niusouti.com

单选题目前电子商务网站较常采用下列哪一种的安全机制是()。A DES(Data Encryption Standard)B IPSec(Internet Protocol Security)C SET(Secure Electronic Transaction)D SSL(Secure Socket Layer)

题目
单选题
目前电子商务网站较常采用下列哪一种的安全机制是()。
A

DES(Data Encryption Standard)

B

IPSec(Internet Protocol Security)

C

SET(Secure Electronic Transaction)

D

SSL(Secure Socket Layer)


相似考题
更多“单选题目前电子商务网站较常采用下列哪一种的安全机制是()。A DES(Data Encryption Standard)B IPSec(Internet Protocol Security)C SET(Secure Electronic Transaction)D SSL(Secure Socket Layer)”相关问题
  • 第1题:

    Which encryption type is used to secure user data in an IPsec tunnel?()

    A. symmetric key encryption

    B. asymmetric key encryption

    C. RSA

    D. digital certificates


    参考答案:A

  • 第2题:

    IPsec, also known as the internet Protocol ( ) , defines the architecture for security services for IP network traffic IPsec describes the framework for providing security a the IP layer, as well as the suite of protocols designed to provide that security: through_ ( )_ and encryption of IP network packets. IPec can be used 10 protect network data, for example, by setting up circuits using IPsec ( ), in which all data being sent between two endpoints is encrypted, as with a Virtual (请作答此空) Network connection ;for encrypting application layer data ;and for providing security for routers sending routing data across the public internet. Internet traffic can also be secured from host to host without the use of IPsec, for example by encryption at the ( ) layer with HTTP Secure (TTPS)or an the transport layer wit the Transport Layer Security (TLS)protocol.

    A.pubic]
    B.private]
    C.personal
    D.proper

    答案:B
    解析:

  • 第3题:

    前电子商务中有两种安全认证协议被广泛使用,即安全套接层SSL(Secure Electronic Transaction)协议和安全电子交易SET(Secure Sockets Layer)协议。


    正确答案:错误

  • 第4题:

    目前电子商务网站较常采用下列哪一种的安全机制是()。

    • A、DES(Data Encryption Standard)
    • B、IPSec(Internet Protocol Security)
    • C、SET(Secure Electronic Transaction)
    • D、SSL(Secure Socket Layer)

    正确答案:D

  • 第5题:

    安全电子交易(Secure Electronic Transaction,简称SET)协议较好地解决了电子交易信息的()。

    • A、机密性
    • B、完整性
    • C、身份认证
    • D、非否认性
    • E、开放性

    正确答案:A,B,C,D

  • 第6题:

    You need to recommend a VPN solution for the new sales office. The solution must support the  company's planned changs.   What should you include in the recommendation?()

    • A、Internet Key Exchange version 2 (IKEv2)
    • B、Layer 2 Tunneling Protocol (L2TP)
    • C、Point-to-Point Tunneling Protocol (PPTP)
    • D、Secure Socket Tunneling Protocol (SSTP)

    正确答案:D

  • 第7题:

    安全套接层协议SSL是()的缩写

    • A、Secure Sockets Layer
    • B、Security Sending Language
    • C、Security Sending Layer
    • D、Secure Sets Layer

    正确答案:A

  • 第8题:

    Which encryption type is used to secure user data in an IPsec tunnel?()

    • A、symmetric key encryption
    • B、asymmetric key encryption
    • C、RSA
    • D、digital certificates

    正确答案:A

  • 第9题:

    单选题
    Which encryption type is used to secure user data in an IPsec tunnel?()
    A

    symmetric key encryption

    B

    asymmetric key encryption

    C

    RSA

    D

    digital certificates


    正确答案: B
    解析: 暂无解析

  • 第10题:

    单选题
    了保障电子支付的安全,VISA和MasterCard两大信用卡公司于1997年联合推出()协议
    A

    S-HTTP(Secure HyperText Transfer Protocal)

