更多“单选题Which of the following protocols would MOST likely be used in the establishment of an IPSec VPN tunnel?()A AESB TKIPC 802.1qD ISAKMP”相关问题
  • 第1题:

    During the Easy VPN Remote connection process,which phase involves pushing the IP address, Domain Name System (DNS),and split tunnel attributes to the client?()

    • A、mode configuration
    • B、the VPN client establishment of an ISAKMP SA
    • C、IPsec quick mode completion of the connection
    • D、VPN client initiation of the IKE phase 1 process

    正确答案:A

  • 第2题:

    What is not a difference between VPN tunnel authentication and per-user authentication?()

    • A、VPN tunnel authentication is part of the IKE specification. 
    • B、VPN tunnel authentication does not control which end user can use the IPSec SA (VPN tunnel).
    • C、User authentication is used to control access for a specific user ID, and can be used with or without a VPN tunnel for network access authorization. 
    • D、802.1X with EAP-TLS (X.509 certificates) can be used to authenticate an IPSec tunnel.

    正确答案:D

  • 第3题:

    Which of the following protocols would MOST likely be used in the establishment of an IPSec VPN tunnel?()

    • A、 AES 
    • B、 TKIP
    • C、 802.1q
    • D、 ISAKMP

    正确答案:D

  • 第4题:

    Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?()

    • A、IDS
    • B、VPN
    • C、NIPS
    • D、HIDS

    正确答案:C

  • 第5题:

    Which of the following protocols would be used in order to log into a router to configure a VLAN?()

    • A、RDP
    • B、SMTP
    • C、TELNET
    • D、FTP

    正确答案:C

  • 第6题:

    Which of the following commands would MOST likely be used to see where a loss of connectivity between two devices on a network is located?()

    • A、tracert
    • B、netstat
    • C、nslookup
    • D、ping

    正确答案:A

  • 第7题:

    单选题
    A user is reporting that their computer is making strange noises and randomly powers off. Which of the following tools would MOST likely be used to troubleshoot this problem?()
    A

    POST diagnostic card

    B

    Power supply tester

    C

    Loop back plug

    D

    Cable tester


    正确答案: B
    解析: 暂无解析

  • 第8题:

    单选题
    For the IP address 192.168.2.1 which of the following subnet masks would be MOST likely used?()
    A

    255.255.0.0

    B

    255.255.248.0

    C

    255.255.255.0

    D

    255.255.255.255


    正确答案: D
    解析: 暂无解析

  • 第9题:

    单选题
    Which of the following protocols would MOST likely be used in the establishment of an IPSec VPN tunnel?()
    A

    AES

    B

    TKIP

    C

    802.1q

    D

    ISAKMP


    正确答案: B
    解析: 暂无解析

  • 第10题:

    单选题
    Which of the following wiring standards would MOST likely be used to interconnect two devices without the use of a hub or switch?()
    A

    568A

    B

    568B

    C

    Crossover

    D

    Loopback


    正确答案: D
    解析: 暂无解析

  • 第11题:

    单选题
    Which of the following would MOST likely be used with multimode fiber?()
    A

    10GBase-LR

    B

    10GBase-T

    C

    10GBase-ER

    D

    10GBase-SR


    正确答案: B
    解析: 暂无解析

  • 第12题:

    单选题
    Which of the following would MOST likely be used to punch down LAN cables before connecting them to the main switch?()
    A

    IDF

    B

    66 block

    C

    MDF

    D

    110 block


    正确答案: B
    解析: 暂无解析

  • 第13题:

    Which two mechanisms can be used to detect IPsec GRE tunnel failures?()

    • A、Dead Peer Detection (DPD)
    • B、CDP
    • C、isakmp keepalives
    • D、GRE keepalive mechanism
    • E、The hello mechanism of the routing protocol across the IPsec tunnel

    正确答案:A,E

  • 第14题:

    Which of the following wiring standards would MOST likely be used to interconnect two devices without the use of a hub or switch?()

    • A、568A
    • B、568B
    • C、Crossover
    • D、Loopback

    正确答案:C

  • 第15题:

    Which of the following would MOST likely be used with multimode fiber?()

    • A、10GBase-LR
    • B、10GBase-T
    • C、10GBase-ER
    • D、10GBase-SR

    正确答案:D

  • 第16题:

    Which of the following expansion slots would be MOST likely used to install an additional NIC into a desktop PC?()

    • A、PCI
    • B、AGP 8x
    • C、Mini PCI
    • D、PCI Express x16

    正确答案:A

  • 第17题:

    Which of the following protocols would MOST likely be used in the establishment of an IPSec VPN tunnel?()

    • A、AES
    • B、TKIP
    • C、802.1q
    • D、ISAKMP

    正确答案:A

  • 第18题:

    单选题
    During the Easy VPN Remote connection process,which phase involves pushing the IP address, Domain Name System (DNS),and split tunnel attributes to the client?()
    A

    mode configuration

    B

    the VPN client establishment of an ISAKMP SA

    C

    IPsec quick mode completion of the connection

    D

    VPN client initiation of the IKE phase 1 process


    正确答案: C
    解析: 暂无解析

  • 第19题:

    单选题
    Which of the following protocols would be used in order to log into a router to configure a VLAN?()
    A

    RDP

    B

    SMTP

    C

    TELNET

    D

    FTP


    正确答案: B
    解析: 暂无解析

  • 第20题:

    单选题
    Which of the following commands would MOST likely be used to see where a loss of connectivity between two devices on a network is located?()
    A

    tracert

    B

    netstat

    C

    nslookup

    D

    ping


    正确答案: D
    解析: 暂无解析

  • 第21题:

    单选题
    Which of the following protocols would MOST likely be used in the establishment of an IPSec VPN tunnel?()
    A

     AES 

    B

     TKIP

    C

     802.1q

    D

     ISAKMP


    正确答案: A
    解析: 暂无解析

  • 第22题:

    单选题
    Which of the following devices would MOST likely integrate a DHCP server?()
    A

    Router

    B

    Hub

    C

    Switch

    D

    Bridge


    正确答案: C
    解析: 暂无解析

  • 第23题:

    单选题
    What is not a difference between VPN tunnel authentication and per-user authentication?()
    A

    VPN tunnel authentication is part of the IKE specification. 

    B

    VPN tunnel authentication does not control which end user can use the IPSec SA (VPN tunnel).

    C

    User authentication is used to control access for a specific user ID, and can be used with or without a VPN tunnel for network access authorization. 

    D

    802.1X with EAP-TLS (X.509 certificates) can be used to authenticate an IPSec tunnel.


    正确答案: A
    解析: 暂无解析

  • 第24题:

    单选题
    Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?()
    A

    IDS

    B

    VPN

    C

    NIPS

    D

    HIDS


    正确答案: A
    解析: 暂无解析