A Clean-up rule is used to:
A Clean-up rule is used to:
Which of the following is TRUE concerning control connections between the Security Management Server and the G
Which of the following is TRUE concerning control connections between the Security Management Server and the Gateway in a VPN Community? Control Connections are:
A Stealth rule is used to:
A Stealth rule is used to:
What happens in relation to the CRL cache after a cpstop and cpstart have been initiated?
What happens in relation to the CRL cache after a cpstop and cpstart have been initiated?
When you hide a rule in a Rule Base, how can you then disable the rule?
When you hide a rule in a Rule Base, how can you then disable the rule?
What is the most appropriate setting to comply with these requirements?
Multi-Corp must comply with industry regulations in implementing VPN solutions among multiple sites. The corporate Information Assurance policy defines the following requirements:
What is the most appropriate setting to comply with these requirements?
Portability Standard
Key management Automatic, external PKI
Session keys changed at configured times during a connection’s lifetime
Key length No less than 128-bit
Data integrity Secure against inversion and brute-force attacks
What is the most appropriate setting to comply with theses requirements?
Which item below in a Security Policy would be enforced first?
[tagged]
Which item below in a Security Policy would be enforced first?
Why are certificates preferred over pre-shared keys in an IPsec VPN?
Why are certificates preferred over pre-shared keys in an IPsec VPN?
What are the two basic rules which should be used by all Security Administrators?
What are the two basic rules which should be used by all Security Administrators?
Why is this a problematic setup?
Your manager requires you to setup a VPN to a new business partner site. The administrator from the partner site gives you his VPN settings and you notice that he setup AES 128 for IKE phase 1 and AES 256 for IKE phase 2. Why is this a problematic setup?