不定项选择题 After authentication
不定项选择题 To provide per-user services
不定项选择题17. Which is an additional authentication mechanism that can be used in addition to group passwords?除了使用组密码认证以外,以下哪项可以作为额外的认证机制?
不定项选择题22. GET VPNs maintain which aspect of the data packet? GET VPN保留了数据包的哪项内容?
不定项选择题18. Which high-availability scenario provides the highest level of redundancy because it mitigates failures of devices, interfaces, access links, and transport networks? 以下哪种情景提供了最高等级的高可用性,即能够有效规避设备、接口、访问链路和传输网络的故障?
不定项选择题2. Which of the following are valid NAT interface types?以下哪些属于合法的NAT接口类型?
不定项选择题8. Which of the following parts of SAFE defines security mechanisms that secure thenetwork infrastructure itself? SAFE架构在哪一部分定义了保护网络基础设施自身的安全机制?
不定项选择题23. What three Network Foundation Protection deployment models are discussed in this chapter?本章介绍了哪3种NFP部署模型?
不定项选择题20. A list of all certificates that are no longer valid is called which of the following?包含所有无效证书的列表被称为?
不定项选择题15. What can the EZVPN server use to create cryptographic tunnel contexts? (Select all that apply.)EZVPN服务器可以使用哪些内容来创建加密隧道的环境?(选择所有正确的选项)
不定项选择题 To implement a GET VPN over the Internet
不定项选择题17. Where are dynamic point-to-point VTI tunnels deployed?动态点对点VTI隧道应部署在哪种设备上?
不定项选择题 Which 802
不定项选择题4. What is the default action mode for security violations?端口安全违规事件发生之后,端口将进入以下哪种默认状态?
不定项选择题 Which command is used to configure a NAT pool
不定项选择题 How call web authentication be verified
不定项选择题6. Which of the following technologies are used by the monitor action defined by the Security Control Framework?安全控制架构定义的监控行为采用以下哪些技术?
不定项选择题7. Which of the following features were added with Control Plane Protection?控制面保护具备哪些增强特性?
不定项选择题7. The Internet Key Exchange(IKE)protocol communicates over which port?互联网密钥交换(IKE)协议使用哪个端口通信?
不定项选择题6. What are the two different types of VLAN hopping attacks? VLAN跳跃攻击包括哪两种类型?
