Which of the following encryption methods is often used along with L2TP?()
第1题:
A. AES
B. TKIP
C. 802.1q
D. ISAKMP
第2题:
A.S/MIME
B.SSH
C.3DES
D.IPSec
第3题:
Which of the following best describes a hash function?()
第4题:
Which of the following protocols would MOST likely be used in the establishment of an IPSec VPN tunnel?()
第5题:
Which of the following backup methods should be used nightly to ensure backups capture all necessary data in the LEAST amount of time?()
第6题:
Which of the following tools can be used to securely connect to a remote system?()
第7题:
Which two methods of authentication are used by the Infranet Controller for IPSec enforcement?()
第8题:
Which two secure remote access methods are available on the WX platforms?() (Choose two.)
第9题:
netpmon
netstat
nfsstat
vmstat
第10题:
AES
TKIP
802.1q
ISAKMP
第11题:
S/MIME
SSH
3DES
IPSec
第12题:
An irreversible fast encryption method
A reversible fast encryption method
A reversible value computed from a piece of data and used to detect modifications
An irreversible value computed froma piece of data and used to detect modifications
A table inwhich values are stored for efficient retrieval.
第13题:
A.Port scan
B.Ping sweep
C.IDS
D.NIPS
第14题:
A.WEP
B.CCKM
C.AES
D.TKIP
E.CCMP
第15题:
Which two wireless encryption methods are based on the RC4 encryption algorithm? ()
第16题:
Which of the following is used to identify active hosts along with their network addresses?()
第17题:
Which of the following protocols would MOST likely be used in the establishment of an IPSec VPN tunnel?()
第18题:
Which of the following tools should be used to report current network status and is often used to check the reliability of a network?()
第19题:
Which encryption type is used to secure user data in an IPsec tunnel?()
第20题:
Splash lubrication
Pressure lubrication
Sight feed lubricators
Mechanical lubricators
第21题:
WEP
CCKM
AES
TKIP
CCMP
第22题:
ECP
IRQ
AGP
TPM
第23题:
gravity separation
centrifuge
Cyclone
Cross-flow membrane filtration