mode
IKE gateway
security proposal
Perfect Forward Secrecy
第1题:
A. The last policy is the default policy, which allows all traffic.
B. The order of policies is not important.
C. New policies are placed at the end of the policy list.
D. The insert command can be used to change the order.
第2题:
You have a firewall enforcer protecting resources in a data center. A user is experiencing difficulty connecting to a protected resource.Which two elements must exist so the user can access the resource?()
A. Resource access policy on the MAG Series device
B. IPsec routing policy on the MAG Series device
C. General traffic policy blocking access through the firewall enforcer
D. Auth table entry on the firewall enforcer
第3题:
A. access profile
B. IKE parameters
C. tunneled interface
D. redirect policy
第4题:
Which three parameters are configured in the IKE policy?()
第5题:
A.MTU and speed must be configured under each unit.
B.Physical parameters such as MTU, duplex mode, and speed are configured under the interface name.
C.IP and IPv6 addresses are configured under a unit-number.
D.DLCI numbers, VPI/VCI values, and VLAN tags are physical parameters.
第6题:
A. mode
B. IKE gateway
C. security proposal
D. Perfect Forward Secrecy
第7题:
A. IPsec Routing
B. Access Control
C. IP Address Pool
D. Source Interface
第8题:
A. mode
B. preshared key
C. external interface
D. security proposals
E. dead peer detection settings
第9题:
You need to configure a GRE tunnel on a IPSec router. When you are using the SDM to configurea GRE tunnel over IPsec, which two parameters are required when defining the tunnel interfaceinformation?()
第10题:
Which three parameters are configured in the IKE policy?() (Choose three.)