不定项选择题 Traffic between zones is only permitted when
不定项选择题3. What provides endpoint authentication for both the client and the server?可以同时为客户端和服务器提供终结点认证的是?
不定项选择题20. Which of the following are valid types of keys when using digitally signed Ciscosoftware?使用数字签名Cisco软件时,以下哪些密钥类型是合法的?
不定项选择题10. Most cryptographic systems fail because of what reason?哪种原因可能导致大部分加密系统失效?
不定项选择题 On the hub
不定项选择题18. Which of the following are supposed AIC protocols? 以下哪些属于AIC支持的协议?
不定项选择题13. What identifies the hardware(computer)as opposed to the user identity that is used to identify users that are logged in to the machine?以下哪种特性用于标识登录到本机的用户的硬件身份(而不是用户身份)?
不定项选择题14. Industry best practices recommend that you use which hash algorithm and DH key length combination for IKE phase 1 policies?配置IKE阶段1策略时,行业中通常建议采用哪种认证算法与DH密钥长度?
不定项选择题2. Which mechanism provides dynamic mutual discovery of spoke devices?以下哪项技术支持分支设备之间的动态发现?
不定项选择题 After authentication
不定项选择题 To provide per-user services
不定项选择题17. Which is an additional authentication mechanism that can be used in addition to group passwords?除了使用组密码认证以外,以下哪项可以作为额外的认证机制?
不定项选择题22. GET VPNs maintain which aspect of the data packet? GET VPN保留了数据包的哪项内容?
不定项选择题18. Which high-availability scenario provides the highest level of redundancy because it mitigates failures of devices, interfaces, access links, and transport networks? 以下哪种情景提供了最高等级的高可用性,即能够有效规避设备、接口、访问链路和传输网络的故障?
不定项选择题2. Which of the following are valid NAT interface types?以下哪些属于合法的NAT接口类型?
不定项选择题8. Which of the following parts of SAFE defines security mechanisms that secure thenetwork infrastructure itself? SAFE架构在哪一部分定义了保护网络基础设施自身的安全机制?
填空题22. An ______ is a piece of information that binds a PKI member's name to its public key and puts it into a standard format. ______是一种遵循标准格式的信息块,它绑定了PKI成员的公钥与名字。
填空题8. A VPN technology that supports ______ must be chosen if the transport network does not route internal VPN address spaces. 如果传输网络不支持内部地址路由,则必须选择支持______的VPN技术。
填空题9. In the case of redundant DMVPNs with multiple GRE tunnels establishing between the same spokes, it is necessary to use ______ for IPsec SAs to establish properly. 在冗余的DMVPN解决方案中,由于分支之间可能建立多条GRE隧道,因此你应当使用______来优化IPSec SA的数量。
填空题12. A good disaster recovery plan must include contingencies for both ______ and ______ security breaches. 一份完备的灾难恢复计划必须同时考虑______与______两个方面的安全突发事件。