单项选择题
A. an ACE server B. a wireless network C. an Ethernet switch D. Odyssey Access Client
Which two methods of authentication are used by the Inf...
多项选择题Which two methods of authentication are used by the Infranet Controller for IPSec enforcement?()
A. dial-up VPN B. IKE authentication C. XAuth authentication D. shared IKE authentication
When the Infranet Enforcer is set up in transparent mod...
单项选择题When the Infranet Enforcer is set up in transparent mode, which additional resource policy must be configured to use OAC for IPsec enforcement? ()
A. IPsec Routing B. Access Control C. IP Address Pool D. Source Interface
Which interface does the Infranet Controller use to pus...
单项选择题Which interface does the Infranet Controller use to push the configuration? ()
A. trusted port B. internal port C. trust interface D. untrust interface