Which two Phase 1/Phase 2 (P1/P2) proposals would achieve this goal?
You are building an IPsec VPN and want to authenticate and encrypt the content.
Which two Phase 1/Phase 2 (P1/P2) proposals would achieve this goal? (Choose two.)
Which sensor utility is used to decode the contexts of a sequence of packets?
Which sensor utility is used to decode the contexts of a sequence of packets?
Which IKE mode should you use?
You are configuring a VPN with IKE between headquarters and a branch office that uses a dynamic
public IP address. Which IKE mode should you use?
Which sensor command will capture packets on a particular interface?
Which sensor command will capture packets on a particular interface?
Which two statements are true about policy-based VPNs as compared to route-based IPsec VPNs when using ScreenO
Which two statements are true about policy-based VPNs as compared to route-based IPsec VPNs
when using ScreenOS devices? (Choose two.)
What is the function of a compound attack object?
What is the function of a compound attack object?
How does the IDP sensor emulate a honeypot?
How does the IDP sensor emulate a honeypot?
Which IKE feature would you enable?
You want to ensure that the IKE Phase 2 key is totally independent of the IKE Phase 1 key.
Which IKE feature would you enable?
Which two Diffie-Hellman (DH) groups are supported by ScreenOS software?
Which two Diffie-Hellman (DH) groups are supported by ScreenOS software? (Choose two.)
which command will list the status of the IDP processes?
On a sensor, which command will list the status of the IDP processes?