多項(xiàng)選擇題Which two mechanisms can be used to detect IPsec GRE tunnel failures?()

A.Dead Peer Detection (DPD)
B.CDP
C.isakmp keepalives
D.GRE keepalive mechanism
E.The hello mechanism of the routing protocol across the IPsec tunnel


您可能感興趣的試卷

你可能感興趣的試題

1.單項(xiàng)選擇題

Refer to the exhibit. Which statement is true about the partial MPLS configuration that is shown?()

A.The route-target both 100:2 command sets import and export route-targets for vrf2.
B.The route-target both 100:2 command changes a VPNv4 route to a IPv4 route.
C.The route-target import 100:1 command sets import route-targets routes specified by the route map.
D.The route-target import 100:1 command sets import route-targets for vrf2 that override the other route-target configuration.

2.單項(xiàng)選擇題

Refer to the exhibit. Which statement is true about the configuration of split tunnels using SDM?()

A.Any protected subnets that are entered represent subnets at the end user’s site that will be accessed without going through the encrypted tunnel.
B.Any protected subnets that are entered represent subnets at the end user’s site that will be accessed through the encrypted tunnel.
C.Any protected subnets that are entered represent subnets at the VPN server site that will be accessed without going through the encrypted tunnel.
D.Any protected subnets that are entered represent subnets at the VPN server site that will be accessedthrough the encrypted tunnel.

3.多項(xiàng)選擇題Which two statements about the Cisco AutoSecure feature are true?()

A.All passwords entered during the AutoSecure configuration must be a minimum of 8 characters in length.
B.Cisco123 would be a valid password for both the enable password and the enable secret commands.
C.The auto secure command can be used to secure the router login as well as the NTP and SSH protocols.
D.For an interactive full session of AutoSecure, the auto secure login command should be used.
E.If the SSH server was configured, the 1024 bit RSA keys are generated after the auto secure commandis enabled.

4.單項(xiàng)選擇題

Refer to the exhibit.

What does the "26" in the first two hop outputs indicate?()

A.the outer label used to determine the next hop
B.the IPv4 label for the destination network
C.the IPv4 label for the forwarding router
D.the IPv4 label for the destination router

5.多項(xiàng)選擇題Which three statements about the Cisco Easy VPN feature are true?()

A.If the VPN server is configured for Xauth, the VPN client waits for a username / password challenge.
B.The Cisco Easy VPN feature only supports transform sets that provide authentication and encryption.
C.The VPN client initiates aggressive mode (AM) if a pre-shared key is used for authentication during the IKE phase 1 process.
D.The VPN client verifies a server username/password challenge by using a AAA authentication server that supports TACACS+ or RADIUS.
E.The VPN server can only be enabled on Cisco PIX Firewalls and Cisco VPN 3000 series concentrators.
F.When connecting with a VPN client,the VPN server must be configured for ISAKMP group 1,2 or 5.

最新試題

Which statement describes Reverse Route Injection (RRI)?()

題型:單項(xiàng)選擇題

Which statement describes the Authentication Proxy feature?()

題型:單項(xiàng)選擇題

Which two statements about the Cisco AutoSecure feature are true?()

題型:多項(xiàng)選擇題

Which three categories of signatures can a Cisco IPS microengine identify?()

題型:多項(xiàng)選擇題

What are two possible actions an IOS IPS can take if a packet in a session matches a signature?()

題型:多項(xiàng)選擇題

Refer to the exhibit.What does the "26" in the first two hop outputs indicate?()

題型:單項(xiàng)選擇題

Refer to the exhibit. MPLS has been configured on all routers in the domain. In order for R2 and R3 to forward frames between them with label headers, what additional configuration will be required on devices that are attached to the LAN segment?()

題型:單項(xiàng)選擇題

Which three techniques should be used to secure management protocols?()

題型:多項(xiàng)選擇題

Which three statements about the Cisco Easy VPN feature are true?()

題型:多項(xiàng)選擇題

What are two steps that must be taken when mitigating a worm attack?()

題型:多項(xiàng)選擇題