Regarding an IPsec security association (SA), which two stat

题目
多选题
Regarding an IPsec security association (SA), which two statements are true?()
A

IKE SA is bidirectional.

B

IPsec SA is bidirectional.

C

IKE SA is established during phase 2 negotiations.

D

IPsec SA is established during phase 2 negotiations.

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which two parameters are configured in IPsec policy? ()(Choose two.)

A. mode

B. IKE gateway

C. security proposal

D. Perfect Forward Secrecy


参考答案:C, D

第2题:

IPsec, also known as the internet Protocol ( ) , defines the architecture for security services for IP network traffic IPsec describes the framework for providing security a the IP layer, as well as the suite of protocols designed to provide that security: through_ ( )_ and encryption of IP network packets. IPec can be used 10 protect network data, for example, by setting up circuits using IPsec ( ), in which all data being sent between two endpoints is encrypted, as with a Virtual (请作答此空) Network connection ;for encrypting application layer data ;and for providing security for routers sending routing data across the public internet. Internet traffic can also be secured from host to host without the use of IPsec, for example by encryption at the ( ) layer with HTTP Secure (TTPS)or an the transport layer wit the Transport Layer Security (TLS)protocol.

A.pubic]
B.private]
C.personal
D.proper

答案:B
解析:

第3题:

Which two statements are true regarding the system-default security policy [edit security policies default-policy]?()(Choose two.)

A. Traffic is permitted from the trust zone to the untrust zone.

B. Intrazone traffic in the trust zone is permitted.

C. All traffic through the device is denied.

D. The policy is matched only when no other matching policies are found.


参考答案:C, D

第4题:

Which two parameters are configured in IPsec policy?()

  • A、mode
  • B、IKE gateway
  • C、security proposal
  • D、Perfect Forward Secrecy

正确答案:C,D

第5题:

Which two statements regarding firewall user authentication client groups are true?() (Choose two.)

  • A、A client group is a list of clients associated with a group.
  • B、A client group is a list of groups associated with a client.
  • C、Client groups are referenced in security policy in the same manner in which individual clients are referenced.
  • D、Client groups are used to simplify configuration by enabling firewall user authentication without security policy.

正确答案:B,C

第6题:

Which two of these are advantages of placing the VPN device parallel to the firewall?()

A. high scalability

B. the design supports a layered security model

C. firewall addressing does not need to change

D. IPsec decrypted traffic is inspected by the firewall

E. there is a centralized point for logging and content inspection


参考答案:A, C

第7题:

Which of the following commands will display a router’s crypto map IPsec security associationsettings?()

  • A、show crypto map ipsec sa
  • B、show crypto map
  • C、show crypto engine connections active
  • D、show ipsec crypto map
  • E、show crypto map sa
  • F、show ipsec crypto map sa

正确答案:A

第8题:

Which statement is true regarding IPsec VPNs?()

A. There are five phases of IKE negotiation.

B. There are two phases of IKE negotiation.

C. IPsec VPN tunnels are not supported on SRX Series devices.

D. IPsec VPNs require a tunnel PIC in SRX Series devices.


参考答案:D

第9题:

IPSec VPN is a widely-acknowledged solution for enterprise network. Which three IPsec VPNstatements are true?()

  • A、IKE keepalives are unidirectional and sent every ten seconds
  • B、IPsec uses the Encapsulating Security Protocol (ESP) or the Authentication Header (AH)protocol for exchanging keys
  • C、To establish IKE SA, main mode utilizes six packets while aggressive mode utilizes only threepackets
  • D、IKE uses the Diffie-Hellman algorithm to generate symmetrical keys to be used by IPsec peers

正确答案:A,C,D

第10题:

Which two configuration elements are required for a policy-based VPN?()

  • A、IKE gateway
  • B、secure tunnel interface
  • C、security policy to permit the IKE traffic
  • D、security policy referencing the IPsec VPN tunnel

正确答案:A,D

更多相关问题