多选题Which three parameters are configured in the IKE policy?()AmodeBpreshared keyCexternal interfaceDsecurity proposalsEdead peer detection settings

题目
多选题
Which three parameters are configured in the IKE policy?()
A

mode

B

preshared key

C

external interface

D

security proposals

E

dead peer detection settings


相似考题
参考答案和解析
正确答案: A,B,D
解析: 暂无解析
更多“多选题Which three parameters are configured in the IKE policy?()AmodeBpreshared keyCexternal interfaceDsecurity proposalsEdead peer detection settings”相关问题
  • 第1题:

    Which statement contains the correct parameters for a route-based IPsec VPN?()

    A. [edit security ipsec] user@host# show proposal ike1-proposal { protocol esp; authentication-algorithm hmac-md5-96; encryption-algorithm 3des-cbc; lifetime-seconds 3200; }policy ipsec1-policy { perfect-forward-secrecy { keys group2; } proposals ike1-proposal; } vpn VpnTunnel { interface ge-0/0/1.0; ike { gateway ike1-gateway; ipsec-policy ipsec1-policy; } establish-tunnels immediately; }

    B. [edit security ipsec] user@host# show proposal ike1-proposal { protocol esp; authentication-algorithm hmac-md5-96; encryption-algorithm 3des-cbc; lifetime-seconds 3200; } policy ipsec1-policy { perfect-forward-secrecy { keys group2; } proposals ike1-proposal; } vpn VpnTunnel { interface st0.0; ike { gateway ike1-gateway; ipsec-policy ipsec1-policy; } establish-tunnels immediately; }

    C. [edit security ipsec] user@host# show proposal ike1-proposal { protocol esp; authentication-algorithm hmac-md5-96; encryption-algorithm 3des-cbc; lifetime-seconds 3200;} policy ipsec1-policy { perfect-forward-secrecy { keys group2; } proposals ike1-proposal; } vpn VpnTunnel { bind-interface ge-0/0/1.0; ike { gateway ike1-gateway; ipsec-policy ipsec1-policy; } establish-tunnels immediately; }

    D. [edit security ipsec] user@host# show proposal ike1-proposal { protocol esp; authentication-algorithm hmac-md5-96; encryption-algorithm 3des-cbc; lifetime-seconds 3200; }policy ipsec1-policy { perfect-forward-secrecy { keys group2; } proposals ike1-proposal; } vpn VpnTunnel { bind-interface st0.0; ike { gateway ike1-gateway; ipsec-policy ipsec1-policy; } establish-tunnels immediately; }


    参考答案:D

  • 第2题:

    Which three parameters are configured in the IKE policy?()

    • A、mode
    • B、preshared key
    • C、external interface
    • D、security proposals
    • E、dead peer detection settings

    正确答案:A,B,D

  • 第3题:

    Which two configuration elements are required for a policy-based VPN?()

    • A、IKE gateway
    • B、secure tunnel interface
    • C、security policy to permit the IKE traffic
    • D、security policy referencing the IPsec VPN tunnel

    正确答案:A,D

  • 第4题:

    Which three parameters are configured in the IKE policy? ()(Choose three.)

    • A、mode
    • B、preshared key
    • C、external interface
    • D、security proposals
    • E、dead peer detection settings

    正确答案:A,B,D

  • 第5题:

    Which two parameters are determined during PPP LCP negotiation?()

    • A、MRU
    • B、connection speed
    • C、authentication protocol
    • D、anti-replay detection

    正确答案:A,C

  • 第6题:

    多选题
    When assigning a standalone access point a non-root role, which two parameters, other than role in the radio network settings, must be configured on the ssid manager page?()
    A

    force infrastructure devices to associate only to this ssid

    B

    set infrastructure ssid

    C

    multiple bssid

    D

    set data beacon rate

    E

    enable ip redirection on this ssid


    正确答案: E,D
    解析: 暂无解析

  • 第7题:

    多选题
    Which three options represent IDP policy match conditions? ()(Choose three.)
    A

    service

    B

    to-zone

    C

    attacks

    D

    port

    E

    destination-address


    正确答案: A,D
    解析: 暂无解析

  • 第8题:

    多选题
    Which three parameters are configured in the IKE policy? ()(Choose three.)
    A

    mode

    B

    preshared key

    C

    external interface

    D

    security proposals

    E

    dead peer detection settings


    正确答案: D,E
    解析: 暂无解析

  • 第9题:

    多选题
    Which two configuration elements are required for a policy-based VPN?()
    A

