网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which encryption type is used to secure user data in an IPsec tunnel?()
A

symmetric key encryption

B

asymmetric key encryption

C

RSA

D

digital certificates


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which encryption type is used to secure user data in an IPsec tunnel?()A symmetric key encryptionB asymmetric key encryptionC RSAD digital certificates” 相关考题
考题 Which encryption type is used to secure user data in an IPsec tunnel?() A. symmetric key encryptionB. asymmetric key encryptionC. RSAD. digital certificates

考题 The enable secret command is used to secure access to which CLI mode?() A.user EXEC modeB.global configuration modeC.privileged EXEC modeD.auxiliary setup mode

考题 The enable secret command is used to secure access to which CLI mode?()A、user EXEC modeB、global configuration modeC、privileged EXEC modeD、auxiliary setup mode

考题 Which of the following best describes a hash function?()A、An irreversible fast encryption methodB、A reversible fast encryption methodC、A reversible value computed from a piece of data and used to detect modificationsD、An irreversible value computed froma piece of data and used to detect modificationsE、A table inwhich values are stored for efficient retrieval.

考题 Which of the following standards or encryption types is the MOST secure for wireless networking?()A、WEPB、AESC、TKIPD、DES

考题 Which statement is true regarding a session key in the Diffie-Hellman key-exchange process?()A、A session key value is exchanged across the network.B、A session key never passes across the network.C、A session key is used as the key for asymmetric data encryption.D、A session key is used as the key for symmetric data encryption.

考题 For an incomplete recovery, which four backup types can be used by Recovery Manager (RMAN) to restore data files? ()A、RMAN image copiesB、RMAN database backupsC、RMAN tablespace backupsD、user­managed backups placed in the flash recovery areaE、user­managed backups that have been cataloged with RMANF、user­managed data file backups for which the full path name is specified

考题 Which description about asymmetric encryption algorithms is correct?()A、They use the same key for encryption and decryption of data.B、They use different keys for decryption but the same key for encryption of data.C、They use different keys for encryption and decryption of data.D、They use the same key for decryption but different keys for encryption of data.

考题 Which of the following technologies is the MOST secure form of wireless encryption?()A、SSLB、WPAC、WEPD、TLS

考题 A customer has security concerns about classified local data being compromised if the laptop isstolen. The customers laptop has Windows 2000 utilizing the FAT16 file system. Which of the following actions should be taken?()A、Upgrade the operating system to Windows XP Home.B、Have the customer convert to NTFS and enable data encryption.C、Tell the customer that a laptop should not be used for classified data.D、Configure the wireless adapter to only connect to secure networks.

考题 Which two statements regarding asymmetric key encryption are true?()A、The same key is used for encryption and decryption.B、It is commonly used to create digital certificate signatures.C、It uses two keys: one for encryption and a different key for decryption.D、An attacker can decrypt data if the attacker captures the key used for encryption

考题 Which three features are provided by Oracle Net Services? ()A、Data encryption.B、User authentication.C、Transparent data conversionD、Configuration and administration mechanisms.E、Support for multiple network transport protocols.

考题 Which three statements are true regarding single-row functions?()A、 They can accept only one argument.B、 They can be nested up to only two levels.C、 They can return multiple values of more than one data type.D、 They can be used in SELECT, WHERE, and ORDER BY clauses.  E、 They can modify the data type of the argument that is referenced.F、 They can accept a column name, expression, variable name, or a user-supplied constant as arguments.

考题 Which three statements are true regarding the data types in Oracle Database 10g/11g?()A、Only one LONG column can be used per table B、A TIMESTAMP data type column stores only time values with fractional seconds C、The BLOB data type column is used to store binary data in an operating system file D、The minimum column width that can be specified for a VARCHAR2 data type column is one E、The value for a CHAR data type column is blank-padded to the maximum defined column width

考题 单选题Which of the following best describes a hash function?()A An irreversible fast encryption methodB A reversible fast encryption methodC A reversible value computed from a piece of data and used to detect modificationsD An irreversible value computed froma piece of data and used to detect modificationsE A table inwhich values are stored for efficient retrieval.

