网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

For IKE phase 1 negotiations, when is aggressive mode typically used?()

  • A、when one of the tunnel peers has a dynamic IP address
  • B、when one of the tunnel peers wants to force main mode to be used
  • C、when fragmentation of the IKE packet is required between the two peers
  • D、when one of the tunnel peers wants to specify a different phase 1 proposal

参考答案

更多 “For IKE phase 1 negotiations, when is aggressive mode typically used?()A、when one of the tunnel peers has a dynamic IP addressB、when one of the tunnel peers wants to force main mode to be usedC、when fragmentation of the IKE packet is required between the two peersD、when one of the tunnel peers wants to specify a different phase 1 proposal” 相关考题
考题 下列对IKE描述正确的是()A、IKE是单一协议主要用于密钥交换B、IKE用于网络认证和加密的算法C、标准IKE就是标准IPSEC协议D、IKE只能使用证书

考题 During the Easy VPN Remote connection process,which phase involves pushing the IP address, Domain Name System (DNS),and split tunnel attributes to the client?()A、mode configurationB、the VPN client establishment of an ISAKMP SAC、IPsec quick mode completion of the connectionD、VPN client initiation of the IKE phase 1 process

考题 The enable secret password appears as an MD5 hash in a router’s configuration file, whereas the enablepassword is not hashed (or encrypted, if the password-encryption service is not enabled). What is thereason that Cisco still support the use of both enable secret and enable passwords in a router’sconfiguration?()A、The enable password is present for backward compatibility.B、Because the enable secret password is a hash, it cannot be decrypted. Therefore, the enable password is used to match the password that was entered, and the enable secret is used to verify that the enablepassword has not been modified since the hash was generated.C、The enable password is considered to be a router’s public key, whereas the enable secret password is considered to be a router’s private key.D、The enable password is used for IKE Phase I, whereas the enable secret password is used for IKE Phase II.

考题 Which of the following options lists the steps in PPP session establishment in the correct order?()A、Optional authentication phase, link establishment phase, network layer protocol phase.B、Network layer protocol phase, link establishment phase, optional authentication phase.C、Network layer protocol phase, optional authentication phase, link establishment phase.D、Link establishment phase, network layer protocol phase, optional authentication phase.E、Link establishment phase, optional authentication phase, network layer protocol phase.F、Optional authentication phase, network layer protocol phase, link establishment phase.

考题 要清除ike建立的安全隧道,应该使用以下哪个命令()。A、reset ikeB、reset ike tunnelC、reset ipsec saD、reset ike sa

考题 下列关于IPSec与IKE的说法不正确的是()。A、IPSec只能通过与IKE配合方式才能建立起安全联盟B、IKE只能与IPSec配合使用C、IKE只负责为IPSec建立提供安全密钥,不参与IPSec SA协商D、IPSec SA建立后,数据转发与IKE无关

考题 下列关于IKE协议的说话,正确的是()。A、IKE阶段一协商包括两种模式:主模式和野蛮模式B、如果网络中存在NAT,或者一端动态获取IP地址,则IKE协商必须使用野蛮模式C、在IKE阶段一协商时,主要目的是协商出IKE SAD、IKE SA用于加密保护VPN两端的通信数据IPsec SA保护数据

考题 关于IPSec SA和IKE SA的说法,正确的是()A、IPSec SA是双向的,IKE SA是单向的B、IPSec SA是双向的,IKE SA是双向的C、IPSec SA是单向的,IKE SA是单向的D、IPSec SA是单向的,IKE SA是双向的

考题 下列关于IKE的说法正确的是()。A、IKE第一阶段交换模式有主模式和快速模式B、IKE第二阶段完成时产生IKE SAC、IKE两种模式下交换密钥都需要进行身份验证D、IKE交换密钥时采用非对称密钥算法

考题 下列有关网元的工作阶段的描述正确的有:()A、BSC://PHASE1,PHASE2,PHASE3;B、TRAU:TRAUFW,PHASE1,PHASE2,PHASE3;C、TRAU:PHASE1,PHASE2,PHASE3;D、BTSE://PHASE1,PHASE2,PHASE3;

考题 IKE和ISAKMP、OAKLEY、SKEME有什么关系?IKE和ISAKMP有什么不同?