    B

    SSL(Secure Sockets Layer)

    C

    PIN(Personal Identification Numbers)

    D

    SET(Secure Electronic Transaction)


    正确答案: B
    解析: 暂无解析

  • 第11题:

    多选题
    Cisco provides two enhancements to 802.11 security which protect a WEP key from exploits. Which two technologies provide these security enhancements? ()
    A

    802.1X

    B

    Cisco Temporal Key Integrity Protocol (CKIP)

    C

    Extensible Authentication Protocol-Flexible Authentication via Secure Tunneling (EAP-FAST)

    D

    Cisco Message Integrity Check (CMIC)

    E

    One-Time Passwords (OTP)

    F

    Advanced Encryption Standard (AES)


    正确答案: C,F
    解析: 暂无解析

  • 第12题:

    单选题
    You work as a exchange administrator at TestKing.com. The TestKing.com network contains an internalnetwork as well as a perimeter network. The primeter network contains an Exchange Server 2010 EdgeTransport Server named TESTKING-EX. During the course of day you receive an instruction form the CIO to formulate a remote managementsolution for TESTKING-EX01 based on the set criteria below: You need to ensure that management traffic is encypted. You nedd to ensure that remote administration is permitted fron the Internet network.You need to ensure that Exchange Management Console (EMC) is supported. What should you do?()
    A

    You should recommend that Windows Management Instrumentation Command-line (WMIC) be used.

    B

    You should recommend that Lightweight Directory Access Protocol(LDAP)over Secure Socket Layer(SSL) be used.

    C

    You should recommend that Windows Remote Management (WinRM) over SSL be used.

    D

    You should recommend that Remote Desktop Protocol(RDP)over Secure Socket Layer(SSL)be used.


    正确答案: B
    解析: 暂无解析

  • 第13题:

    在电子商务的发展过程中,安全电子交易协议(SET:Secure Electronic Transaction)标准作为北美民间组织推行的电子支付安全协议,其针对的主要交易是基于( )的网络交易。

    A.专用电子货币B.不记名帐号C.虚拟货币D.信用卡


    正确答案:D

  • 第14题:

    IPsec, also known as the internet Protocol ( ) , defines the architecture for security services for IP network traffic IPsec describes the framework for providing security a the IP layer, as well as the suite of protocols designed to provide that security: through_ ( )_ and encryption of IP network packets. IPec can be used 10 protect network data, for example, by setting up circuits using IPsec ( ), in which all data being sent between two endpoints is encrypted, as with a Virtual ( ) Network connection ;for encrypting application layer data ;and for providing security for routers sending routing data across the public internet. Internet traffic can also be secured from host to host without the use of IPsec, for example by encryption at the (请作答此空) layer with HTTP Secure (TTPS)or an the transport layer wit the Transport Layer Security (TLS)protocol.

    A.network
    B.transport
    C.application
    D.session

    答案:C
    解析:

  • 第15题:

    以下属于安全电子交易(Secure Electronic Transaction,简称SET)协议包含的实体的是()。

    • A、持卡人
    • B、发卡机构
    • C、商户
    • D、银行
    • E、支付网关

    正确答案:A,B,C,D,E

  • 第16题:

    Cisco provides two enhancements to 802.11 security which protect a WEP key from exploits. Which two technologies provide these security enhancements? ()

    • A、802.1X
    • B、Cisco Temporal Key Integrity Protocol (CKIP)
    • C、Extensible Authentication Protocol-Flexible Authentication via Secure Tunneling (EAP-FAST)
    • D、Cisco Message Integrity Check (CMIC)
    • E、One-Time Passwords (OTP)
    • F、Advanced Encryption Standard (AES)

    正确答案:B,D

  • 第17题:

    SSL的全称是()。

    • A、Session Socket Language
    • B、Session Software Language
    • C、Security Socket Layer
    • D、Security Software Layer

    正确答案:C

  • 第18题:

