A.show ike security-associations B.show ipsec security-associations C.show security ike security-associations D.show security ipsec security-associations
多项选择题RegardinganIPsecsecurityassociation(SA),whichtwostatementsaretrue?()
A.IKE SA is bidirectional. B.IPsec SA is bidirectional. C.IKE SA is established during phase 2 negotiations. D.IPsec SA is established during phase 2 negotiations.
多项选择题WhichtwoparametersareconfiguredinIPsecpolicy?()
A.mode B.IKE gateway C.security proposal D.Perfect Forward Secrecy
多项选择题WhichthreeparametersareconfiguredintheIKEpolicy?()
A.mode B.preshared key C.external interface D.security proposals E.dead peer detection settings
多项选择题WhichtwostatementsabouttheDiffie-Hellman(DH)keyexchangeprocessarecorrect?()
A.In the DH key exchange process, the session key is never passed across the network. B.In the DH key exchange process, the public and private keys are mathematically related using the DH algorithm. C.In the DH key exchange process, the session key is passed across the network to the peer for confirmation. D.In the DH key exchange process, the public and private keys are not mathematically related, ensuring higher security
多项选择题Whichtwostatementsregardingasymmetrickeyencryptionaretrue?()
A.The same key is used for encryption and decryption. B.It is commonly used to create digital certificate signatures. C.It uses two keys: one for encryption and a different key for decryption. D.An attacker can decrypt data if the attacker captures the key used for encryption