考题 在华为BSS/RXCDR参数中,“A接口阶段标志”的参数取值范围是()A、GSM_PHASE_1B、GSM_PHASE_1、GSM_PHASE_2、GSM_PHASE_2+C、GSM_PHASE_2、GSM_PHASE_2+D、GSM_PHASE_1、GSM_PHASE_2+E、GSM_PHASE_2+

考题 For the following items ,which one can be used to authenticate the IPsec peers during IKE Phase 1?()A、pre-shared keyB、integrity check valueC、XAUTHD、Diffie-Hellman Nonce

考题 下列关于IKE描述不正确的是()A、IKE可以为IPsec协商安全关联B、IKE可以为RIPv2、OSPFv2等要求保密的协议协商安全参数C、IKE可以为L2TP协商安全关联D、IKE可以为SNMPv3等要求保密的协议协商安全参数

考题 During which boot phase is the rootvg first activated()A、Phase 1B、Phase 2C、Phase 3D、POST Phase

考题 Which attribute is optional for IKE phase 2 negotiations?()A、proxy-IDB、phase 2 proposalC、Diffie-Hellman group keyD、security protocol (ESP or AH)

考题 Regarding an IPsec security association (SA), which two statements are true?()A、IKE SA is bidirectional.B、IPsec SA is bidirectional.C、IKE SA is established during phase 2 negotiations.D、IPsec SA is established during phase 2 negotiations.

考题 问答题IKE和ISAKMP、OAKLEY、SKEME有什么关系?IKE和ISAKMP有什么不同?

考题 单选题Which of the following options lists the steps in PPP session establishment in the correct order?()A Optional authentication phase, link establishment phase, network layer protocol phase.B Network layer protocol phase, link establishment phase, optional authentication phase.C Network layer protocol phase, optional authentication phase, link establishment phase.D Link establishment phase, network layer protocol phase, optional authentication phase.E Link establishment phase, optional authentication phase, network layer protocol phase.F Optional authentication phase, network layer protocol phase, link establishment phase.

考题 单选题Two VPN peers are negotiating IKE phase 1 using main mode. Which message pair in the negotiation contains the phase 1 proposal for the peers?()A message 1 and 2B message 3 and 4C message 5 and 6D message 7 and 8

考题 单选题The enable secret password appears as an MD5 hash in a router’s configuration file, whereas the enablepassword is not hashed (or encrypted, if the password-encryption service is not enabled). What is thereason that Cisco still support the use of both enable secret and enable passwords in a router’sconfiguration?()A The enable password is present for backward compatibility.B Because the enable secret password is a hash, it cannot be decrypted. Therefore, the enable password is used to match the password that was entered, and the enable secret is used to verify that the enablepassword has not been modified since the hash was generated.C The enable password is considered to be a router’s public key, whereas the enable secret password is considered to be a router’s private key.D The enable password is used for IKE Phase I, whereas the enable secret password is used for IKE Phase II.

考题 单选题Which attribute is optional for IKE phase 2 negotiations?()A proxy-IDB phase 2 proposalC Diffie-Hellman group keyD security protocol (ESP or AH)

考题 单选题Which attribute is required for all IKE phase 2 negotiations?()A proxy-IDB preshared keyC Diffie-Hellman group keyD main or aggressive mode

考题 单选题Click the Exhibit button. Referring to the exhibit, which statement contains the correct gateway parameters?()A [edit security ike] user@host# show gateway ike-phase1-gateway { policy ike-policy1; address 10.10.10.1; dead-peer-detection { interval 20; threshold 5; } external-interface ge-1/0/1.0; }B [edit security ike] user@host# show gateway ike-phase1-gateway { ike-policy ike-policy1; address 10.10.10.1; dead-peer-detection { interval 20; threshold 5; } external-interface ge-1/0/1.0; }C [edit security ike] user@host# show gateway ike-phase1-gateway { policy ike1-policy; address 10.10.10.1; dead-peer-detection { interval 20; threshold 5; } external-interface ge-1/0/1.0; }D [edit security ike] user@host# show gateway ike-phase1-gateway { ike-policy ike1-policy; address 10.10.10.1; dead-peer-detection { interval 20; threshold 5; } external-interface ge-1/0/1.0; }

考题 单选题During the Easy VPN Remote connection process,which phase involves pushing the IP address, Domain Name System (DNS),and split tunnel attributes to the client?()A mode configurationB the VPN client establishment of an ISAKMP SAC IPsec quick mode completion of the connectionD VPN client initiation of the IKE phase 1 process

考题 单选题Which operational mode command displays all active IPsec phase 2 security associations?()A show ike security-associationsB show ipsec security-associationsC show security ike security-associationsD show security ipsec security-associations

考题 单选题在华为BSS/RXCDR参数中,“A接口阶段标志”的参数取值范围是()A GSM_PHASE_1B GSM_PHASE_1、GSM_PHASE_2、GSM_PHASE_2+C GSM_PHASE_2、GSM_PHASE_2+D GSM_PHASE_1、GSM_PHASE_2+E GSM_PHASE_2+

考题 单选题For IKE phase 1 negotiations, when is aggressive mode typically used?()A when one of the tunnel peers has a dynamic IP addressB when one of the tunnel peers wants to force main mode to be usedC when fragmentation of the IKE packet is required between the two peersD when one of the tunnel peers wants to specify a different phase 1 proposal