• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/12

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

12 Cards in this Set

  • Front
  • Back
5 steps to follow: Step 1
Review the _ and _ _ for Error Messages
System and Security Logs
5 steps to follow: Step 2
Confirm That a _ _ is Established Between the Computers
Security Association
5 steps to follow: Level 3
Ensure That the _ Are Assigned to Both Computers
POlicies
5 steps to follow: Step 4
Ensure that the policies are _ with each other
Compatible
5 steps to follow: Step 5
Ensure That All _ Are _
Changes
Applied
You want to test communications between the workstation and the server - how would you test the connection without IPSEC?
Stop the IP Policy agent via the Services control applet or use the command net stop policyagent
Use _ _to confirm that a security association is established between the computers to ensure that the IPSec policy is in effect.
IPSec Monitor
Use IPSec Monitor to confirm that a _ _ is established between the computers to ensure that the IPSec policy is in effect.
security association
Use _ _ _ _to ensure that the policies have been assigned to both computers.
IP Security Policy Management
Use IP Security Policy Management to _ the _ on both computers and ensure that the policies are _ with each other.
review
policies
compatible
Restart the IPSec _ _ to ensure that all changes that you have made are applied.
Security Monitor
You are receiving complaints from users about authentication problems on the network. You suspect authentication or security association failures, possibly indicating incompatible security policy settings. What would you use to confirm that this is the case?


A) Security logs.


B) IPSec Monitor.


C) IP Security Policy Management.


D) IPSec Security Monitor.
B. Use IPSEC Monitor to verify the SA