网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Ensuring that data is transmitted securely over an IP network is the main purpose of:()
A

Telnet

B

FTP

C

SIP

D

TLS


参考答案

参考解析
解析: 暂无解析
更多 “单选题Ensuring that data is transmitted securely over an IP network is the main purpose of:()A TelnetB FTPC SIPD TLS” 相关考题
考题 ●Flow control is a function that prevents network congestion by ensuring that (71) do not overwhelm (72) with datA.There are three commonly used methods for handling network congestion . (73) is used by network devices to temporarily store bursts of excess data in memory until they can be processed. (74) are used by receiving devices to help prevent their buffers from overflowing . (75) is a flow-control scheme in which the source device requires an acknowledgment from the destination after a certain number of packets have been transmitted.(71)~(72)A.transmitting devicesB.transmitted devicesC.receiving devicesD.received devices(73)~(75) A.BufferB.Source-quench messagesC.BufferingD.Windowing

考题 Flow control is a function that prevents network congestion by ensuring that _( )_ do not overwhelm_( )_ with data.There are three commonly used methods for handling network congestion._( )_is used by network devices to temporarily store bursts of excess data in memory until they can be processed._( )_ are used by receiving devices to help prevent their buffers from overflowing._( )_ is a flow-control scheme in which the source device requires an acknowledgment from the destination after a certain number of packets have been transmitted.A.transmitting devicesB.transmitted devicesC.receiving devicesD.received devices@@@SXB@@@A.transmitting devicesB.transmitted devicesC.receiving devicesD.received devices@@@SXB@@@A.BufferB.Source-quench messagesC.windowD.WindowingE.Buffering@@@SXB@@@A.BufferB.Source-quench messagesC.windowD.WindowingE.Buffering@@@SXB@@@A.BufferB.Source-quench messagesC.windowD.WindowingE.Buffering

考题 下面中哪个不是TCP/IP所带来的标准工具?(23)A.TELNETB.FTPC.FTAMD.SMTP

考题 Which of the following protocols is commonly used for VoIP technology?() A.TelnetB.SMTPC.SIPD.SNMP

考题 Flow control is a function that prevents network congestion by ensuring that(71)do not overwhelm(72)with data. There are three commonly used methods for handling network congestion.(73)is used by network devices to temporarily store bursts of excess data in memory until they can be processed. (74)are used by receiving devices to help prevent their buffers from overflowing.(75)is a flow -control scheme in which the source device requires an acknowledgment from the destination after a certain number of packets have been transmitted.A.transmitting devicesB.transmitted devicesC.receiving devicesD.received devices

考题 EnsuringthatdataistransmittedsecurelyoveranIPnetworkisthemainpurposeof:() A.TelnetB.FTPC.SIPD.TLS

考题 Which of the following should be implemented to allow a user to securely connect to a network driveremotely?() A. Enable file and print shareB. FTPC. VPND. Map a drive

考题 Flow control is a function that prevents network congestion by ensuring that(66)do not over-whelm(67)with data. There are three commonly used methods for handling network congestion.(68)is used by network devices to temporarily store bursts of excess data in memory until they can be processed.(69)are used by receiving devices to help prevent their buffers from overflowing.(70)is a flow-control scheme in which the source device requires an acknowledgment from the destination after a certain number of packets have been transmitted.A.transmitting devicesB.transmitted devicesC.receiving devicesD.received devices

考题 在TCP/IP协议中,远程登录使用的应用层协议是( )。 A、telnetB、ftpC、httpD、udp

考题 An IP ( ) is a unique number the computer uses to identify itself, and to be identified over a network.A.addressB.deviceC.pointD.data

考题 IPsec, also known as the internet Protocol ( ) , defines the architecture for security services for IP network traffic IPsec describes the framework for providing security a the IP layer, as well as the suite of protocols designed to provide that security: through_ ( )_ and encryption of IP network packets. IPec can be used 10 protect network data, for example, by setting up circuits using IPsec ( ), in which all data being sent between two endpoints is encrypted, as with a Virtual (请作答此空) Network connection ;for encrypting application layer data ;and for providing security for routers sending routing data across the public internet. Internet traffic can also be secured from host to host without the use of IPsec, for example by encryption at the ( ) layer with HTTP Secure (TTPS)or an the transport layer wit the Transport Layer Security (TLS)protocol.A.pubic] B.private] C.personal D.proper

考题 A virtual (71) network, or VPN, is an encrypted connection over the Internet from a device to a network. The encrypted connection helps ensure that sensitive data is safely (72). It prevents (73) people fromeavesdropping on the traffic and allows the user to conduct work remotely. Traffic on the virtual network is sent securely by establishing an encrypted connection across the Internet known as a (74).A remote access VPN securely connects a device outside the corporate office. A site-to-site VPN connects the corporate office to branch offices over the Internet. Site-to-site VPNs are used when distance makes it impractical to have direct network connections between these offices. Think of site-to-site access as (75) to network. A.encodedB.encryptedC.storedD.transmitted

考题 A virtual (71) network, or VPN, is an encrypted connection over the Internet from a device to a network. The encrypted connection helps ensure that sensitive data is safely (72). It prevents (73) people fromeavesdropping on the traffic and allows the user to conduct work remotely. Traffic on the virtual network is sent securely by establishing an encrypted connection across the Internet known as a (74).A remote access VPN securely connects a device outside the corporate office. A site-to-site VPN connects the corporate office to branch offices over the Internet. Site-to-site VPNs are used when distance makes it impractical to have direct network connections between these offices. Think of site-to-site access as (75) to network. A.channelB.pathC.tunnelD.route

