1.
Which is NOT part of the configuration of an IKE Phase 1 gateway?
2.
Which item is different when configuring a route-based VPN gateway than a policy-based VPN gateway?
3.
What three (3) are major concerns when sending private data over a public medium?
4.
Which is NOT a component of tunnel interface configuration?
5.
You are looking at the event log of the responding device and it says Rejected an initial Phase 1 packet from an unrecognized peer gateway Which is NOT likely reason for the failure?
6.
You have created your tunnel interface in theUntrustzone. Traffic from the Trust zone is able to enter the tunnel and pass to the destination. However traffic from a different interface in theUntrust zone is not able to pass traffic through the tunnel. You are using a single virtual router. What could be causing this problem?
7.
How is theDiffieHellmankey exchange referred to when it is used in IKE phase 2?
8.
By default, what attack signature group severity level is reported for an attack attempting to crash the system?
9.
While reviewing the config file you see the command "Set attack-db mode check". What is the purpose for this command?
10.
TheNetScreenDeep Inspection function performs analysis and action up to what layer of the OSI model?