手机扫码访问

导航
您当前的位置:首页 > 计算机 > 计算机认证 > 问题列表
问题:

[单选题]39、 By default, after how many DPD R_U_THERE packets sent without receiving a DPD_R_U_THERE_ACK resp

答案解析

问题:

[单选题]36、 Which of the following protocols are used for the periodic keepalives sent between IKE peers dur

答案解析

问题:

[单选题]What type of packet is sent by a peer across a failover link to detect the operational state of a pe

答案解析

问题:

[单选题]34、 When deploying an HA or VPN load-sharing configuration using the IPsec VPN client software, whic

答案解析

问题:

[单选题]35、 What is the minimum number of cluster members before a cluster can become operational?可使集群工作的集群成

答案解析

问题:

[单选题]32、 Which of the following are available for use when deploying a stateful HA solution for Easy VPN?

答案解析

问题:

[单选题]33、 By default, how many interfaces must be in any state other than UP for a failover to occur?默认情况下

答案解析

问题:

[多选题]30、 Which of the following are available actions used for NetFlow flow information creation? (Choose

答案解析

问题:

[单选题]31、 When deploying an active/standby failover solution for HA requirements, which should you configu

答案解析

问题:

[单选题]28、By default, where is ASA syslog information stored?默认情况下,ASA的系统日志信息存储在哪里?

答案解析

问题:

[单选题]29、 When configuring an AAA server on the ASA, which communication protocol when configured allows f

答案解析

问题:

[单选题]24、 Which of the following are available group policy types on the ASA? (Choose all that apply.)下面的哪

答案解析

问题:

[多选题]25、 Which of the following are legitimate ways to assign a group policy? (Choose all that apply.)下面的

答案解析

问题:

[单选题]26、In what format are the attributes stored in an external group policy?属性以什么格式保存在一个外部的组策略中?

答案解析

问题:

[单选题]27、 Which of the following remote user types are external group policy objects available on? (Choose

答案解析

问题:

[单选题]22、 After receiving a digital certificate from a CA, you import it into the Windows certificate stor

答案解析

问题:

[单选题]23、 When examining a digital certificate for the available OCSP and CRL revocation list locations, i

答案解析

问题:

[单选题]20、 When choosing to implement a one-way certificate-based authentication scheme, which one would yo

答案解析

问题:

[单选题]21、 When configuring your ASA to use more than one NTP server, what parameter decides whether one se

答案解析

问题:

[单选题]18、 Within which field of a digital certificate used for identity reasons would you commonly find a

答案解析

问题:

[多选题]19、 Which of the following are valid certificate revocation list methods? (Choose all that apply.)下面

答案解析

问题:

[单选题]16、Which of the following is not required for a basic Easy VPN configuration?一个基本的Easy VPN配置不需要下面的哪一

答案解析

问题:

[单选题]17、 Which of the following is not classed as an advanced method for controlling VPN client access to

答案解析

问题:

[单选题]14、Which methods are available for client IP address assignment?哪些方法可用于客户端IP地址分配?

答案解析

问题:

[单选题]15、 Which is the preferred method of controlling VPN client access to internal resources?哪一个是控制VPN客户

答案解析

栏目热门
关于我们 | 用户指南 | 版权声明 | 给我留言 | 联系我们 | 积分商城 | 答案求助 | 网站地图
Copyright © 2020 www.daanwo.com All Rights Reserved