What are two benefits of using IKEv2 instead of IKEv1 when deploying remote-access IPsec VPNs?
What are two benefits of using IKEv2 instead of IKEv1 when deploying remote-access
IPsec VPNs? (Choose two.)
which security limitation of DNS?
DNSSEC was designed to overcome which security limitation of DNS?
Which SSL protocol takes an application message to be transmitted, fragments the data…?
Which SSL protocol takes an application message to be transmitted, fragments the data
into manageable blocks, optionally compresses the data, applies a MAC, encrypts, adds
a header, and transmits the resulting unit in a TCP segment?
which three options?
IPsec SAs can be applied as a security mechanism for which three options? (Choose
three.)
Which four options are valid EAP mechanisms to be used with WPA2?
Which four options are valid EAP mechanisms to be used with WPA2? (Choose four.)
Which three statements are true about the SSH protocol?
Which three statements are true about the SSH protocol? (Choose three.)
Which two statements are true when comparing ESMTP and SMTP?
Which two statements are true when comparing ESMTP and SMTP? (Choose two.)
How does a DHCP client request its previously used IP address in a DHCP DISCOVER packet?
How does a DHCP client request its previously used IP address in a DHCP DISCOVER
packet?
Which two statements about an authoritative server in a DNS system are true?
Which two statements about an authoritative server in a DNS system are true? (Choose
two.)
Which three security features were introduced with the SNMPv3 protocol?
Which three security features were introduced with the SNMPv3 protocol? (Choose
three.)