更多“Which of the following encryption methods is often used along with L2TP?()A、S/MIMEB、SSHC、3DESD、IPSec”相关问题
  • 第1题:

    Which of the following protocols would MOST likely be used in the establishment of an IPSec VPN tunnel?()

    A. AES

    B. TKIP

    C. 802.1q

    D. ISAKMP


    参考答案:A

  • 第2题:

    WhichofthefollowingencryptionmethodsisoftenusedalongwithL2TP?()

    A.S/MIME

    B.SSH

    C.3DES

    D.IPSec


    参考答案:D

  • 第3题:

    Which of the following best describes a hash function?()

    • A、An irreversible fast encryption method
    • B、A reversible fast encryption method
    • C、A reversible value computed from a piece of data and used to detect modifications
    • D、An irreversible value computed froma piece of data and used to detect modifications
    • E、A table inwhich values are stored for efficient retrieval.

    正确答案:D

  • 第4题:

    Which of the following protocols would MOST likely be used in the establishment of an IPSec VPN tunnel?()

    • A、 AES 
    • B、 TKIP
    • C、 802.1q
    • D、 ISAKMP

    正确答案:D

  • 第5题:

    Which of the following backup methods should be used nightly to ensure backups capture all necessary data in the LEAST amount of time?()

    • A、 Daily
    • B、 Incremental
    • C、 Normal
    • D、 Differential

    正确答案:B

  • 第6题:

    Which of the following tools can be used to securely connect to a remote system?()

    • A、RCMD
    • B、SSH
    • C、TELNET
    • D、HTTP

    正确答案:B

  • 第7题:

    Which two methods of authentication are used by the Infranet Controller for IPSec enforcement?()

    • A、dial-up VPN
    • B、IKE authentication
    • C、XAuth authentication
    • D、shared IKE authentication

    正确答案:A,C

  • 第8题:

    Which two secure remote access methods are available on the WX platforms?() (Choose two.)

    • A、SSL
    • B、SSH
    • C、Telnet
    • D、HTTP

    正确答案:A,B

  • 第9题:

    单选题
    Which of the following tools should be used to report current network status and is often used to check the reliability of a network?()
    A

     netpmon

    B

     netstat

    C

     nfsstat

    D

     vmstat


    正确答案: B
    解析: 暂无解析

  • 第10题:

    单选题
    Which of the following protocols would MOST likely be used in the establishment of an IPSec VPN tunnel?()
    A

     AES 

    B

     TKIP

    C

     802.1q

    D

     ISAKMP


    正确答案: A
    解析: 暂无解析

  • 第11题:

    单选题
    Which of the following encryption methods is often used along with L2TP?()
    A

    S/MIME

    B

    SSH

    C

    3DES

    D

    IPSec


    正确答案: B
    解析: 暂无解析

  • 第12题:

    单选题
    Which of the following best describes a hash function?()
    A

    An irreversible fast encryption method

    B

    A reversible fast encryption method

    C

    A reversible value computed from a piece of data and used to detect modifications

    D

    An irreversible value computed froma piece of data and used to detect modifications

    E

    A table inwhich values are stored for efficient retrieval.


    正确答案: D
    解析: 暂无解析

  • 第13题:

    Which of the following is used to identify active hosts along with their network addresses?()

    A.Port scan

    B.Ping sweep

    C.IDS

    D.NIPS


    参考答案:B

  • 第14题:

    Which two wireless encryption methods are based on the RC4 encryption algorithm?()

    A.WEP

    B.CCKM

    C.AES

    D.TKIP

    E.CCMP


    参考答案:A, D

  • 第15题:

    Which two wireless encryption methods are based on the RC4 encryption algorithm? ()

    • A、WEP
    • B、CCKM
    • C、AES
    • D、TKIP
    • E、CCMP

    正确答案:A,D

  • 第16题:

    Which of the following is used to identify active hosts along with their network addresses?()

    • A、Port scan
    • B、Ping sweep
    • C、IDS
    • D、NIPS

    正确答案:B

  • 第17题:

    Which of the following protocols would MOST likely be used in the establishment of an IPSec VPN tunnel?()

    • A、AES
    • B、TKIP
    • C、802.1q
    • D、ISAKMP

    正确答案:A

  • 第18题:

    Which of the following tools should be used to report current network status and is often used to check the reliability of a network?()

    • A、 netpmon
    • B、 netstat
    • C、 nfsstat
    • D、 vmstat

    正确答案:B

  • 第19题:

    Which encryption type is used to secure user data in an IPsec tunnel?()

    • A、symmetric key encryption
    • B、asymmetric key encryption
    • C、RSA
    • D、digital certificates

    正确答案:A

  • 第20题:

    单选题
    Which of the following methods is normally used to lubricate bearings in a small high-speed diesel engine?()
    A

    Splash lubrication

    B

    Pressure lubrication

    C

    Sight feed lubricators

    D

    Mechanical lubricators


    正确答案: B
    解析: 暂无解析

  • 第21题:

    多选题
    Which two wireless encryption methods are based on the RC4 encryption algorithm?()
    A

    WEP

    B

    CCKM

    C

    AES

    D

    TKIP

    E

    CCMP


    正确答案: E,C
    解析: 暂无解析

  • 第22题:

    单选题
    Which of the following is used by BitLocker to lock an encryption key and protect data?()
    A

    ECP

    B

    IRQ

    C

    AGP

    D

    TPM


    正确答案: D
    解析: 暂无解析

  • 第23题:

    单选题
    Which of the following methods might be used as the treatment on emulsified oil?()
    A

    gravity separation

    B

    centrifuge

    C

    Cyclone

    D

    Cross-flow membrane filtration


    正确答案: B
    解析: 暂无解析