Which of the following attributes are exchanged in IKEv1 phase 1?
A. Encryption algorithms
B. Hashing algorithms
C. Diffie-Hellman groups
D. Vendor-specific attributes
Which of the following hashing algorithms are used in IPsec?
A. AES 192
B. AES 256
C. Secure Hash Algorithm (SHA)
D. Message Digest Algorithm 5 (MD5)
In IKEv1 phase 2, each security association (SA) is assigned which of the following?
A. A unique security parameter index (SPI) value
B. An IP address
C. The DNS server IP address
D. A public key
Which of the following statements is true about clientless SSL VPN?
A. The client must use a digital certificate to authenticate.
B. The remote client needs only an SSL-enabled web browser to access resources on the private network of the security appliances.
C. Clientless SSL VPNs do not provide the same level of encryption as client based SSL VPNs.
D. Clientless SSL VPN sessions expire every hour.
Which of the following are some of the commonly used SSL VPN technologies?
A. Tor browser
B. Reverse proxy technology
C. Port-forwarding technology and smart tunnels
D. SSL VPN tunnel client (such as the AnyConnect Secure Mobility Client)
Why can't ESP packets be transferred by NAT devices?
A. Because ESP packets are too big to handle.
B. Because the ESP protocol does not have any ports like TCP or UDP.
C. Because ESP packets are encrypted.
D. ESP is supported in NAT devices.
What is the difference between IPsec tunnel and transport mode?
A. Tunnel mode uses encryption and transport mode uses TCP as the transport protocol.
B. Tunnel mode uses encryption and transport mode uses UDP as the transport protocol.
C. Transport mode protects upper-layer protocols, such as UDP and TCP, and tunnel mode protects the entire IP packet.
D. Tunnel mode protects upper-layer protocols, such as UDP and TCP, and transport mode protects the entire IP packet
Which of the following are examples of symmetric encryption algorithms?
A. AES
B. IDEA
C. Diffie-Hellman
D. MD5
Which of the following are examples of asymmetric encryption algorithms?
A. AES
B. SHA
C. Diffie-Hellman
D. RSA
Which of the following are examples of hashing algorithms?
A. SHA
B. AES
C. MD5
D. RC4
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Cisco exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 210-250 exam preparations and Cisco certification application, do not hesitate to visit our Vcedump.com to find your solutions here.