</p> C:\> nslookup
. L: \) J; z3 ^0 |- B8 e, S Default Server: nameserver1.domain.com0 t$ s# T, Z3 |! ?5 K+ F
Address: 10.0.0.1* z' B. q6 K" o) |) l
>
1 P4 L) J, ?: A% u f' V参考资料:$ r& I& s7 i( ~4 P7 w! z, S
MCSE Trainking Kit -- Microsoft Windows 2000 Network Infrasturucture Administration -- Chapter8 Using the Windows 2000 DNS Server-- Lesson 5 :Monitoring and Troubleshooting DNS( y% _' C% m A, d, ^3 ?
Internet密钥交换鉴别方法
8 X' T* ^. M6 U+ w( s问题:
6 e5 q- L8 U7 `; B0 r/ s$ }0 H% x7 a$ ~9 L @- C) I- w
You are working as a network administrator.You know that Internet Key Exchange (IKE) is the new term for ISAKMP/Oakley.But what are the tree authentication methods you can use with IKE?
: A _' @4 y8 H+ k5 {A.IPSec AH
+ C3 C7 T: {# `B.IPSec ESP2 c. P* W2 Y$ [( j& |$ r
C.Kerberos
+ t) c k) D1 H: A; \4 p6 uD.Pre-shared key" a8 M& C3 k, V: a4 ~: h8 X
E.X.509 Certificates8 @# W) D4 G% F4 R
F.NTLM) s/ ~/ `* I) I7 X. U6 R. o
K |& @2 Q2 U( i
Select the 3 best answers
" Q D+ Y# @% P- w4 Y0 {- H可以借助IKE使用的三种鉴别方法是什么?# f: w0 F! d2 p4 K6 O! z6 U
解答:6 b" j0 W5 g& V, y# d
·Kerberos V5! ]) N. b; l# F% |* Y0 A
·X.509 Version3 证书
! |: `) J6 k, |# E4 M·预共享密钥(Pre-shared key) 9 R* _$ A1 a) W' @+ w, H" s2 A
n0 _* G# |3 Q6 t) ~/ k
正确答案:CDE
$ A% P4 I6 |% F. Z0 }1 V% l. \参考资料:
! T3 ^- _7 k+ W) s% I1 g/ aMSEE Training Kit -- Microsoft Windows 2000 Network Infrastructure Administration -- Chapter 10 Securing Network Protocoles |