mode
IKE gateway
security proposal
Perfect Forward Secrecy
第1题:
You have a firewall enforcer protecting resources in a data center. A user is experiencing difficulty connecting to a protected resource.Which two elements must exist so the user can access the resource?()
A. Resource access policy on the MAG Series device
B. IPsec routing policy on the MAG Series device
C. General traffic policy blocking access through the firewall enforcer
D. Auth table entry on the firewall enforcer
第2题:
A.MTU and speed must be configured under each unit.
B.Physical parameters such as MTU, duplex mode, and speed are configured under the interface name.
C.IP and IPv6 addresses are configured under a unit-number.
D.DLCI numbers, VPI/VCI values, and VLAN tags are physical parameters.
第3题:
Which three parameters are configured in the IKE policy?()
第4题:
When the Infranet Enforcer is set up in transparent mode, which additional resource policy must be configured to use OAC for IPsec enforcement? ()
第5题:
Which two configuration elements are required for a route-based VPN?()
第6题:
IPsec Routing
Access Control
IP Address Pool
Source Interface
第7题:
[edit security ipsec] user@host# show proposal ike1-proposal { protocol esp; authentication-algorithm hmac-md5-96; encryption-algorithm 3des-cbc; lifetime-seconds 3200; }policy ipsec1-policy { perfect-forward-secrecy { keys group2; } proposals ike1-proposal; } vpn VpnTunnel { interface ge-0/0/1.0; ike { gateway ike1-gateway; ipsec-policy ipsec1-policy; } establish-tunnels immediately; }
[edit security ipsec] user@host# show proposal ike1-proposal { protocol esp; authentication-algorithm hmac-md5-96; encryption-algorithm 3des-cbc; lifetime-seconds 3200; } policy ipsec1-policy { perfect-forward-secrecy { keys group2; } proposals ike1-proposal; } vpn VpnTunnel { interface st0.0; ike { gateway ike1-gateway; ipsec-policy ipsec1-policy; } establish-tunnels immediately; }
[edit security ipsec] user@host# show proposal ike1-proposal { protocol esp; authentication-algorithm hmac-md5-96; encryption-algorithm 3des-cbc; lifetime-seconds 3200;} policy ipsec1-policy { perfect-forward-secrecy { keys group2; } proposals ike1-proposal; } vpn VpnTunnel { bind-interface ge-0/0/1.0; ike { gateway ike1-gateway; ipsec-policy ipsec1-policy; } establish-tunnels immediately; }
[edit security ipsec] user@host# show proposal ike1-proposal { protocol esp; authentication-algorithm hmac-md5-96; encryption-algorithm 3des-cbc; lifetime-seconds 3200; }policy ipsec1-policy { perfect-forward-secrecy { keys group2; } proposals ike1-proposal; } vpn VpnTunnel { bind-interface st0.0; ike { gateway ike1-gateway; ipsec-policy ipsec1-policy; } establish-tunnels immediately; }
第8题:
mode
preshared key
external interface
security proposals
dead peer detection settings
第9题:
The crypto ACL number
The IPSEC mode (tunnel or transport)
The GRE tunnel interface IP address
The GRE tunnel source interface or IP address, and tunnel destination IP address
The MTU size of the GRE tunnel interface
第10题:
mode
preshared key
external interface
security proposals
dead peer detection settings
第11题:
IKE gateway
secure tunnel interface
security policy to permit the IKE traffic
security policy referencing the IPsec VPN tunnel
第12题:
secure tunnel interface
security policy to permit the IKE traffic
a route for the tunneled transit traffic
tunnel policy for transit traffic referencing the IPsec VPN
第13题:
A. IPsec Routing
B. Access Control
C. IP Address Pool
D. Source Interface
第14题:
You need to configure a GRE tunnel on a IPSec router. When you are using the SDM to configurea GRE tunnel over IPsec, which two parameters are required when defining the tunnel interfaceinformation?()
第15题:
Which three parameters are configured in the IKE policy?() (Choose three.)
第16题:
You have a firewall enforcer protecting resources in a data center. A user is experiencing difficulty connecting to a protected resource.Which two elements must exist so the user can access the resource?()
第17题:
You need to design a method of communication between the IT and HR departments. Your solution must meet business requirements. What should you do?()
第18题:
Select Require and Enforce for the Host Checker Policy in the realm authentication policy.
Select Evaluate Policies for the Host Checker policy in the realm authentication policy.
Configure the Host Checker policy as a role restriction for the Employee role.
Configure the Host Checker policy as a resource access policy for the Employee role.
第19题:
access profile
IKE parameters
tunneled interface
redirect policy
第20题:
MTU and speed must be configured under each unit.
Physical parameters such as MTU, duplex mode, and speed are configured under the interface name.
IP and IPv6 addresses are configured under a unit-number.
DLCI numbers, VPI/VCI values, and VLAN tags are physical parameters.
第21题:
Individual clients are configured under client groups in the configuration hierarchy.
Client groups are configured under individual clients in the configuration hierarchy.
Client groups are referenced in security policy in the same manner in which individual clients are referenced.
Client groups are used to simplify configuration by enabling firewall user authentication without security policy.
第22题:
mode
IKE gateway
security proposal
Perfect Forward Secrecy
第23题:
Force Infrastructure Devices to associate only to this SSID
Set Infrastructure SSID
Multiple BSSID
Set Data Beacon Rate
Enable IP redirection on this SSID