A. data integrity
B. data confidentiality
C. data authentication
D. outer IP header confidentiality
E. outer IP header authentication
第1题:
A. Mark permitted traffic for firewall user authentication.
B. Mark permitted traffic for SCREEN options.
C. Associate permitted traffic with an IPsec tunnel.
D. Associate permitted traffic with a NAT rule.
E. Mark permitted traffic for IDP processing.
第2题:
A. data integrity
B. encryption
C. key exchange
D. authentication
第3题:
IPSec VPN is a widely-acknowledged solution for enterprise network. Which three IPsec VPNstatements are true?()
第4题:
Which component of VPN technology ensures that data can be read only by its intended recipient?()
第5题:
Which encryption type is used to secure user data in an IPsec tunnel?()
第6题:
Which two statements are true about AH?() (Choose two.)
第7题:
Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by ESP?()
第8题:
Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)
第9题:
data integrity
data confidentiality
data authentication
outer IP header confidentiality
outer IP header authentication
第10题:
data integrity
data confidentiality
data authentication
outer IP header confidentiality
outer IP header authentication
第11题:
Enter the password.
Modify the delete time to 3 hours.
Set the interface to local, remote or both.
Increase the snap length of the Packet Capture configuration.
Set the Packet Capture size to greater than the actual data flow
第12题:
IKE keepalives are unidirectional and sent every ten seconds
IPsec uses the Encapsulating Security Protocol (ESP) or the Authentication Header (AH)protocol for exchanging keys
To establish IKE SA, main mode utilizes six packets while aggressive mode utilizes only threepackets
IKE uses the Diffie-Hellman algorithm to generate symmetrical keys to be used by IPsec peers
第13题:
A. Enter the password.
B. Modify the delete time to 3 hours.
C. Set the interface to local, remote or both.
D. Increase the snap length of the Packet Capture configuration.
E. Set the Packet Capture size to greater than the actual data flow
第14题:
第15题:
Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by ESP?() (Choose three.)
第16题:
Routers can be used to integrate a variety of services. Which two common services are often specified by businesses?()
第17题:
Which three JUNOS software features allow for increased security on your network?()
第18题:
Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by AH?() (Choose three.)
第19题:
Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by AH?()
第20题:
Which statement is true about the loss of system-critical data files in ARCHIVELOG mode?()
第21题:
access profile
client group
client
default profile
external
第22题:
data integrity
data confidentiality
data authentication
outer IP header confidentiality
outer IP header authentication
第23题:
data integrity
data confidentiality
data authentication
outer IP header confidentiality
outer IP header authentication