AH provides data integrity.
AH is identified by IP protocol 50.
AH is identified by IP protocol 51.
AH cannot work in conjunction with ESP
第1题:
A. The last policy is the default policy, which allows all traffic.
B. The order of policies is not important.
C. New policies are placed at the end of the policy list.
D. The insert command can be used to change the order.
第2题:
A. 1 is the default precedence.
B. A lower number is preferred.
C. A higher number is preferred.
D. 100 is the default precedence.
第3题:
A. PAT is not supported.
B. PAT is enabled by default.
C. It supports the address-persistent configuration option.
D. It supports the junos-global configuration option.
第4题:
Which two statements are true about AH?() (Choose two.)
第5题:
Which two statements are true about L2TP tunnels?() (Choose two.)
第6题:
A. The same key is used for encryption and decryption.
B. It is commonly used to create digital certificate signatures.
C. It uses two keys: one for encryption and a different key for decryption.
D. An attacker can decrypt data if the attacker captures the key used for encryption.
第7题:
A. Tunnels are initiated by the LAC
B. Tunnels are initiated by the LNS
C. By default, subscriber authentication occurs on the LNS
D. By default, subscriber authentication occurs on the LAC
第8题:
A. AH provides data integrity.
B. AH is identified by IP protocol 50.
C. AH is identified by IP protocol 51.
D. AH cannot work in conjunction with ESP
第9题:
Which two statements are true for a security policy? ()(Choose two.)
第10题:
Which two statements are true regarding L2TP? ()(Choose two.)