CCSP Cisco Secure PIX Firewall Advanced Exam Certification Guide, Second Edition [Electronic resources]

Greg Bastien; Earl Carter; Christian Degu

نسخه متنی -صفحه : 191/ 155
نمايش فراداده

  • Chapter 11

    "Do I Know This Already?" Quiz

    A1:

    Answer: d

    A2:

    Answer: c

    A3:

    Answer: e

    A4:

    Answer: d

    A5:

    Answer: c

    A6:

    Answer: b

    A7:

    Answer: e

    A8:

    Answer: c

    A9:

    Answer: d

    A10:

    Answer: b

    Q&A

    A1:

    Answer: The session keys are manually coded and never change.

    A2:

    Answer: Access VPNs require VPN client software on the remote machine and intranet VPNs do not.

    A3:

    Answer: SHA-1

    A4:

    Answer: By IP address or host name

    A5:

    Answer: They will not be able to negotiate the connection.

    A6:

    Answer: isakmp policy

    A7:

    Answer: 86,400 seconds

    A8:

    Answer: No, the peers will continue to go through the transforms until they find a match. If there is no match, they will be unable to negotiate the connection.

    A9:

    Answer: isakmp lifetime initiates a renegotiation of IKE based on time only; the crypto map lifetime initiates a renegotiation of the IPSec SA based on time or the amount of traffic the passes through the connection (in kilobytes).

    A10:

    Answer: clear crypto isakmp sa

    A11:

    Answer: isakmp key string address peer-address netmask peer netmask

    A12:

    Answer: You should verify connectivity prior to attempting to establish the VPN. If you have connectivity but cannot establish the VPN, you should verify that the configuration of the peers matches.

    A13:

    Answer: crypto map map-name seq-num match address acl-name

    A14:

    Answer: AH does only header authentication; ESP can perform authentication of the header and the data as well as encryption.