多项选择题
Which two methods of authentication are used by the Infranet Controller for IPSec enforcement?()
A. dial-up VPN
B. IKE authentication
C. XAuth authentication
D. shared IKE authentication
点击查看答案
相关考题
-
单项选择题
When the Infranet Enforcer is set up in transparent mode, which additional resource policy must be configured to use OAC for IPsec enforcement? ()
A. IPsec Routing
B. Access Control
C. IP Address Pool
D. Source Interface -
单项选择题
Which interface does the Infranet Controller use to push the configuration? ()
A. trusted port
B. internal port
C. trust interface
D. untrust interface -
单项选择题
A customer has installed UAC in their network. They have both Windows and Linux endpoints andmust choose a deployment method that everyone can use. Which deployment method allows for multiple platforms? ()
A. IPsec enforcement
B. 802.1X enforcement
C. Source IP enforcement
D. Odyssey Access Client
