单选题Which IPsec security protocol should be used when confidentiality is required?()A AHB MB5C PSKD ESP

题目
单选题
Which IPsec security protocol should be used when confidentiality is required?()
A

AH

B

MB5

C

PSK

D

ESP


相似考题
更多“Which IPsec security protocol should be used when confidenti”相关问题
  • 第1题:

    IPSec VPN is a widely-acknowledged solution for enterprise network. Which three IPsec VPNstatements are true?()

    • A、IKE keepalives are unidirectional and sent every ten seconds
    • B、IPsec uses the Encapsulating Security Protocol (ESP) or the Authentication Header (AH)protocol for exchanging keys
    • C、To establish IKE SA, main mode utilizes six packets while aggressive mode utilizes only threepackets
    • D、IKE uses the Diffie-Hellman algorithm to generate symmetrical keys to be used by IPsec peers

    正确答案:A,C,D

  • 第2题:

    When installing a security system, which of the following connectors would be used to connect the security system to the telephone service demarcation?()

    • A、RJ-31x
    • B、RJ-11
    • C、RS-232
    • D、DB-9

    正确答案:A

  • 第3题:

    Which IPsec security protocol should be used when confidentiality is required?()

    • A、AH
    • B、MD5
    • C、PSK
    • D、ESP

    正确答案:D

  • 第4题:

    Which of the following security policies is BEST to use when trying to mitigate the risks involved with allowing a user to access company email via their cell phone?()

    • A、The cell phone should require a password after a set period of inactivity.
    • B、The cell phone should only be used for company related emails.
    • C、The cell phone data should be encrypted according to NIST standards.
    • D、The cell phone should have data connection abilities disabled.

    正确答案:A

  • 第5题:

    Which of the following options should be used to obtain the latest security patches for AIX?()

    • A、FixDist
    • B、The Bonus Pack CD
    • C、OPS
    • D、The Security Maintenance CD

    正确答案:D

  • 第6题:

    You need to design a remote access strategy for the customer support users when they work from home. Your solution must meet security requirements. What should you do?()

    • A、Deploy an L2TP/IPsec VPN server in each call center. Configure the portable computers as L2TP VPN clients
    • B、Create IPSec tunnel mode connections between the customer support users home and the company’s Internet-facing routers
    • C、Create IP packet filters on the company’s Internet-facing routers to allow the Remote Desktop Protocol (RDP).Create IPSec filters on the terminal servers to allow only connections that use RDP
    • D、Create IP packet filters on the company’s Internet-facing routers to allow the IPSec protocols. Assign the Secure Server (Require Security) IPSec policy to the terminal servers. Assign the Client (Respond only) IPSec policy to the portable computers

    正确答案:A

  • 第7题:

    多选题
    Which three JUNOS software features allow for increased security on your network?()
    A

    firewall filters

    B

    data encryption

    C

    routing protocol authentication

    D

    support for BGP path mtu discovery

    E

    automatic discovery for IPSEC neighbors


    正确答案: A,D
    解析: 暂无解析

  • 第8题:

    单选题
    When installing a security system, which of the following connectors would be used to connect the security system to the telephone service demarcation?()
    A

    RJ-31x

    B

    RJ-11

    C

    RS-232

    D

    DB-9


    正确答案: D
    解析: 暂无解析

  • 第9题:

    单选题
    When a student has something in his mind and he should ignore the irrelevant parts when reading, which of the following strategies can be used? _____
    A

    skimming

    B

    detailed reading

    C

    scanning

    D

    predicting


    正确答案: B
    解析:
    寻读是从较长的文字资料中查寻特定的细节内容、而忽略其他无关的内容,是一种快速阅读方式。

  • 第10题:

    单选题
    Which protocol should be used to establish a secure terminal connection to a remote network device? Select the best response.()
    A

    ARP

    B

    SSH

    C

    Telnet

    D

    WEP

    E

    SNMPv1

    F

    SNMPv2


    正确答案: C
    解析: 暂无解析

  • 第11题:

    单选题
    Which operational mode command displays all active IPsec phase 2 security associations?()
    A

    show ike security-associations

    B

    show ipsec security-associations

    C

    show security ike security-associations

    D

    show security ipsec security-associations


    正确答案: C
    解析: 暂无解析

  • 第12题:

    多选题
    Which two mechanisms can be used to detect IPsec GRE tunnel failures?()
    A