    IKE gateway

    B

    secure tunnel interface

    C

    security policy to permit the IKE traffic

    D

    security policy referencing the IPsec VPN tunnel


    正确答案: D,B
    解析: 暂无解析

  • 第10题:

    多选题
    Which three represent IDP policy match conditions? ()(Choose three.)
    A

    protocol

    B

    source-address

    C

    port

    D

    application

    E

    attacks


    正确答案: D,C
    解析: 暂无解析

  • 第11题:

    多选题
    Which two parameters are determined during PPP LCP negotiation?()
    A

    MRU

    B

    connection speed

    C

    authentication protocol

    D

    anti-replay detection


    正确答案: C,A
    解析: 暂无解析

  • 第12题:

    多选题
    Private VLANS can be configured as which three of these port types?()
    A

    isolated

    B

    protected

    C

    private

    D

    associated

    E

    promiscuous

    F

    munity


    正确答案: B,A
    解析: 暂无解析

  • 第13题:

    Refer to the exhibit. Which two statements are true about the partial configuration that is provided.()

    A. The peer group shortens the EBGP configuration

    B. The peer group shortens the IBGP configuration

    C. All the configured neighbors are in autonomous system 100

    D. Three AS - path filters are applied to each BGP neighbor

    E. Only the outgoing filters are applied to BGP updates


    参考答案:B, C

  • 第14题:

    Which two parameters are configured in IPsec policy?()

    • A、mode
    • B、IKE gateway
    • C、security proposal
    • D、Perfect Forward Secrecy

    正确答案:C,D

  • 第15题:

    You are configuring an SRX210 as a firewall enforcer that will tunnel IPsec traffic from several Junos Pulse users.Which two parameters must you configure on the SRX210?()

    • A、access profile
    • B、IKE parameters
    • C、tunneled interface
    • D、redirect policy

    正确答案:A,B

  • 第16题:

    Which two parameters are configured in IPsec policy? ()(Choose two.)

    • A、mode
    • B、IKE gateway
    • C、security proposal
    • D、Perfect Forward Secrecy

    正确答案:C,D

  • 第17题:

    多选题
    Which two of these elements need to be configured prior to enabling SSH? ()
    A

    hostname

    B

    loopback address

    C

    default gateway

    D

    domain name

    E

    SSH peer address


    正确答案: A,D
    解析: 暂无解析

  • 第18题:

    多选题
    Which three features are added in SNMPv3 over SNMPv2? ()
    A

    Message Integrity

    B

    Compression

    C

    Authentication

    D

    Encryption

    E

    Error Detection


    正确答案: E,B
    解析: 暂无解析

  • 第19题:

    多选题
    Which two parameters are configured in IPsec policy? ()(Choose two.)
    A

    mode

    B

    IKE gateway

    C

    security proposal

    D

    Perfect Forward Secrecy


    正确答案: C,A
    解析: 暂无解析

  • 第20题:

    多选题
    Which two parameters are configured in IPsec policy?()
    A

    mode

    B

    IKE gateway

    C

    security proposal

    D

    Perfect Forward Secrecy


    正确答案: B,D
    解析: 暂无解析

  • 第21题:

    多选题
    Which three statements are true when configuring Cisco IOS Firewall features using the SDM? ()
    A

    A custom application security policy can be configured in the Advanced Firewall Security Configuration dialog box.

    B

    An optional DMZ interface can be specified in the Advanced Firewall Interface Configuration dialog box.

    C

    Custom application policies for e-mail, instant messaging, HTTP, and peer-to-peer services can be created using the Intermediate Firewall wizard.

    D

    Only the outside (untrusted) interface is specified in the Basic Firewall Interface Configuration dialog box.

    E

    The outside interface that SDM can be launched from is configured in the Configuring Firewall for Remote Access dialog box.

    F

    The SDM provides a basic, intermediate, and advanced firewall wizard.


    正确答案: E,B
    解析: 暂无解析

  • 第22题:

    单选题
    It is considered a best practice to use the Dead Peer Detection (DPD) feature with which VPN topologies?()
    A

    IPSec

    B

    IPSec with GRE

    C

    DMVPN

    D

    EZVPN

    E

    all of the choices


    正确答案: B
    解析: 暂无解析

  • 第23题:

    多选题
    Which two configuration elements are required for a route-based VPN?()
    A

    secure tunnel interface

    B

    security policy to permit the IKE traffic

    C

    a route for the tunneled transit traffic

    D

    tunnel policy for transit traffic referencing the IPsec VPN


    正确答案: B,A
    解析: 暂无解析