JN0-140

多选题Which two methods of authentication are used by the Infranet Controller for IPSec enforcement?()Adial-up VPNBIKE authenticationCXAuth authenticationDshared IKE authentication

题目
多选题
Which two methods of authentication are used by the Infranet Controller for IPSec enforcement?()
A

dial-up VPN

B

IKE authentication

C

XAuth authentication

D

shared IKE authentication

如果没有搜索结果,请直接 联系老师 获取答案。
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which two methods of authentication are used by the Infranet Controller for IPSec enforcement?()

A. dial-up VPN

B. IKE authentication

C. XAuth authentication

D. shared IKE authentication


参考答案:A, C

第2题:

Which two primary port authentication protocols are used with VSANs?()

  • A、SPAP
  • B、CHAP
  • C、DHCHAP
  • D、ESP

正确答案:B,C

第3题:

Which two external authentication methods are supported by the Junos OS for user authentication?()

A. RADIUS

B. KERBEROS

C. IPsec

D. TACACS+


参考答案:A, D

第4题:

IPSec中定义密钥交换的协议是()。

  • A、IKE(internet key exhcnage)
  • B、PAP(password authentication protocol)
  • C、CHAP(challenge handshake authentication protocol)
  • D、ESP(encapsulation seurity payload)

正确答案:A

第5题:

What is not a difference between VPN tunnel authentication and per-user authentication?()

  • A、VPN tunnel authentication is part of the IKE specification. 
  • B、VPN tunnel authentication does not control which end user can use the IPSec SA (VPN tunnel).
  • C、User authentication is used to control access for a specific user ID, and can be used with or without a VPN tunnel for network access authorization. 
  • D、802.1X with EAP-TLS (X.509 certificates) can be used to authenticate an IPSec tunnel.

正确答案:D

第6题:

In a PPP over ATM environment,which two PPP authentication methods are supported by the ERX Edge Router?()

A.IKE

B.PAP

C.CHAP

D.MSCHAP


参考答案:B, C

第7题:

IPSec VPN is a widely-acknowledged solution for enterprise network. Which three IPsec VPNstatements are true?()

  • A、IKE keepalives are unidirectional and sent every ten seconds
  • B、IPsec uses the Encapsulating Security Protocol (ESP) or the Authentication Header (AH)protocol for exchanging keys
  • C、To establish IKE SA, main mode utilizes six packets while aggressive mode utilizes only threepackets
  • D、IKE uses the Diffie-Hellman algorithm to generate symmetrical keys to be used by IPsec peers

正确答案:A,C,D

第8题:

Which action is optional when adding an authentication realm for use on an Infranet Controller? ()

A. Modify sign-in policy.

B. Configure role mapping.

C. Assign authentication server.

D. Configure authentication policy.


参考答案:D

第9题:

Which two commands can be used to monitor firewall user authentication?()

  • A、show access firewall-authentication
  • B、show security firewall-authentication users
  • C、show security audit log
  • D、show security firewall-authentication history

正确答案:B,D

第10题:

Which two external authentication methods are supported by the Junos OS for user authentication?()

  • A、RADIUS
  • B、KERBEROS
  • C、IPsec
  • D、TACACS+

正确答案:A,D

更多相关问题