    了保障电子支付的安全,VISA和MasterCard两大信用卡公司于1997年联合推出()协议

    • A、S-HTTP(Secure HyperText Transfer Protocal)
    • B、SSL(Secure Sockets Layer)
    • C、PIN(Personal Identification Numbers)
    • D、SET(Secure Electronic Transaction)

    正确答案:D

  • 第19题:

    Companycom informs the system administrator that there is concern about the Electronic Service Agent and security. What can be said about Electronic Service Agent that will address concerns about security?()

    • A、All Service Agent transactions are inbound requests secured by encryption (cryptographic processor card) Kerberos, and Hypertext Transfer Protocol Secure (HTTPS). 
    • B、The AT&T Global Network Services (AGNS ) phone connection generates system IDs and passwords for the client every six months. Service Agent has no inbound capability.
    • C、All Service Agent transactions are outbound requests secured by encryption (Hypertext Transfer Protocol Secure (HTTPS) or POST). Service Agent has no inbound capability. 
    • D、The transmissions from Service Agent can be either by Internet or the AT&T Global Network Services (AGNS) phone connection. Service Agent transactions are inbound requests generated by a point to point connection.

    正确答案:C

  • 第20题:

    You work as a exchange administrator at TestKing.com. The TestKing.com network contains an internalnetwork as well as a perimeter network. The primeter network contains an Exchange Server 2010 EdgeTransport Server named TESTKING-EX. During the course of day you receive an instruction form the CIO to formulate a remote managementsolution for TESTKING-EX01 based on the set criteria below: You need to ensure that management traffic is encypted. You nedd to ensure that remote administration is permitted fron the Internet network.You need to ensure that Exchange Management Console (EMC) is supported. What should you do?()

    • A、You should recommend that Windows Management Instrumentation Command-line (WMIC) be used.
    • B、You should recommend that Lightweight Directory Access Protocol(LDAP)over Secure Socket Layer(SSL) be used.
    • C、You should recommend that Windows Remote Management (WinRM) over SSL be used.
    • D、You should recommend that Remote Desktop Protocol(RDP)over Secure Socket Layer(SSL)be used.

    正确答案:C

  • 第21题:

    单选题
    目前电子商务网站较常采用下列哪一种的安全机制是()。
    A

    DES(Data Encryption Standard)

    B

    IPSec(Internet Protocol Security)

    C

    SET(Secure Electronic Transaction)

    D

    SSL(Secure Socket Layer)


    正确答案: B
    解析: 暂无解析

  • 第22题:

    多选题
    以下属于安全电子交易(Secure Electronic Transaction,简称SET)协议包含的实体的是()。
    A

    持卡人

    B

    发卡机构

    C

    商户

    D

    银行

    E

    支付网关


    正确答案: D,E
    解析: 暂无解析

  • 第23题:

    判断题
    前电子商务中有两种安全认证协议被广泛使用,即安全套接层SSL(Secure Electronic Transaction)协议和安全电子交易SET(Secure Sockets Layer)协议。
    A

    B


    正确答案:
    解析: 暂无解析

  • 第24题:

    单选题
    Companycom informs the system administrator that there is concern about the Electronic Service Agent and security. What can be said about Electronic Service Agent that will address concerns about security?()
    A

    All Service Agent transactions are inbound requests secured by encryption (cryptographic processor card) Kerberos, and Hypertext Transfer Protocol Secure (HTTPS). 

    B

    The AT&T Global Network Services (AGNS ) phone connection generates system IDs and passwords for the client every six months. Service Agent has no inbound capability.

    C

    All Service Agent transactions are outbound requests secured by encryption (Hypertext Transfer Protocol Secure (HTTPS) or POST). Service Agent has no inbound capability. 

    D

    The transmissions from Service Agent can be either by Internet or the AT&T Global Network Services (AGNS) phone connection. Service Agent transactions are inbound requests generated by a point to point connection.


    正确答案: C
    解析: 暂无解析