Pregunta 1
Pregunta
The three most used protocols in the suite are the following: (Select 3)
Respuesta
-
lnternet Key Exchange (IKE)
-
Encapsulation Security Payload (ESP)
-
Authentication Header (AH)
-
Point – to – Point Tunneling Protocol (PPTP)
-
Secure Sockets Layer (SSL)
Pregunta 2
Pregunta
[blank_start]lnternet Key Exchange (IKE)[blank_end], which does the handshake, tunnel maintenance, and disconnection.
[blank_start]Encapsulation Security Payload (ESP)[blank_end], which ensures data integrity andencryption.
[blank_start]Authentication Header (AH)[blank_end], which offers only data integrity-not encryption.
Respuesta
-
lnternet Key Exchange (IKE)
-
Encapsulation Security Payload (ESP)
-
Authentication Header (AH)
Pregunta 3
Pregunta
FortiGate uses ESP to transport the packet payload and authenticate.
Pregunta 4
Respuesta
-
UDP 500
-
TCP 500
-
UDP 4500
-
TCP 4500
Pregunta 5
Pregunta
IKE uses if NAT-T is enabled in a NAT scenario:
Respuesta
-
UDP port 4500
-
TCP port 4500
-
UDP port 5000
-
TCP port 5000
Pregunta 6
Respuesta
-
Security Association
-
Security Access
Pregunta 7
Pregunta
For phase 1, there are two possible negotiation modes that can be used:
Respuesta
-
main mode
-
aggressive mode
-
quick mode
Pregunta 8
Pregunta
Phase 2 uses only one negotiation mode:
Respuesta
-
quick mode
-
main mode
-
aggressive mode
Pregunta 9
Pregunta
AH is used by FortiGate
Pregunta 10
Respuesta
-
Internet Key Exchange
-
Internal Key Exchange
-
Internal Keep Exchange
Pregunta 11
Respuesta
-
UDP encapsulated
-
TCP encapsulated
Pregunta 12
Pregunta
Authenticates or encrypts packets using the following protocols:
(Select 3)
Respuesta
-
Internet Key Exchange (IKE)
-
Encapsulation Security Payload (ESP)
-
Authentication Header (AH)
-
Point-to-Point Tunneling Protocol (PPTP)
-
Layer 2 Tunneling Protocol (L2TP)
Pregunta 13
Pregunta
Provides both data integrity and encryption:
Respuesta
-
Encapsulation Security Payload (ESP)
-
Internet Key Exchange (IKE)
-
Authentication Header (AH)
Pregunta 14
Pregunta
Easy configuration
Few tunnels
High central bandwidth
Not fault tolerant
Low system requirements on average,
but high for center
Scalable
No direct communication between
spokes
Respuesta
-
Hub-and-Spoke
-
Partial Mesh
-
Full Mesh
Pregunta 15
Pregunta
Moderate configuration
Medium number of tunnels
Medium bandwidth in hub sites
Some fault tolerance
Medium system requirements
Somewhat scalable
Direct communication between some
sites
Respuesta
-
Hub-and-Spoke
-
Partial Mesh
-
Full Mesh
Pregunta 16
Pregunta
Complex configuration
Many tunnels
Low bandwidth
Fault tolerant
High system requirements
Difficult to scale
Direct communication between all sites
Respuesta
-
Hub-and-Spoke
-
Partial Mesh
-
Full Mesh
Pregunta 17
Pregunta
FortiOS provides two options for IPsec VPNs:
route-based (also known as [blank_start]interface-based[blank_end]) or policy-based (also known as [blank_start]tunnel-mode[blank_end]).
Respuesta
-
interface-based
-
tunnel-mode