考题 多选题Which three statements are true regarding the data types in Oracle Database 10g/11g?()AOnly one LONG column can be used per tableBA TIMESTAMP data type column stores only time values with fractional secondsCThe BLOB data type column is used to store binary data in an operating system fileDThe minimum column width that can be specified for a VARCHAR2 data type column is oneEThe value for a CHAR data type column is blank-padded to the maximum defined column width

考题 多选题Which two statements regarding asymmetric key encryption are true?()AThe same key is used for encryption and decryption.BIt is commonly used to create digital certificate signatures.CIt uses two keys: one for encryption and a different key for decryption.DAn attacker can decrypt data if the attacker captures the key used for encryption

考题 多选题Which three statements are true regarding single-row functions?()AThey can accept only one argument.BThey can be nested up to only two levels.CThey can return multiple values of more than one data type.DThey can be used in SELECT, WHERE, and ORDER BY clauses.EThey can modify the data type of the argument that is referenced.FThey can accept a column name, expression, variable name, or a user-supplied constant as arguments.

考题 多选题You need to design the storage of the loan response message. Which actions or actions should you perform?()AUse the xml data type to store the message.BUse a user-defined data type to store the message.CUse the nvarchar(max) data type to store the message.DUse a check constraint to validate that the correct tags are used.EUse an XML schema definition (XSD) to validate that the correct tags are used.FUse a foreign key constraint to validate that the correct tags are used.

考题 单选题Which of the following statements is used to grant user TOM and Application team APPGRP the ability to add data to table TAB1?()A GRANT ADD DATA ON TABLE tab1 TO GROUP tom appgrpB GRANT INSERT TO USER tom, GROUP appgrp ON TABLE tab1C GRANT INSERT ON TABLE tab1 TO USER tom, GROUP appgrpD GRANT ADD DATA ON TABLE tab1 TO USER appgrp, GROUP tom

考题 单选题Which of the following is used by BitLocker to lock an encryption key and protect data?()A ECPB IRQC AGPD TPM

考题 单选题You opened the encryption wallet and then issued the following command:   SQLCREATE TABLESPACE securespace DATAFILE ’/home/user/oradata/secure01.dbf’ SIZE 150M  ENCRYPTION USING ’3DES168’ DEFAULT STORAGE(ENCRYPT);   Then you closed the wallet. Later, you issued the following command to create theEMPLOYEES table in the SECURESPACE tablespace and you use the NO SALT option for the EMPID column.  What is the outcome?()A  It creates the table and encrypts the data in it.B  It generates an error because the wallet is closed.C  It creates the table but does not encrypt the data in it.D  It generates an error because the NO SALT option cannot be used with the ENCRYPT option.

考题 多选题Which statements are true regarding SecureFile LOBs?()AThe amount of undo retained is user controlled.BSecureFile LOBs can be used only for nonpartitioned tables.CFragmentation is minimized by using variable-sized chunks dynamically.DSecureFile encryption allows for random reads and writes of the encrypted data.EIt automatically detects duplicate LOB data and conserves space by storing only one copy.

考题 多选题Which two statements regarding symmetric key encryption are true?() (Choose two.)AThe same key is used for encryption and decryption.BIt is commonly used to create digital certificate signatures.CIt uses two keys: one for encryption and a different key for decryption.DAn attacker can decrypt data if the attacker captures the key used for encryption.

考题 单选题Which statement is true regarding a session key in the Diffie-Hellman key-exchange process?()A A session key value is exchanged across the network.B A session key never passes across the network.C A session key is used as the key for asymmetric data encryption.D A session key is used as the key for symmetric data encryption.

考题 单选题Which description about asymmetric encryption algorithms is correct?()A They use the same key for encryption and decryption of data.B They use different keys for decryption but the same key for encryption of data.C They use different keys for encryption and decryption of data.D They use the same key for decryption but different keys for encryption of data.

考题 单选题You administer a SQL Server 2008 instance. The instance hosts a database that is used by a Web-based application. The application processes 15,000 transactions every minute. A table in the database contains a column that is used only by the application. This column stores sensitive data. You need to store the sensitive data in the most secure manner possible. You also need to ensure that you minimize the usage of memory space and processor time. Which encryption type should you use?()A Symmetric key encryptionB Asymmetric key encryptionC Certificate-based encryptionD Transparent data encryption