网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
Which encryption type is used to secure user data in an IPsec tunnel?()
- A、symmetric key encryption
- B、asymmetric key encryption
- C、RSA
- D、digital certificates
参考答案
更多 “Which encryption type is used to secure user data in an IPsec tunnel?()A、symmetric key encryptionB、asymmetric key encryptionC、RSAD、digital certificates” 相关考题
考题
Which encryption type is used to secure user data in an IPsec tunnel?()
A. symmetric key encryptionB. asymmetric key encryptionC. RSAD. digital certificates
考题
Which two LSA types can be used to aggregate inter-area routes?()
A. Type 2B. Type 3C. Type 4D. Type 5E. Type 9
考题
When selecting a Network Interface Card (NIC), which of the following factors need to be considered?()
A. The type of application used on the networkB. The type of system bus used by the computersC. The type of memory installed in each computerD. The type of media used in the network topologyE. The type of protocols used in the networkF. The physical layout of the network hosts
考题
Which OSPF LSA is used to support MPLS traffic engineering?()A、opaque LSA (Type 8)B、opaque LSA (Type 9)C、link LSA (Type 1)D、network LSA (Type 2)E、opaque LSA (Type 10)
考题
Which of the following best describes a hash function?()A、An irreversible fast encryption methodB、A reversible fast encryption methodC、A reversible value computed from a piece of data and used to detect modificationsD、An irreversible value computed froma piece of data and used to detect modificationsE、A table inwhich values are stored for efficient retrieval.
考题
Which statement is true regarding a session key in the Diffie-Hellman key-exchange process?()A、A session key value is exchanged across the network.B、A session key never passes across the network.C、A session key is used as the key for asymmetric data encryption.D、A session key is used as the key for symmetric data encryption.
考题
Which two LSA types can be used to aggregate inter-area routes?()A、Type 2B、Type 3C、Type 4D、Type 5E、Type 9
考题
When selecting a Network Interface Card (NIC), which of the following factors need to be considered?()A、The type of application used on the networkB、The type of system bus used by the computersC、The type of memory installed in each computerD、The type of media used in the network topologyE、The type of protocols used in the networkF、The physical layout of the network hosts
考题
Which two statements about OSPF IPv6 routing are true?()A、It requires OSPF version 3.B、automatically detects neighbors over NHMA interfacesC、It supports encryption usingD、It uses LSA type 9E、It uses LSA type 8
考题
Which of the following type of lamp is used for heating a fuser?()A、XenonB、HalogenC、IncandescentD、Light Emitting Diode
考题
Which of the following encryption methods is often used along with L2TP?()A、S/MIMEB、SSHC、3DESD、IPSec
考题
Which two statements regarding asymmetric key encryption are true?()A、The same key is used for encryption and decryption.B、It is commonly used to create digital certificate signatures.C、It uses two keys: one for encryption and a different key for decryption.D、An attacker can decrypt data if the attacker captures the key used for encryption
考题
单选题Which of the following best describes a hash function?()A
An irreversible fast encryption methodB
A reversible fast encryption methodC
A reversible value computed from a piece of data and used to detect modificationsD
An irreversible value computed froma piece of data and used to detect modificationsE
A table inwhich values are stored for efficient retrieval.
考题
单选题Which OSPF LSA is used to support MPLS traffic engineering?()A
opaque LSA (Type 8)B
opaque LSA (Type 9)C
link LSA (Type 1)D
network LSA (Type 2)E
opaque LSA (Type 10)
考题
单选题Which of the following is the encryption algorithm used for priv option when using SNMPv3?()A
HMAC-SHAB
HMAC-MD5C
CBC-DESD
AESE
3DES
考题
多选题Which two statements regarding asymmetric key encryption are true?()AThe same key is used for encryption and decryption.BIt is commonly used to create digital certificate signatures.CIt uses two keys: one for encryption and a different key for decryption.DAn attacker can decrypt data if the attacker captures the key used for encryption
考题
单选题Which encryption type is used to secure user data in an IPsec tunnel?()A
symmetric key encryptionB
asymmetric key encryptionC
RSAD
digital certificates
考题
单选题Which type of zone is used by traffic transiting the device?()A
transit zoneB
default zoneC
security zoneD
functional zone
考题
单选题Which routing instance type is used to facilitate filter-based forwarding?()A
VRFB
FBFC
forwardingD
no-forwarding
考题
多选题Which two statements about OSPF IPv6 routing are true?()AIt requires OSPF version 3.Bautomatically detects neighbors over NHMA interfacesCIt supports encryption usingDIt uses LSA type 9EIt uses LSA type 8
考题
多选题When selecting a Network Interface Card (NIC), which of the following factors need to be considered?()AThe type of application used on the networkBThe type of system bus used by the computersCThe type of memory installed in each computerDThe type of media used in the network topologyEThe type of protocols used in the networkFThe physical layout of the network hosts
考题
单选题Which of the following is used by BitLocker to lock an encryption key and protect data?()A
ECPB
IRQC
AGPD
TPM
考题
单选题Which LSA is used in JUNOS software when a OSPF router restarts?()A
LSA Type 6B
LSA Type 9C
LSA Type 10D
LSA Type 11
考题
多选题Which two statements regarding symmetric key encryption are true?() (Choose two.)AThe same key is used for encryption and decryption.BIt is commonly used to create digital certificate signatures.CIt uses two keys: one for encryption and a different key for decryption.DAn attacker can decrypt data if the attacker captures the key used for encryption.
考题
单选题Which statement is true regarding a session key in the Diffie-Hellman key-exchange process?()A
A session key value is exchanged across the network.B
A session key never passes across the network.C
A session key is used as the key for asymmetric data encryption.D
A session key is used as the key for symmetric data encryption.
考题
单选题You administer a SQL Server 2008 instance. The instance hosts a database that is used by a Web-based application. The application processes 15,000 transactions every minute. A table in the database contains a column that is used only by the application. This column stores sensitive data. You need to store the sensitive data in the most secure manner possible. You also need to ensure that you minimize the usage of memory space and processor time. Which encryption type should you use?()A
Symmetric key encryptionB
Asymmetric key encryptionC
Certificate-based encryptionD
Transparent data encryption
热门标签
最新试卷