IPsec Routing
Access Control
IP Address Pool
Source Interface
第1题:
A. dial-up VPN
B. IKE authentication
C. XAuth authentication
D. shared IKE authentication
第2题:
A. You do not need to configure a RADIUS client policy.
B. You must know the exact model number of the Infranet Enforcer.
C. You must specify the NACN password of the device in the RADIUS client policy.
D. You do not need to designate a location group to which the Infranet Enforcer will belong.
第3题:
When using the Cisco SDM Quick Setup Siteto-Site VPN wizard, which three parameters do you configure?()
第4题:
Which statement is correct about defining an Infranet Enforcer for use as a RADIUS Client? ()
第5题:
Which two methods of authentication are used by the Infranet Controller for IPSec enforcement?()
第6题:
When the Infranet Enforcer is set up in transparent mode, which additional resource policy must be configured to use OAC for IPsec enforcement? ()
第7题:
An IPsec tunnel is established on an SRX Series Gateway on an interface whose IP address was obtained using DHCP.Which two statements are true? ()(Choose two.)
第8题:
You have a firewall enforcer protecting sensitive internal resources in a data center. The network traversed by endpoint traffic is semi-trusted, so you need to encrypt the traffic between the endpoints accessing the resources and the firewall enforcer.Which type of policies provide this level of protection?()
第9题:
Enable the VPN connection to use MS-CHAP.
Change the data encryption setting to Optional Encryption.
Specify a TCP/IP address in the network properties.
Change the IPSec policy setting to Client.
第10题:
You must configure the host (A) resource records.
You must add and configure an IPSec Enforcement Network policy.
You must create an Outlook Web App Mailbox policy.
You must use the Set-ADSiteLink cmdlet.
第11题:
The intranet-auth authentication option
The redirect-portal application service
The uac-policy application service
The ipsec-vpn tunnel
第12题:
Design a custom IPSec policy to implement Encapsulating Security Payload (ESP) for all IP traffic Design the IPSec policy to use certificate-based authentication between the two departments’ computers
Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computers
Design a customer IPSec policy to implement Encapsulating Payload (ESP) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computers
Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use certificate-based authentication between the two departments’ computers
第13题:
A. IPsec Routing
B. Access Control
C. IP Address Pool
D. Source Interface
第14题:
You need to configure a GRE tunnel on a IPSec router. When you are using the SDM to configurea GRE tunnel over IPsec, which two parameters are required when defining the tunnel interfaceinformation?()
第15题:
The LAN-side of the Teleworker router is assigned private IP address space (RFC1918), and the VPN topology is IPSec-only (no GRE protocol). When is it required to configure NAT/pNAT on the Teleworker router?()
第16题:
You have created a security policy on an SRX240 that permits traffic from any source-address, any destination-address, and any application. The policy will be a source IP policy for use with the Junos Pulse Access Control Service. What must you add to complete the security policy configuration?()
第17题:
In a Junos Pulse Access Control Service firewall enforcement configuration, what is the purpose of the source IP policy?()
第18题:
You have a firewall enforcer protecting resources in a data center. A user is experiencing difficulty connecting to a protected resource.Which two elements must exist so the user can access the resource?()
第19题:
You have a firewall enforcer receiving resource access policies from a Junos Pulse Access Control Service. You are using Network and Security Manager (NSM) for configuration management on that firewall. The firewall can also be configured using its built-in command-line interface (CLI) or Web-based user interface (WebUI). To avoid conflicting configurations, which two interfaces must you use to configure the firewall enforcer?()
第20题:
You work as the enterprise exchange administrator at Xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution.What actions must you take to change the Exchange-specific cost for a site link?()
第21题:
You do not need to configure a RADIUS client policy.
You must know the exact model number of the Infranet Enforcer.
You must specify the NACN password of the device in the RADIUS client policy.
You do not need to designate a location group to which the Infranet Enforcer will belong.
第22题:
The crypto ACL number
The IPSEC mode (tunnel or transport)
The GRE tunnel interface IP address
The GRE tunnel source interface or IP address, and tunnel destination IP address
The MTU size of the GRE tunnel interface
第23题:
to specify the destination addresses to which access is permitted
to specify the source address permitted to access the resource
to specify the services to which access is permitted
to inform the enforcer to expect policy information from the Junos Pulse Access Control Service
第24题:
IPsec Routing
Access Control
IP Address Pool
Source Interface