What are the three default IPSec policies in Windows Server 2003?
In your current organization, you have been given the task of implementing the IPSec solution. All your servers are running Windows Server 2003, so you wish to use the built in policies. What are the three default IPSec policies in Windows Server 2003?
which implementation would meet your needs?
If you wish to implement IPSec between two branch offices of your organization, and wish for this to include the encryption of the full packet, which implementation would meet your needs?
Which of the following describes what transport and tunnel modes protect using IPSec?
You are designing a new IPSec implementation for your organization, and are trying to determine your security needs. You need to clearly understand the implementation choices, before you make any changes to the network. Which of the following describes what transport and tunnel modes protect using IPSec?
When you look into IP, what protocol ID would IP identify with AH?
During an analysis of your IPSec implementation, you capture traffic with Network Monitor. You are verifying that IP is properly identifying AH. When you look into IP, what protocol ID would IP identify with AH?
What are these three default options?
You are configuring a new custom IPSec policy on your Windows Server 2003 machine. On the rules tab, you find the three default options under the IP Filter List. What are these three default options?
Which of the following answers presents a legitimate combination for encryption and integrity in the IPSec pol
As you analyze the settings of the Secure Server (Require Security) IPSec policy in Windows Server 2003, you are looking at the options available for encryption and integrity. Which of the following answers presents a legitimate combination for encryption and integrity in the IPSec policy?
Which of the following benefits does L2TP (with IPSec) provide?
You are configuring a L2TP solution between your office and your primary branch office. The CEO has requested a report on the benefits of using this technology. Which of the following benefits does L2TP (with IPSec) provide?
Based on this configuration, and using the exhibit, select the answers that identify how the router will deal
You are configuring the Access Lists for your new Cisco Router. The following are the commands that are entered into the router for the list configuration.
Router(config)#access-list 171 permit tcp 10.10.0.0 0.0.255.255 any eq 80
Router(config)#access-list 171 deny tcp 0.0.0.0 255.255.255.255 10.10.0.0 0.0.255.255 eq 80
Router(config)#access-list 171 deny tcp any any eq 23
Router(config)#access-list 171 permit tcp 10.10.0.0 0.0.255.255 any eq 20
Router(config)# access-list 171 permit tcp 10.10.0.0 0.0.255.255 any eq 21
Based on this configuration, and using the exhibit, select the answers that identify how the router will deal with network traffic.
Based on this configuration, and using the exhibit, select the answers that identify what the list will accomp
You are configuring the Access Lists for your new Cisco Router. The following are the commands that are entered into the router for the list configuration.
Router(config)#access-list 131 deny tcp 10.10.0.0 0.0.255.255 0.0.0.0 255.255.255.255 eq 23 Router(config)#access-list 131 permit ip 0.0.0.0 255.255.255.255 0.0.0.0 255.255.255.255 Router(config)#interface Serial 0
Router(config-if)#ip access-group 131 out
Based on this configuration, and using the exhibit, select the answers that identify what the list will accomplish.
From the following, select all the access list statements that are required to make this possible
The exhibit shows a router with three interfaces E0, E1 and S0. Interfaces E0 and E1 are connected to internal networks 192.168.10.0 and 192.168.20.0 respectively and interface S0 is connected to the Internet.
The objective is to allow host 192.168.10.7 access to the Internet via ftp and deny access to the Internet to everyone else while allowing them to access resources amongst themselves. From the following, select all the access list statements that are required to make this possible.