多项选择题
A. dial-up VPN
B. IKE authentication
C. XAuth authentication
D. shared IKE authentication
单项选择题 When the Infranet Enforcer is set up in transparent mode, which additional resource policy must be configured to use OAC for IPsec enforcement? ()
单项选择题 Which interface does the Infranet Controller use to push the configuration? ()
单项选择题 A customer has installed UAC in their network. They have both Windows and Linux endpoints andmust choose a deployment method that everyone can use. Which deployment method allows for multiple platforms? ()