Which key method is used to detect and prevent attacks by use of IDS and/or IPS technologies?()
第1题:
Which of the following is a key component of a directory services server?()
第2题:
Which statement describes the UTM licensing model?()
第3题:
Which two statements are true about the primary key constraint in a table? ()
第4题:
Only symmetric algorithms have a key exchange technology built in
Asymmetric algorithms are used quite often as key exchange protocols for symmetricalgorithms
Only asymmetric algorithms have a key exchange technology built in
Asymmetric algorithms are based on more complex mathematical computations
第5题:
symmetric key encryption
asymmetric key encryption
RSA
digital certificates
第6题:
PARTITION BY HASH and ORGANIZE BY
PARTITION BY RANGE and ORGANIZE BY KEY SEQUENCE
PARTITION BY HASH and ORGANIZE BY KEY SEQUENCE
PARTITION BY RANGE and ORGANIZE BY
第7题:
It is not possible to disable the primary key constraint.
It is possible to have more than one primary key constraint in a single table.
The primary key constraint can be referred by only one foreign key constraint.
The primary key constraint can be imposed by combining more than one column.
The non-deferrable primary key constraint creates an unique index on the primary key column if it is not already indexed.
第8题:
A session key value is exchanged across the network.
A session key never passes across the network.
A session key is used as the key for asymmetric data encryption.
A session key is used as the key for symmetric data encryption.
第9题:
In the DH key exchange process, the session key is never passed across the network.
In the DH key exchange process, the public and private keys are mathematically related using the DH algorithm.
In the DH key exchange process, the session key is passed across the network to the peer for confirmation.
In the DH key exchange process, the public and private keys are not mathematically related, ensuring higher security
第10题:
Which two statements about the Diffie-Hellman (DH) key exchange process are correct?()
第11题:
Which two statements regarding asymmetric key encryption are true?()
第12题:
Which two statements are true about a bitmap index? ()
第13题:
A
B
C
D
第14题:
It is recommended for the columns that have unique values.
It can be converted to a B-tree index by using the ALTER INDEX command.
It has a bitmap segment for each distinct value in the key column, containing a string of bits in which each bit represents the presence or absence of a key column value.
Updating the key column locks the whole bitmap segment that contains the bit for the key value to be updated.
第15题:
ECP
IRQ
AGP
TPM
第16题:
The same key is used for encryption and decryption.
It is commonly used to create digital certificate signatures.
It uses two keys: one for encryption and a different key for decryption.
An attacker can decrypt data if the attacker captures the key used for encryption.
第17题:
In the DH key exchange process, the session key is never passed across the network.
In the DH key exchange process, the public and private keys are mathematically related using the DH algorithm.
In the DH key exchange process, the session key is passed across the network to the peer for confirmation.
In the DH key exchange process, the public and private keys are not mathematically related, ensuring higher security
第18题:
UNIQUE
NOT NULL
CHECK
PRIMARY KEY
FOREIGN KEY