CCSP Cisco Secure PIX Firewall Advanced Exam Certification Guide, Second Edition [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

CCSP Cisco Secure PIX Firewall Advanced Exam Certification Guide, Second Edition [Electronic resources] - نسخه متنی

Greg Bastien; Earl Carter; Christian Degu

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید












  • Chapter 11



    "Do I Know This Already?" Quiz


    A1:

    Answer: d

    A2:

    Answer: c

    A3:

    Answer: e

    A4:

    Answer: d

    A5:

    Answer: c

    A6:

    Answer: b

    A7:

    Answer: e

    A8:

    Answer: c

    A9:

    Answer: d

    A10:

    Answer: b


    Q&A


    A1:

    Answer: The session keys are manually coded and never change.

    A2:

    Answer: Access VPNs require VPN client software on the remote machine and intranet VPNs do not.

    A3:

    Answer: SHA-1

    A4:

    Answer: By IP address or host name

    A5:

    Answer: They will not be able to negotiate the connection.

    A6:

    Answer: isakmp policy

    A7:

    Answer: 86,400 seconds

    A8:

    Answer: No, the peers will continue to go through the transforms until they find a match. If there is no match, they will be unable to negotiate the connection.

    A9:

    Answer: isakmp lifetime initiates a renegotiation of IKE based on time only; the crypto map lifetime initiates a renegotiation of the IPSec SA based on time or the amount of traffic the passes through the connection (in kilobytes).

    A10:

    Answer: clear crypto isakmp sa

    A11:

    Answer: isakmp key string address peer-address netmask peer netmask

    A12:

    Answer: You should verify connectivity prior to attempting to establish the VPN. If you have connectivity but cannot establish the VPN, you should verify that the configuration of the peers matches.

    A13:

    Answer: crypto map map-name seq-num match address acl-name

    A14:

    Answer: AH does only header authentication; ESP can perform authentication of the header and the data as well as encryption.


    • / 191