data integrity
data confidentiality
data authentication
outer IP header confidentiality
outer IP header authentication
第1题:
What is the port number of the IPsec Authentication Header packet?()
第2题:
You need to configure a GRE tunnel on a IPSec router. When you are using the SDM to configurea GRE tunnel over IPsec, which two parameters are required when defining the tunnel interfaceinformation?()
第3题:
What is not a difference between VPN tunnel authentication and per-user authentication?()
第4题:
Which two configuration elements are required for a policy-based VPN?()
第5题:
What is true about Quality of Service (QoS) for VPNs?()
第6题:
Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by ESP?()
第7题:
You need to design a method of communication between the IT and HR departments. Your solution must meet business requirements. What should you do?()
第8题:
data integrity
data confidentiality
data authentication
outer IP header confidentiality
outer IP header authentication
第9题:
The crypto ACL number
The IPSEC mode (tunnel or transport)
The GRE tunnel interface IP address
The GRE tunnel source interface or IP address, and tunnel destination IP address
The MTU size of the GRE tunnel interface
第10题:
VPN tunnel authentication is part of the IKE specification.
VPN tunnel authentication does not control which end user can use the IPSec SA (VPN tunnel).
User authentication is used to control access for a specific user ID, and can be used with or without a VPN tunnel for network access authorization.
802.1X with EAP-TLS (X.509 certificates) can be used to authenticate an IPSec tunnel.
第11题:
data integrity
data confidentiality
data authentication
outer IP header confidentiality
outer IP header authentication
第12题:
IKE keepalives are unidirectional and sent every ten seconds
IPsec uses the Encapsulating Security Protocol (ESP) or the Authentication Header (AH)protocol for exchanging keys
To establish IKE SA, main mode utilizes six packets while aggressive mode utilizes only threepackets
IKE uses the Diffie-Hellman algorithm to generate symmetrical keys to be used by IPsec peers
第13题:
IPSec VPN is a widely-acknowledged solution for enterprise network. Which three IPsec VPNstatements are true?()
第14题:
Which three features are benefits of using GRE tunnels in conjunction with IPsec for building site-to-site VPNs?()
第15题:
Which QoS preclassification option will require the use of the qos pre-classify command for the VPN traffic? ()
第16题:
Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by ESP?() (Choose three.)
第17题:
Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by AH?() (Choose three.)
第18题:
Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by AH?()
第19题:
data integrity
data confidentiality
data authentication
outer IP header confidentiality
outer IP header authentication
第20题:
enables IOS to copy the ToS field from the inner (original) IPheader to theouter tunnel IP header
enables IOS to make a copy of the inner (original) IP header and to run a QoS classification before encryption, based on fields in the inner IP header.
enables IOS to classify packets based on the ToS field in the inner (original) IP header
enables IOS to classify packets based on the ToS field in the outer tunnel IP header
enables the IOS classification engine to only see a single encrypted and tunneledflow to reduce classification complexity
第21题:
Twenty bytes of header will be replaced with five bytes.
If the IPSec transform set includes Authentication Header, the receiving IPSec peer will discard the packets.
The IPSec packets will be dropped by Router A's compression logic.
The voice packets will not be compressed.
第22题:
VPN traffic needs to be classified based on the Layer2 header information
VPN traffic needs to be classified based on the IP precedence or DSCP
VPN traffic needs to be classified based on IP flow or Layer 3 information, such as source and destination IP address
VPN traffic with Authentication Header (AH) needs to preserve the ToS byte
第23题:
allows dynamic routing over the tunnel
supports multi-protocol (non-IP) traffic over the tunnel
reduces IPsec headers overhead since tunnel mode is used
simplifies the ACL used in the crypto map
uses Virtual Tunnel Interface (VTI) to simplify the IPsec VPN configuration