The three most used protocols in the suite are the following: (Select 3)
Respuesta
lnternet Key Exchange (IKE)
Encapsulation Security Payload (ESP)
Authentication Header (AH)
Point – to – Point Tunneling Protocol (PPTP)
Secure Sockets Layer (SSL)
Pregunta 2
Pregunta
[blank_start]lnternet Key Exchange (IKE)[blank_end], which does the handshake, tunnel maintenance, and disconnection.
[blank_start]Encapsulation Security Payload (ESP)[blank_end], which ensures data integrity andencryption.
[blank_start]Authentication Header (AH)[blank_end], which offers only data integrity-not encryption.
Respuesta
lnternet Key Exchange (IKE)
Encapsulation Security Payload (ESP)
Authentication Header (AH)
Pregunta 3
Pregunta
FortiGate uses ESP to transport the packet payload and authenticate.
Respuesta
True
False
Pregunta 4
Pregunta
IKE uses port
Respuesta
UDP 500
TCP 500
UDP 4500
TCP 4500
Pregunta 5
Pregunta
IKE uses if NAT-T is enabled in a NAT scenario:
Respuesta
UDP port 4500
TCP port 4500
UDP port 5000
TCP port 5000
Pregunta 6
Pregunta
SA
Respuesta
Security Association
Security Access
Pregunta 7
Pregunta
For phase 1, there are two possible negotiation modes that can be used:
Respuesta
main mode
aggressive mode
quick mode
Pregunta 8
Pregunta
Phase 2 uses only one negotiation mode:
Respuesta
quick mode
main mode
aggressive mode
Pregunta 9
Pregunta
AH is used by FortiGate
Respuesta
True
False
Pregunta 10
Pregunta
IKE
Respuesta
Internet Key Exchange
Internal Key Exchange
Internal Keep Exchange
Pregunta 11
Pregunta
ESP is
Respuesta
UDP encapsulated
TCP encapsulated
Pregunta 12
Pregunta
Authenticates or encrypts packets using the following protocols:
(Select 3)
Respuesta
Internet Key Exchange (IKE)
Encapsulation Security Payload (ESP)
Authentication Header (AH)
Point-to-Point Tunneling Protocol (PPTP)
Layer 2 Tunneling Protocol (L2TP)
Pregunta 13
Pregunta
Provides both data integrity and encryption:
Respuesta
Encapsulation Security Payload (ESP)
Internet Key Exchange (IKE)
Authentication Header (AH)
Pregunta 14
Pregunta
Easy configuration
Few tunnels
High central bandwidth
Not fault tolerant
Low system requirements on average,
but high for center
Scalable
No direct communication between
spokes
Respuesta
Hub-and-Spoke
Partial Mesh
Full Mesh
Pregunta 15
Pregunta
Moderate configuration
Medium number of tunnels
Medium bandwidth in hub sites
Some fault tolerance
Medium system requirements
Somewhat scalable
Direct communication between some
sites
Respuesta
Hub-and-Spoke
Partial Mesh
Full Mesh
Pregunta 16
Pregunta
Complex configuration
Many tunnels
Low bandwidth
Fault tolerant
High system requirements
Difficult to scale
Direct communication between all sites
Respuesta
Hub-and-Spoke
Partial Mesh
Full Mesh
Pregunta 17
Pregunta
FortiOS provides two options for IPsec VPNs:
route-based (also known as [blank_start]interface-based[blank_end]) or policy-based (also known as [blank_start]tunnel-mode[blank_end]).