPSEC neighbors

考题 You need to design a remote access strategy for the customer support users when they work from home. Your solution must meet security requirements. What should you do?()A、Deploy an L2TP/IPsec VPN server in each call center. Configure the portable computers as L2TP VPN clientsB、Create IPSec tunnel mode connections between the customer support users home and the company’s Internet-facing routersC、Create IP packet filters on the company’s Internet-facing routers to allow the Remote Desktop Protocol (RDP).Create IPSec filters on the terminal servers to allow only connections that use RDPD、Create IP packet filters on the company’s Internet-facing routers to allow the IPSec protocols. Assign the Secure Server (Require Security) IPSec policy to the terminal servers. Assign the Client (Respond only) IPSec policy to the portable computers

考题 单选题Which parameter can be tuned to affect the selection of a static route as a backup.when a dynamic protocol is also being used?()A link bandwidthB hop countC link costD administrative distance

考题 多选题Which three JUNOS software features allow for increased security on your network?()Afirewall filtersBdata encryptionCrouting protocol authenticationDsupport for BGP path mtu discoveryEautomatic discovery for IPSEC neighbors

考题 单选题Which file contains the attributes used to setup a new user account when executing ’mkuser’ without any flags?()A /etc/security/userB /etc/security/passwdC /etc/security/mkuser.sysD /etc/security/mkuser.default

考题 单选题When installing a security system, which of the following connectors would be used to connect the security system to the telephone service demarcation?()A RJ-31xB RJ-11C RS-232D DB-9

考题 单选题Which of the following options should be used to obtain the latest security patches for AIX?()A FixDistB The Bonus Pack CDC OPSD The Security Maintenance CD

考题 单选题When a student has something in his mind and he should ignore the irrelevant parts when reading, which of the following strategies can be used? _____A skimmingB detailed readingC scanningD predicting

考题 单选题Which method should be used to dynamically elect an RP when your network is using PIM version1?()A auto-RPB static RPC discovery modeD bootstrap protocol

考题 单选题Which protocol should be used to establish a secure terminal connection to a remote network device? Select the best response.()A ARPB SSHC TelnetD WEPE SNMPv1F SNMPv2

考题 单选题For security reasons, the network administrator needs to prevent pings into the corporate networks from hosts outside the internetwork. Which protocol should be blocked with access control lists?()A IPB ICMPC TCPD UDP

考题 单选题Which operational mode command displays all active IPsec phase 2 security associations?()A show ike security-associationsB show ipsec security-associationsC show security ike security-associationsD show security ipsec security-associations

考题 单选题Which statement about the ip classless router command is true?()A The ip classless command is enabled by default in recent versions of IOS.B The ip classless command should only be enabled when static routing is being used instead of a routing protocol.C The ip classless command should be enabled by the network administrator whenever RIPv1 or IGRP is being used.D The ip classless command should be enabled by the network administrator whenever OSPF, RIPv2, or EIGRP is being used.

考题 多选题Which two mechanisms can be used to detect IPsec GRE tunnel failures?()ADead Peer Detection (DPD)BCDPCisakmp keepalivesDGRE keepalive mechanismEThe hello mechanism of the routing protocol across the IPsec tunnel

考题 多选题IPSec VPN is a widely-acknowledged solution for enterprise network. Which three IPsec VPNstatements are true?()AIKE keepalives are unidirectional and sent every ten secondsBIPsec uses the Encapsulating Security Protocol (ESP) or the Authentication Header (AH)protocol for exchanging keysCTo establish IKE SA, main mode utilizes six packets while aggressive mode utilizes only threepacketsDIKE uses the Diffie-Hellman algorithm to generate symmetrical keys to be used by IPsec peers