Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by AH?()A、data integrityB、data confidentialityC、data authenticationD、outer IP header confidentialityE、outer IP header authentication

题目

Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by AH?()

  • A、data integrity
  • B、data confidentiality
  • C、data authentication
  • D、outer IP header confidentiality
  • E、outer IP header authentication

相似考题
更多“Which three security”相关问题
  • 第1题:

    Which three functions are provided by JUNOS Software for security platforms?()

    • A、VPN establishment
    • B、stateful ARP lookups
    • C、Dynamic ARP inspection
    • D、Network Address Translation
    • E、inspection of packets at higher levels (Layer 4 and above)

    正确答案:A,D,E

  • 第2题:

    The Cisco ASA Security Appliance can offer benefit of integrating which three security services into one device?()

    • A、 IPS
    • B、 VPN Concentrator
    • C、 ACS server
    • D、 PIX firewall
    • E、 CSA MC
    • F、 DDoS Anomaly Guard and Detector

    正确答案:A,B,D

  • 第3题:

    Which three roles are predefined in the Cisco UCS system?()

    • A、Server Admin
    • B、Network Admin
    • C、Storage Admin
    • D、Security Admin

    正确答案:A,B,C

  • 第4题:

    Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by ESP?() (Choose three.)

    • A、data integrity
    • B、data confidentiality
    • C、data authentication
    • D、outer IP header confidentiality
    • E、outer IP header authentication

    正确答案:A,B,C

  • 第5题:

    An authentication realm consists of which three authentication resources?()

    • A、Authentication server
    • B、Session options
    • C、Authentication policy
    • D、End-point security policy
    • E、Role-mapping rules

    正确答案:A,C,E

  • 第6题:

    An integrated, converged network enables customers to accomplish which three actions?()

    • A、 simplify communications
    • B、 eliminate network security threats
    • C、 reduce total cost of ownership
    • D、 reduce headcount
    • E、 enable collaboration
    • F、 increase bandwidth

    正确答案:A,C,E

  • 第7题:

    Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)

    • A、access profile
    • B、client group
    • C、client
    • D、default profile
    • E、external

    正确答案:A,B,C

  • 第8题:

    多选题
    Network Security is a continuous process. Which three phases apply to this process?()
    A

    Configure

    B

    Improve

    C

    Operate

    D

    Monitor

    E

    Secure

    F

    Troubleshooting


    正确答案: B,D
    解析: 暂无解析

  • 第9题:

    多选题
    Cisco ISP Routers offer which three of these security benefits? (Choose three.) ()
    A

    onboard VPN accelerator

    B

    events correlation and proactive response

    C

    high-performance AIM VPN modules

    D

    virtual firewall

    E

    Cisco lOS Firewall and lOS IPS

    F

    transparent firewall


    正确答案: B,A
    解析: 暂无解析

  • 第10题:

    多选题
    Which three functions are provided by the Junos OS for security platforms?()(Choose three.)
    A

    VPN establishment

    B

    stateful ARP lookups

    C

    Dynamic ARP inspection

    D

    Network Address Translation

    E

    inspection of packets at higher levels (Layer 4 and above)


    正确答案: B,A
    解析: 暂无解析

  • 第11题:

    多选题
    List three benefits of implementing an integrated security solution based on the Cisco Self- Defending Network strategy? (Choose three.)()
    A

    integrated security

    B

    collaborative security system

    C

    self provisioning

    D

    Adaptive Threat Defense

    E

    programmable security ASICs

    F

    Cisco lOS-based security


    正确答案: C,B
    解析: 暂无解析

  • 第12题:

    多选题
    Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)
    A

    access profile

    B

    client group

    C

    client

    D

    default profile

    E

    external


    正确答案: D,A
    解析: 暂无解析

  • 第13题:

    Network Security is a continuous process. Which three phases apply to this process?()

    • A、Configure
    • B、Improve
    • C、Operate
    • D、Monitor
    • E、Secure
    • F、Troubleshooting

    正确答案:B,D,E

  • 第14题:

    Which three wireless service components belong to the operate phase?()

    • A、operations plan
    • B、operations assessment
    • C、security administration
    • D、system monitoring
    • E、operations implementation
    • F、incident management

    正确答案:C,D,F

  • 第15题:

    Which three parameters are configured in the IKE policy?()

    • A、mode
    • B、preshared key
    • C、external interface
    • D、security proposals
    • E、dead peer detection settings

    正确答案:A,B,D

  • 第16题:

    Cisco ISP Routers offer which three of these security benefits? (Choose three.) ()

    • A、 onboard VPN accelerator
    • B、 events correlation and proactive response
    • C、 high-performance AIM VPN modules
    • D、 virtual firewall
    • E、 Cisco lOS Firewall and lOS IPS
    • F、 transparent firewall

    正确答案:A,C,E

  • 第17题:

    Which three statements are valid SDM configuration wizards? ()

    • A、NAT
    • B、VPN
    • C、STP
    • D、Security Audit

    正确答案:A,B,D

  • 第18题:

    When determining a customer’s security requirements using the security site survey from the steps for success methodology, which three of theses should be included in the customer’s security policy and procedures?()

    • A、Third-party due diligence policy review
    • B、Remote Access Policy
    • C、Encryption Policy
    • D、Application change control policy
    • E、Security Personnel policy

    正确答案:A,B,D

  • 第19题:

    多选题
    When determining a customer’s security requirements using the security site survey from the steps for success methodology, which three of theses should be included in the customer’s security policy and procedures?()
    A

    Third-party due diligence policy review

    B

    Remote Access Policy

    C

    Encryption Policy

    D

    Application change control policy

    E

    Security Personnel policy


    正确答案: E,B
    解析: 暂无解析

  • 第20题:

    多选题
    The Cisco ASA Security Appliance can offer benefit of integrating which three security services into one device?()
    A

    IPS

    B

    VPN Concentrator

    C

    ACS server

    D

    PIX firewall

    E

    CSA MC

    F

    DDoS Anomaly Guard and Detector


    正确答案: D,C
    解析: 暂无解析

  • 第21题:

    多选题
    Which three functions are available under the "Maintain" tab of J-Web?()
    A

    download and delete log files

    B

    view real-time statistics of interfaces

    C

    reboot the system

    D

    view and add licenses

    E

    edit security settings


    正确答案: B,C
    解析: 暂无解析

  • 第22题:

    多选题
    An integrated, converged network enables customers to accomplish which three actions?()
    A

    simplify communications

    B

    eliminate network security threats

    C

    reduce total cost of ownership

    D

    reduce headcount

    E

    enable collaboration

    F

    increase bandwidth


    正确答案: E,F
    解析: 暂无解析

  • 第23题:

    多选题
    An authentication realm consists of which three authentication resources?()
    A

    Authentication server

    B

    Session options

    C

    Authentication policy

    D

    End-point security policy

    E

    Role-mapping rules


    正确答案: B,D
    解析: 暂无解析

  • 第24题:

    多选题
    Which three are necessary for antispam to function properly on a branch SRX Series device? ()(Choose three.)
    A

    an antispam license

    B

    DNS servers configured on the SRX Series device

    C

    SMTP services on SRX

    D

    a UTM profile with an antispam configuration in the appropriate security policy

    E

    antivirus (full or express)


    正确答案: A,B
    解析: 暂无解析