niusouti.com
更多“单选题Which of the following encryption methods is often used along with L2TP?()A S/MIMEB SSHC 3DESD IPSec”相关问题
  • 第1题:

    Which of the following is used to identify active hosts along with their network addresses?()

    A.Port scan

    B.Ping sweep

    C.IDS

    D.NIPS


    参考答案:B

  • 第2题:

    Which of the following is used by BitLocker to lock an encryption key and protect data?()

    • A、ECP
    • B、IRQ
    • C、AGP
    • D、TPM

    正确答案:D

  • 第3题:

    Which of the following is used to identify active hosts along with their network addresses?()

    • A、Port scan
    • B、Ping sweep
    • C、IDS
    • D、NIPS

    正确答案:B

  • 第4题:

    Which of the following protocols would MOST likely be used in the establishment of an IPSec VPN tunnel?()

    • A、AES
    • B、TKIP
    • C、802.1q
    • D、ISAKMP

    正确答案:A

  • 第5题:

    Which of the following tools should be used to report current network status and is often used to check the reliability of a network?()

    • A、 netpmon
    • B、 netstat
    • C、 nfsstat
    • D、 vmstat

    正确答案:B

  • 第6题:

    Which encryption type is used to secure user data in an IPsec tunnel?()

    • A、symmetric key encryption
    • B、asymmetric key encryption
    • C、RSA
    • D、digital certificates

    正确答案:A

  • 第7题:

    单选题
    Which of the following methods is normally used to lubricate bearings in a small high-speed diesel engine?()
    A

    Splash lubrication

    B

    Pressure lubrication

    C

    Sight feed lubricators

    D

    Mechanical lubricators


    正确答案: B
    解析: 暂无解析

  • 第8题:

    单选题
    Which of the following protocols would MOST likely be used in the establishment of an IPSec VPN tunnel?()
    A

    AES

    B

    TKIP

    C

    802.1q

    D

    ISAKMP


    正确答案: B
    解析: 暂无解析

  • 第9题:

    单选题
    Which of the following is used to identify active hosts along with their network addresses?()
    A

    Port scan

    B

    Ping sweep

    C

    IDS

    D

    NIPS


    正确答案: C
    解析: 暂无解析

  • 第10题:

    单选题
    Which of the following network cable types is MOST often used in environments where physicalsecurity of the data is the top priority?()
    A

    UTP

    B

    Coaxial

    C

    Fiber optic

    D

    STP


    正确答案: D
    解析: 暂无解析

  • 第11题:

    单选题
    Which of the following backup methods should be used nightly to ensure backups capture all necessary data in the LEAST amount of time?()
    A

    Daily

    B

    Incremental

    C

    Normal

    D

    Differential


    正确答案: B
    解析: 暂无解析

  • 第12题:

    单选题
    Which of the following best describes a hash function?()
    A

    An irreversible fast encryption method

    B

    A reversible fast encryption method

    C

    A reversible value computed from a piece of data and used to detect modifications

    D

    An irreversible value computed froma piece of data and used to detect modifications

    E

    A table inwhich values are stored for efficient retrieval.


    正确答案: D
    解析: 暂无解析

  • 第13题:

    WhichofthefollowingencryptionmethodsisoftenusedalongwithL2TP?()

    A.S/MIME

    B.SSH

    C.3DES

    D.IPSec


    参考答案:D

  • 第14题:

    Which of the following protocols would MOST likely be used in the establishment of an IPSec VPN tunnel?()

    • A、 AES 
    • B、 TKIP
    • C、 802.1q
    • D、 ISAKMP

    正确答案:D

  • 第15题:

    Which of the following encryption methods is often used along with L2TP?()

    • A、S/MIME
    • B、SSH
    • C、3DES
    • D、IPSec

    正确答案:D

  • 第16题:

    Which of the following tools can be used to securely connect to a remote system?()

    • A、RCMD
    • B、SSH
    • C、TELNET
    • D、HTTP

    正确答案:B

  • 第17题:

    Which two methods of authentication are used by the Infranet Controller for IPSec enforcement?()

    • A、dial-up VPN
    • B、IKE authentication
    • C、XAuth authentication
    • D、shared IKE authentication

    正确答案:A,C

  • 第18题:

    单选题
    Which encryption type is used to secure user data in an IPsec tunnel?()
    A

    symmetric key encryption

    B

    asymmetric key encryption

    C

    RSA

    D

    digital certificates


    正确答案: B
    解析: 暂无解析

  • 第19题:

    单选题
    Which of the following tools should be used to report current network status and is often used to check the reliability of a network?()
    A

     netpmon

    B

     netstat

    C

     nfsstat

    D

     vmstat


    正确答案: B
    解析: 暂无解析

  • 第20题:

    单选题
    Which of the following protocols would MOST likely be used in the establishment of an IPSec VPN tunnel?()
    A

     AES 

    B

     TKIP

    C

     802.1q

    D

     ISAKMP


    正确答案: A
    解析: 暂无解析

  • 第21题:

    单选题
    Which of the following is used by BitLocker to lock an encryption key and protect data?()
    A

    ECP

    B

    IRQ

    C

    AGP

    D

    TPM


    正确答案: D
    解析: 暂无解析

  • 第22题:

    单选题
    Which of the following is the encryption algorithm used for priv option when using SNMPv3?()
    A

    HMAC-SHA

    B

    HMAC-MD5

    C

    CBC-DES

    D

    AES

    E

    3DES


    正确答案: A
    解析: 暂无解析

  • 第23题:

    单选题
    Which of the following methods might be used as the treatment on emulsified oil?()
    A

    gravity separation

    B

    centrifuge

    C

    Cyclone

    D

    Cross-flow membrane filtration


    正确答案: B
    解析: 暂无解析