S/MIME
SSH
3DES
IPSec
第1题:
A.Port scan
B.Ping sweep
C.IDS
D.NIPS
第2题:
Which of the following is used by BitLocker to lock an encryption key and protect data?()
第3题:
Which of the following is used to identify active hosts along with their network addresses?()
第4题:
Which of the following protocols would MOST likely be used in the establishment of an IPSec VPN tunnel?()
第5题:
Which of the following tools should be used to report current network status and is often used to check the reliability of a network?()
第6题:
Which encryption type is used to secure user data in an IPsec tunnel?()
第7题:
Splash lubrication
Pressure lubrication
Sight feed lubricators
Mechanical lubricators
第8题:
AES
TKIP
802.1q
ISAKMP
第9题:
Port scan
Ping sweep
IDS
NIPS
第10题:
UTP
Coaxial
Fiber optic
STP
第11题:
HMAC-SHA
HMAC-MD5
CBC-DES
AES
3DES
第12题:
gravity separation
centrifuge
Cyclone
Cross-flow membrane filtration
第13题:
A.S/MIME
B.SSH
C.3DES
D.IPSec
第14题:
Which of the following protocols would MOST likely be used in the establishment of an IPSec VPN tunnel?()
第15题:
Which of the following encryption methods is often used along with L2TP?()
第16题:
Which of the following tools can be used to securely connect to a remote system?()
第17题:
Which two methods of authentication are used by the Infranet Controller for IPSec enforcement?()
第18题:
symmetric key encryption
asymmetric key encryption
RSA
digital certificates
第19题:
netpmon
netstat
nfsstat
vmstat
第20题:
AES
TKIP
802.1q
ISAKMP
第21题:
ECP
IRQ
AGP
TPM
第22题:
S/MIME
SSH
3DES
IPSec
第23题:
Daily
Incremental
Normal
Differential
第24题:
An irreversible fast encryption method
A reversible fast encryption method
A reversible value computed from a piece of data and used to detect modifications
An irreversible value computed froma piece of data and used to detect modifications
A table inwhich values are stored for efficient retrieval.