不定项选择题18. The IP address of a virtual tunnel interface must be configured using which inter face command?为虚拟隧道接口配置IP地址时,必须采用以下哪种接口命令?
不定项选择题 By default
不定项选择题1. Which mechanism provides a scalable multiprotocol tunneling framework with optional dynamic routing?以下哪项技术提供了可扩展的多协议隧道架构,并支持动态路由协议?
不定项选择题20. Which of the following functional planes forwards data through the device and canapply services such as security or QoS to the data as well?哪种功能面负责设备之间的数据转发与服务执行(如安全或QoS)?
不定项选择题 IPsec shared SAs are enabled with what command
不定项选择题22. Which of the following security controls are found in the core layer of the enterprisedeployment model?企业部署模型核心层采用以下哪些安全控制方式?
不定项选择题20. Which of the following EAP types utilizes tunnels to encapsulate EAP traffic?以下哪些EAP采用隧道加密EAP流量?
不定项选择题25. What application allows the management of Cisco security devices in very largeenvironmentsand includes policy-based management?哪种应用具备在超大型网络环境中管理Cisco安全设备的能力,并提供基于策略的管理功能?
不定项选择题 Which command is used to configure static NAT
不定项选择题19. Which field in the EAP flame format is 1 octet and aids in matching responses with requests?在EAP帧中,哪个字段用于响应报文与请求报文之间的匹配,且长度为1字节?
不定项选择题1. Which type of SSL VPN architecture supports any IP application without application modification?以下哪种类型的SSL VPN架构支持所有的IP应用,并目无需对应用进行修改?
不定项选择题 Traffic between zones is only permitted when
不定项选择题3. What provides endpoint authentication for both the client and the server?可以同时为客户端和服务器提供终结点认证的是?
不定项选择题20. Which of the following are valid types of keys when using digitally signed Ciscosoftware?使用数字签名Cisco软件时,以下哪些密钥类型是合法的?
不定项选择题10. Most cryptographic systems fail because of what reason?哪种原因可能导致大部分加密系统失效?
不定项选择题 On the hub
不定项选择题18. Which of the following are supposed AIC protocols? 以下哪些属于AIC支持的协议?
不定项选择题13. What identifies the hardware(computer)as opposed to the user identity that is used to identify users that are logged in to the machine?以下哪种特性用于标识登录到本机的用户的硬件身份(而不是用户身份)?
不定项选择题14. Industry best practices recommend that you use which hash algorithm and DH key length combination for IKE phase 1 policies?配置IKE阶段1策略时,行业中通常建议采用哪种认证算法与DH密钥长度?
不定项选择题2. Which mechanism provides dynamic mutual discovery of spoke devices?以下哪项技术支持分支设备之间的动态发现?
