Which two methods use IPsec to provide secure connectivity from the branch office to the headquarters office?()
第1题:
Process OSPF 1 is redistributing routes from process OSPF 2. Which of the following methods may be used to set the metrics of the redistributed routes?()
第2题:
Which two are true?()
第3题:
Which of the following encryption methods is often used along with L2TP?()
第4题:
Which two methods are used to assign an IP address to a WX device? ()(Choose two.)
第5题:
You are required to remove the default EXTPROC entry from the default listener configuration to create a listener that will listen specifically for EXTPROC calls. Which two methods can you use to remove the default EXTPROC entry from the default listener configuration? ()
第6题:
FTP
SSH
Telnet
J-Web
第7题:
An encapsulated, public class promotes re-use.
Classes that share the same interface are always tightly encapsulated.
An encapsulated class allows subclasses to overload methods, but does NOT allow overriding methods.
An encapsulated class allows a programmer to change an implementation without affecting outside code.
第8题:
SSH
Telnet
WebView
device front panel
serial console (command-line interface)
第9题:
Junos Pulse
Java Agent
Odyssey Access Client
Native 802.1X supplicant
第10题:
weighted fair priority
weighted fair queuing
weighted strict priority
weighted strict queuing
第11题:
dial-up VPN
IKE authentication
XAuth authentication
shared IKE authentication
第12题:
mode
IKE gateway
security proposal
Perfect Forward Secrecy
第13题:
Which of the following are methods to automatically update the antivirus application?() (Select TWO).
第14题:
Which two wireless encryption methods are based on the RC4 encryption algorithm? ()
第15题:
When the Infranet Enforcer is set up in transparent mode, which additional resource policy must be configured to use OAC for IPsec enforcement? ()
第16题:
You work as a database administrator for Certkiller .com. You have set the retention period for Automatic Repository (AWR) statistics to four days and collection interval to 15 minutes. You want to view the statistics collected and stored in AWR snapshot. Which two methods would you use to view the AWR statistics?()
第17题:
You need to design a method of communication between the IT and HR departments. Your solution must meet business requirements. What should you do?()
第18题:
SSL
SSH
Telnet
HTTP
第19题:
DMVPN
MPLS VPN
Virtual Tunnel Interface (VTI)
SSL VPN
PPPoE
第20题:
IKE
PAP
CHAP
MSCHAP
第21题:
Raising temperature
less use of surfactant
more use of solvent
polishing device fouling prevention
第22题:
RADIUS
KERBEROS
LDAP
TACACS+
第23题:
mode
IKE gateway
security proposal
Perfect Forward Secrecy