    Dead Peer Detection (DPD)

    B

    CDP

    C

    isakmp keepalives

    D

    GRE keepalive mechanism

    E

    The hello mechanism of the routing protocol across the IPsec tunnel


    正确答案: B,D
    解析: 暂无解析

  • 第13题:

    Which type of intrusion prevention technology will be primarily used by the Cisco IPS security appliances?()

    • A、signature-based
    • B、profile-based
    • C、rule-based
    • D、protocol analysis-based

    正确答案:A

  • 第14题:

    A policy-based IPsec VPN is ideal for which scenario?()

    • A、when you want to conserve tunnel resources
    • B、when the remote peer is a dialup or remote access client
    • C、when you want to configure a tunnel policy with an action of deny
    • D、when a dynamic routing protocol such as OSPF must be sent across the VPN

    正确答案:B

  • 第15题:

    Which statement about the ip classless router command is true?()

    • A、The ip classless command is enabled by default in recent versions of IOS.
    • B、The ip classless command should only be enabled when static routing is being used instead of a routing protocol.
    • C、The ip classless command should be enabled by the network administrator whenever RIPv1 or IGRP is being used.
    • D、The ip classless command should be enabled by the network administrator whenever OSPF, RIPv2, or EIGRP is being used.

    正确答案:A

  • 第16题:

    Which file contains the attributes used to setup a new user account when executing ‘mkuser’ without any flags?()

    • A、/etc/security/user
    • B、/etc/security/passwd
    • C、/etc/security/mkuser.sys
    • D、/etc/security/mkuser.default

    正确答案:D

  • 第17题:

    Which three JUNOS software features allow for increased security on your network?()

    • A、firewall filters
    • B、data encryption
    • C、routing protocol authentication
    • D、support for BGP path mtu discovery
    • E、automatic discovery for IPSEC neighbors

    正确答案:A,B,C

  • 第18题:

    单选题
    Which parameter can be tuned to affect the selection of a static route as a backup.when a dynamic protocol is also being used?()
    A

    link bandwidth

    B

    hop count

    C

    link cost

    D

    administrative distance


    正确答案: B
    解析: 暂无解析

  • 第19题:

    单选题
    Which file contains the attributes used to setup a new user account when executing ’mkuser’ without any flags?()
    A

    /etc/security/user

    B

    /etc/security/passwd

    C

    /etc/security/mkuser.sys

    D

    /etc/security/mkuser.default


    正确答案: C
    解析: 暂无解析

  • 第20题:

    单选题
    Which of the following options should be used to obtain the latest security patches for AIX?()
    A

    FixDist

    B

    The Bonus Pack CD

    C

    OPS

    D

    The Security Maintenance CD


    正确答案: C
    解析: 暂无解析

  • 第21题:

    单选题
    Which method should be used to dynamically elect an RP when your network is using PIM version1?()
    A

    auto-RP

    B

    static RP

    C

    discovery mode

    D

    bootstrap protocol


    正确答案: D
    解析: 暂无解析

  • 第22题:

    单选题
    For security reasons, the network administrator needs to prevent pings into the corporate networks from hosts outside the internetwork. Which protocol should be blocked with access control lists?()
    A

    IP

    B

    ICMP

    C

    TCP

    D

    UDP


    正确答案: A
    解析: 暂无解析

  • 第23题:

    单选题
    Which statement about the ip classless router command is true?()
    A

    The ip classless command is enabled by default in recent versions of IOS.

    B

    The ip classless command should only be enabled when static routing is being used instead of a routing protocol.

    C

    The ip classless command should be enabled by the network administrator whenever RIPv1 or IGRP is being used.

    D

    The ip classless command should be enabled by the network administrator whenever OSPF, RIPv2, or EIGRP is being used.


    正确答案: A
    解析: 暂无解析

  • 第24题:

    多选题
    IPSec VPN is a widely-acknowledged solution for enterprise network. Which three IPsec VPNstatements are true?()
    A

    IKE keepalives are unidirectional and sent every ten seconds

    B

    IPsec uses the Encapsulating Security Protocol (ESP) or the Authentication Header (AH)protocol for exchanging keys

    C

    To establish IKE SA, main mode utilizes six packets while aggressive mode utilizes only threepackets

    D

    IKE uses the Diffie-Hellman algorithm to generate symmetrical keys to be used by IPsec peers


    正确答案: D,B
    解析: 暂无解析