niusouti.com

多选题Which three parameters are configured in the IKE policy? ()(Choose three.)AmodeBpreshared keyCexternal interfaceDsecurity proposalsEdead peer detection settings

题目
多选题
Which three parameters are configured in the IKE policy? ()(Choose three.)
A

mode

B

preshared key

C

external interface

D

security proposals

E

dead peer detection settings


相似考题
更多“多选题Which three parameters are configured in the IKE policy? ()(Choose three.)AmodeBpreshared keyCexternal interfaceDsecurity proposalsEdead peer detection settings”相关问题
  • 第1题:

    Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)

    A. access profile

    B. client group

    C. client

    D. default profile

    E. external


    参考答案:A, B, C

  • 第2题:

    What are three valid LDP message types? ()(Choose three.)

    • A、peer discovery
    • B、label distribution
    • C、path initialization
    • D、session management
    • E、connection establishment

    正确答案:A,B,D

  • 第3题:

    Which two parameters are configured in IPsec policy?()

    • A、mode
    • B、IKE gateway
    • C、security proposal
    • D、Perfect Forward Secrecy

    正确答案:C,D

  • 第4题:

    Which three options represent IDP policy match conditions? ()(Choose three.)

    • A、service
    • B、to-zone
    • C、attacks
    • D、port
    • E、destination-address

    正确答案:B,C,E

  • 第5题:

    Which three locations in WebView allow you to confirm that the endpoints are configured properly? ()(Choose three.)

    • A、Monitor > Endpoints
    • B、Acceleration > Endpoints
    • C、Device Setup > Endpoints
    • D、Compression > Endpoints
    • E、Admin > Maintenance > Display Configuration

    正确答案:A,D,E

  • 第6题:

    Which two parameters are configured in IPsec policy? ()(Choose two.)

    • A、mode
    • B、IKE gateway
    • C、security proposal
    • D、Perfect Forward Secrecy

    正确答案:C,D

  • 第7题:

    Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)

    • A、access profile
    • B、client group
    • C、client
    • D、default profile
    • E、external

    正确答案:A,B,C

  • 第8题:

    多选题
    Which three BGP states are associated with establishing TCP connectivity?() (Choose three.)
    A

    Idle

    B

    Active

    C

    Connect

    D

    Open Sent

    E

    Established


    正确答案: E,C
    解析: 暂无解析

  • 第9题:

    多选题
    Which three firewall user authentication objects can be referenced in a security policy? ()(Choose three.)
    A

    access profile

    B

    client group

    C

    client

    D

    default profile

    E

    external


    正确答案: A,C
    解析: 暂无解析

  • 第10题:

    多选题
    Which three parameters are configured in the IKE policy?()
    A

    mode

    B

    preshared key

    C

    external interface

    D

    security proposals

    E

    dead peer detection settings


    正确答案: A,B,D
    解析: 暂无解析

  • 第11题:

    多选题
    Which two parameters are configured in IPsec policy? ()(Choose two.)
    A

    mode

    B

    IKE gateway

    C

    security proposal

    D

    Perfect Forward Secrecy


    正确答案: C,A
    解析: 暂无解析

  • 第12题:

    多选题
    Which three of these items are IPv6 transition mechanisms? ()(Choose three.)
    A

    ISATAP

    B

    NATV6

    C

    manually configured overlay tunnels

    D

    dual stack configurations


    正确答案: D,C
    解析: 暂无解析

  • 第13题:

    Which three locations in WebView allow you to confirm that the endpoints are configured properly? ()(Choose three.)

    A. Monitor > Endpoints

    B. Acceleration > Endpoints

    C. Device Setup > Endpoints

    D. Compression > Endpoints

    E. Admin > Maintenance > Display Configuration


    参考答案:A, D, E

  • 第14题:

    Which three parameters are configured in the IKE policy?()

    • A、mode
    • B、preshared key
    • C、external interface
    • D、security proposals
    • E、dead peer detection settings

    正确答案:A,B,D

  • 第15题:

    Which three packet interception methods are configurable in WX devices?() (Choose three.)

    • A、OSPF
    • B、WCCP
    • C、policy based routing
    • D、route injection using RIPv1
    • E、route injection using RIPv2

    正确答案:B,C,E

  • 第16题:

    Which three of these items are IPv6 transition mechanisms? ()(Choose three.)

    • A、ISATAP
    • B、NATV6
    • C、manually configured overlay tunnels
    • D、dual stack configurations

    正确答案:A,C,D

  • 第17题:

    Which three parameters are configured in the IKE policy? ()(Choose three.)

    • A、mode
    • B、preshared key
    • C、external interface
    • D、security proposals
    • E、dead peer detection settings

    正确答案:A,B,D

  • 第18题:

    Which three represent IDP policy match conditions? ()(Choose three.)

    • A、protocol
    • B、source-address
    • C、port
    • D、application
    • E、attacks

    正确答案:B,D,E

  • 第19题:

    多选题
    Which three are necessary for antispam to function properly on a branch SRX Series device? ()(Choose three.)
    A

    an antispam license

    B

    DNS servers configured on the SRX Series device

    C

    SMTP services on SRX

    D

    a UTM profile with an antispam configuration in the appropriate security policy

    E

    antivirus (full or express)


    正确答案: B,C
    解析: 暂无解析

  • 第20题:

    多选题
    Which three applications are disabled for compression by default?() (Choose three.)
    A

    FTP

    B

    SSH

    C

    UDP

    D

    HTTPS

    E

    Traceroute


    正确答案: B,C
    解析: 暂无解析

  • 第21题:

    多选题
    Which three locations in WebView allow you to confirm that the endpoints are configured properly? ()(Choose three.)
    A

    Monitor > Endpoints

    B

    Acceleration > Endpoints

    C

    Device Setup > Endpoints

    D

    Compression > Endpoints

    E

    Admin > Maintenance > Display Configuration


    正确答案: C,B
    解析: 暂无解析

  • 第22题:

    多选题
    Which three options represent IDP policy match conditions? ()(Choose three.)
    A

    service

    B

    to-zone

    C

    attacks

    D

    port

    E

    destination-address


    正确答案: A,D
    解析: 暂无解析

  • 第23题:

    多选题
    Which three parameters are configured in the IKE policy? ()(Choose three.)
    A

    mode

    B

    preshared key

    C

    external interface

    D

    security proposals

    E

    dead peer detection settings


    正确答案: D,E
    解析: 暂无解析

  • 第24题:

    多选题
    Which three represent IDP policy match conditions? ()(Choose three.)
    A

    protocol

    B

    source-address

    C

    port

    D

    application

    E

    attacks


    正确答案: D,C
    解析: 暂无解析