niusouti.com

Which encryption type is used to secure user data in an IPsec tunnel?()A. symmetric key encryptionB. asymmetric key encryptionC. RSAD. digital certificates

题目
Which encryption type is used to secure user data in an IPsec tunnel?()

A. symmetric key encryption

B. asymmetric key encryption

C. RSA

D. digital certificates


相似考题
更多“Which encryption type is used to secure user data in an IPsec tunnel?() ”相关问题
  • 第1题:

    Your task is to provision the Junos security platform to permit transit packets from the Private zone to the External zone by using an IPsec VPN and log information at the time of session close.Which configuration meets this requirement?()

    A. [edit security policies from-zone Private to-zone External] user@host# show policy allowTransit { match { source-address PrivateHosts;destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn VPN; } } log { session-init; } } }

    B. [edit security policies from-zone Private to-zone External] user@host# show policy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn VPN; } } count { session-close; } } }

    C. [edit security policies from-zone Private to-zone External] user@host# showpolicy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn VPN;} } log { session-close; } } }

    D. [edit security policies from-zone Private to-zone External] user@host# show policy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn VPN; log; count session-close; } } } }


    参考答案:C

  • 第2题:

    Basedontheconfigurationshownintheexhibit,whataretheactionsofthesecuritypolicy?()[editschedulers]user@hostshowschedulernow{mondayall-day;tuesdayexclude;wednesday{start-time07:00:00stop-time18:00:00;}thursday{start-time07:00:00stop-time18:00:00;}}[editsecuritypoliciesfrom-zonePrivateto-zoneExternal]user@hostshowpolicyallowTransit{match{source-addressPrivateHosts;destination-addressExtServers;applicationExtApps;}then{permit{tunnel{ipsec-vpnmyTunnel;}}}scheduler-namenow;

    A.ThepolicywillalwayspermittransitpacketsandusetheIPsecVPNmyTunnel.

    B.ThepolicywillpermittransitpacketsonlyonMonday,andusetheIPsecVPNMytunnel.

    C.ThepolicywillpermittransitpacketsandusetheIPsecVPNmyTunnelalldayMondayandWednesday 7amto6pm,andThursday7amto6pm.

    D.Thepolicywillalwayspermittransitpackets,butwillonlyusetheIPsecVPNmyTunnelalldayMonday andWednesday7amto6pm,andThursday7amto6pm.


    参考答案:C

  • 第3题:

    ExaminetheRMANcommand:SWITCHDATAFILE’/DISK3/user_data01.dbf’;Whichcommanddoyouneedtoissuebeforeyouissuetheabovecommand,sothatRMANfindsthefileintherestoredlocationof’DISK2/user_data01.dbf’?()

    A.RESTOREDATAFILE’/DISK2/user_data01.dbf’

    B.RESTOREDATAFILE’/DISK3/user_data01.dbf’

    C.SETNEWNAMEFOR’/DISK3/user_data01.dbf’TO’/DISK2/user_data01.dbf’

    D.SETNEWNAMEFOR’/DISK2/user_data01.dbf’TO’/DISK3/user_data01.dbf’


    参考答案:C

  • 第4题:

    Which statement contains the correct parameters for a route-based IPsec VPN?()

    A. [edit security ipsec] user@host# show proposal ike1-proposal { protocol esp; authentication-algorithm hmac-md5-96; encryption-algorithm 3des-cbc; lifetime-seconds 3200; }policy ipsec1-policy { perfect-forward-secrecy { keys group2; } proposals ike1-proposal; } vpn VpnTunnel { interface ge-0/0/1.0; ike { gateway ike1-gateway; ipsec-policy ipsec1-policy; } establish-tunnels immediately; }

    B. [edit security ipsec] user@host# show proposal ike1-proposal { protocol esp; authentication-algorithm hmac-md5-96; encryption-algorithm 3des-cbc; lifetime-seconds 3200; } policy ipsec1-policy { perfect-forward-secrecy { keys group2; } proposals ike1-proposal; } vpn VpnTunnel { interface st0.0; ike { gateway ike1-gateway; ipsec-policy ipsec1-policy; } establish-tunnels immediately; }

    C. [edit security ipsec] user@host# show proposal ike1-proposal { protocol esp; authentication-algorithm hmac-md5-96; encryption-algorithm 3des-cbc; lifetime-seconds 3200;} policy ipsec1-policy { perfect-forward-secrecy { keys group2; } proposals ike1-proposal; } vpn VpnTunnel { bind-interface ge-0/0/1.0; ike { gateway ike1-gateway; ipsec-policy ipsec1-policy; } establish-tunnels immediately; }

    D. [edit security ipsec] user@host# show proposal ike1-proposal { protocol esp; authentication-algorithm hmac-md5-96; encryption-algorithm 3des-cbc; lifetime-seconds 3200; }policy ipsec1-policy { perfect-forward-secrecy { keys group2; } proposals ike1-proposal; } vpn VpnTunnel { bind-interface st0.0; ike { gateway ike1-gateway; ipsec-policy ipsec1-policy; } establish-tunnels immediately; }


    参考答案:D

  • 第5题:

    YouissuethisSQLstatement:ALTERDATABASERENAMEFILE’/ORADATA/u02/user_data01.dbf’TO’/ORADATA/u04/user_data01.dbf’;WhatdoesthisSQLstatementdo?()

    A.Itupdatesthecontrolfilewiththenewlocationofthedatafile.

    B.Itupdatesonlythedatadictionarywiththenewlocationofthedatafile.

    C.Itchangesthelocationoftheuser_data01.dbffileintheoperatingsystem.

    D.Itchangesthelocationoftheuser_data01.dbffileintheoperatingsystemandupdatesthecontrolfilewiththenewlocationofthedatafile.


    参考答案:A

  • 第6题:

    在Oracle中,()数据字典表可以用来查看抽象数据类型的实际结构。

    A.USER_TYPE_ATTRS

    B.USER_TABLES

    C.USER_TYPE_TABS

    D.USER_TAB_COLUMNS


    参考答案:A