mode
IKE gateway
security proposal
Perfect Forward Secrecy
第1题:
A. IPsec Routing
B. Access Control
C. IP Address Pool
D. Source Interface
第2题:
Which three parameters are configured in the IKE policy?()
第3题:
Which two statements are true regarding interface properties? ()
第4题:
You are configuring an SRX210 as a firewall enforcer that will tunnel IPsec traffic from several Junos Pulse users.Which two parameters must you configure on the SRX210?()
第5题:
Which three parameters are configured in the IKE policy? ()(Choose three.)
第6题:
Which two configuration elements are required for a route-based VPN?()
第7题:
You need to design a method of communication between the IT and HR departments. Your solution must meet business requirements. What should you do?()
第8题:
mode
preshared key
external interface
security proposals
dead peer detection settings
第9题:
MTU and speed must be configured under each unit.
Physical parameters such as MTU, duplex mode, and speed are configured under the interface name.
IP and IPv6 addresses are configured under a unit-number.
DLCI numbers, VPI/VCI values, and VLAN tags are physical parameters.
第10题:
mode
preshared key
external interface
security proposals
dead peer detection settings
第11题:
IKE gateway
secure tunnel interface
security policy to permit the IKE traffic
security policy referencing the IPsec VPN tunnel
第12题:
IPsec Routing
Access Control
IP Address Pool
Source Interface
第13题:
A.MTU and speed must be configured under each unit.
B.Physical parameters such as MTU, duplex mode, and speed are configured under the interface name.
C.IP and IPv6 addresses are configured under a unit-number.
D.DLCI numbers, VPI/VCI values, and VLAN tags are physical parameters.
第14题:
Which two parameters are configured in IPsec policy?()
第15题:
Which two configuration elements are required for a policy-based VPN?()
第16题:
When the Infranet Enforcer is set up in transparent mode, which additional resource policy must be configured to use OAC for IPsec enforcement? ()
第17题:
Which two parameters are configured in IPsec policy? ()(Choose two.)
第18题:
You have two stand-alone servers that run Windows Server 2003 Service Pack 2 (SP2). You assign the Secure Server (Require security) IPSec policy to both servers. From Server1, you notice that you cannot access resources on Server2. You need to ensure that you can access resources on Server2. All communications between Server1 and Server2 must be encrypted. What should you do?()
第19题:
Individual clients are configured under client groups in the configuration hierarchy.
Client groups are configured under individual clients in the configuration hierarchy.
Client groups are referenced in security policy in the same manner in which individual clients are referenced.
Client groups are used to simplify configuration by enabling firewall user authentication without security policy.
第20题:
On Server1, assign the Client (Respond only) IPSec policy.
On Server2, assign the Server (Request Security) IPSec Policy.
On Server1 and Server2, modify the authentication settings in the Secure Server (Require security) IPSec Policy.
On Server1 and Server2, enable Master Key perfect forward secrecy (PFS) in the Secure Server (Require security) IPSec Policy.
第21题:
mode
IKE gateway
security proposal
Perfect Forward Secrecy
第22题:
mode
IKE gateway
security proposal
Perfect Forward Secrecy
第23题:
access profile
IKE parameters
tunneled interface
redirect policy
第24题:
secure tunnel interface
security policy to permit the IKE traffic
a route for the tunneled transit traffic
tunnel policy for transit traffic referencing the IPsec VPN