Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
338Activity
0 of .
Results for:
No results containing your search query
P. 1
CCNA Security Module 8

CCNA Security Module 8

Ratings:

1.0

(1)
|Views: 16,746 |Likes:
Published by Akbal Larios

More info:

Published by: Akbal Larios on Nov 08, 2009
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as DOC, PDF, TXT or read online from Scribd
See more
See less

04/02/2014

pdf

text

original

 
CCNAS Module 8
 
1
 
Which IPsec protocol should be selected when confidentiality is required?
 
tunnel mode
 
transport mode
 
authentication header encapsulating security payload
 
generic routing encapsulation
 
2
 
When using ESP tunnel mode, which portion of the packet is not authenticated?
 
ESP header 
 
ESP trailer 
 
new IP header 
 
original IP header 
 
3
 
When configuring an IPsec VPN, what is used to define the traffic that is sent through the IPsec tunnel andprotected by the IPsec process?
 
crypto map
 
crypto ACL
 
ISAKMP policyIPsec transform set
 
4
 
 
Refer to the exhibit. Which two IPsec framework components are valid options when configuring an IPsecVPN on a Cisco ISR router? (Choose two.)
 
Integrity options include MD5 and RSA.
 
IPsec protocol options include GRE and AH.
 
Confidentiality options include DES, 3DES, and AES.
 
Authentication options include pre-shared key and SHA.
 
Diffie-Hellman options include DH1, DH2, and DH5.
 
5
 
 
Refer to the exhibit. Based on the SDM screen, which Easy VPN Server component is being configured?
 
group policy
 
transform set
 
IKE proposal
 
user authentication
 
6
 

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->