考题 Ensuring that data is transmitted securely over an IP network is the main purpose of:()A、TelnetB、FTPC、SIPD、TLS

考题 在TCP/IP协议中,远程登录使用的是()协议。A、telnetB、ftpC、httpD、udp

考题 You are the network consultant from passguide.com. You have been asked for which two features of optical networks allow data to be transmitted over extremely long distances? ()A、EncryptionB、Bandwidth limitsC、Minimal signal lossD、No EMI

考题 Which is the main difference between host-based and network-based intrusion prevention?()A、Host-based IPS can work in promiscuous mode or inline mode.B、Network-based IPS can provide protection to desktops and servers without the need of installing specialized software on the end hosts and servers.C、Network-based IPS is better suited for inspection of SSL and TLS encrypted data flows.D、Host-based IPS deployment requires less planning than network-based IPS.

考题 Which of the following should be implemented to allow a user to securely connect to a network driveremotely?()A、Enable file and print shareB、FTPC、VPND、Map a drive

考题 TCP/IP协议族中包括上百个互为关联的协议,其中能够提供远程文件传输的协议为()。A、TelnetB、FtpC、SmtpD、Nfs

考题 TCP/IP协议中用来访问WWW服务器上网页的是()A、TELNETB、FTPC、NFSD、HTTP

考题 Which of the following protocols is commonly used for VoIP technology?()A、TelnetB、SMTPC、SIPD、SNMP

考题 You are a network administrator for your company. The company has a main office and one branch office. The network consists of a single Active Directory domain. All servers run Windows Server 2003.   The company needs to connect the main office network and the branch office network by using Routing and Remote Access servers at each office. The networks will be connected by a VPN connection over the Internet.   The company’s written security policy includes the following requirements for VPN connections over the Internet:  All data must be encrypted with end-to-end encryption.  VPN connection authentication must be at the computer level.   Credential information must not be transmitted over the Internet as part of the authentication process.   You need to configure security for VPN connection between the main office and the branch office. You need to comply with the written security policy.   What should you do?  ()A、 Use a PPTP connection with EAP-TLS authentication.B、 Use a PPTP connection with MS-CHAP v2 authentication.C、 Use an L2TP connection with EAP-TLS authentication.D、 Use an L2TP connection with MS-CHAP v2 authentication.

考题 You need to evaluate whether the currently available network bandwidth is adequate to run NewApp. Which three actions should you perform?()A、Use a debug version of NewApp to collect information about NewApp.B、Use Performance Monitor to collect data about the saturation of each WAN link.C、Use Network Monitor to analyze the data that is transmitted over the network for App1.D、Install SNMP on all computers that are connected to App1 to obtain information about App1.E、Build a test environment for NewApp to analyze how much bandwidth is required for NewApp.

考题 多选题You are the network consultant from passguide.com. You have been asked for which two features of optical networks allow data to be transmitted over extremely long distances? ()AEncryptionBBandwidth limitsCMinimal signal lossDNo EMI

考题 单选题The heartbeating over IP aliases function allows which of the following?()A Create a heartbeat network over disksB Define all boot addresses as IP aliasesC Define all IP addresses in the same network subnetD Define all boot, service and persistent addresses as IP aliases when using IPAT via replacement

考题 单选题You are a network administrator for your company. The company has a main office and one branch office. The network consists of a single Active Directory domain. All servers run Windows Server 2003.   The company needs to connect the main office network and the branch office network by using Routing and Remote Access servers at each office. The networks will be connected by a VPN connection over the Internet.   The company’s written security policy includes the following requirements for VPN connections over the Internet:  All data must be encrypted with end-to-end encryption.  VPN connection authentication must be at the computer level.   Credential information must not be transmitted over the Internet as part of the authentication process.   You need to configure security for VPN connection between the main office and the branch office. You need to comply with the written security policy.   What should you do?  ()A  Use a PPTP connection with EAP-TLS authentication.B  Use a PPTP connection with MS-CHAP v2 authentication.C  Use an L2TP connection with EAP-TLS authentication.D  Use an L2TP connection with MS-CHAP v2 authentication.

考题 多选题Your company has a single Active Directory domain. All servers run Windows Server 2008. The company network has servers that perform as Web Servers. All confidential files are located on a server named FSS1. The company security policy states that all confidential data must be transmitted in the most secure manner. When you monitor the network you notice that the confidential files stored on FSS1 server are being transmitted over the network without encryption. You need to ensure that encryption is always usedwhen the confidential files on the FSS1 server are transmitted over the network. What are two possible ways to achieve this goal? ()ADeactivate all LM and NTLM authentication methods on FSS1 serverBUse IIS to publish the confidential files, activate SSL on the IIS server, and then open the files as a web folderCUse IPsec encryption between the FSS1 server and the computers of the users who need to access the confidential files.DUse the Server Message Block (SMB) signing between the FSS1 server and the computers of the users who want to access the confidential files.EActivate offline files for the confidential files that are stored on the FSS1 server. In the Folder avanced Properties box, select the Encrypt contents to secure data optiion

考题 单选题Ensuring that data is transmitted securely over an IP network is the main purpose of:()A TelnetB FTPC SIPD TLS