Which Check Point VPN-1/FireWall-1 VPN solution meets the requirements?

Dr Billis a Security Administrator preparing to implement a VPN solution for his multisite
organization. To comply with industry regulations, Dr King’s VPN solution must meet the following
requirements:
Portability: StandardKey Management: Automatic, External PKISession Keys: Changed at
configured times during a connection’s lifetimeKey Length: No less than 128 bitData Integrity:
Secure against brute force and inversion attacks
Which Check Point VPN-1/FireWall-1 VPN solution meets the requirements?

Dr Billis a Security Administrator preparing to implement a VPN solution for his multisite
organization. To comply with industry regulations, Dr King’s VPN solution must meet the following
requirements:
Portability: StandardKey Management: Automatic, External PKISession Keys: Changed at
configured times during a connection’s lifetimeKey Length: No less than 128 bitData Integrity:
Secure against brute force and inversion attacks
Which Check Point VPN-1/FireWall-1 VPN solution meets the requirements?

A.
IKE VPNs_ AES encryption for IKE Phase 1, AES encryption for Phase 2; SHA1 hash

B.
IKE VPNs: DES encryption for IKE Phase 1, 3DES encryption for Phase 2; MD5 hash

C.
IKE VPNs: AES encryption for IKE Phase 1, DES encryption for Phase 2; SHA1 hash

D.
IKE VPNs: CAST encryption for IKE Phase 1. SHAI encryption for Phase 2: DES hash

E.
IKE VPNs: SHA1 encryption for IKE Phase 1, MD5 encryption for Phase 2; AES hash

Explanation:




Leave a Reply 1

Your email address will not be published. Required fields are marked *