CMS专题

单选题Which encryption type is used to secure user data in an IPsec tunnel?()A symmetric key encryptionB asymmetric key encryptionC RSAD digital certificates

题目
单选题
Which encryption type is used to secure user data in an IPsec tunnel?()
A

symmetric key encryption

B

asymmetric key encryption

C

RSA

D

digital certificates

如果没有搜索结果,请直接 联系老师 获取答案。
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

The enable secret command is used to secure access to which CLI mode?()

  • A、user EXEC mode
  • B、global configuration mode
  • C、privileged EXEC mode
  • D、auxiliary setup mode

正确答案:C

第2题:

Which of the following standards or encryption types is the MOST secure for wireless networking?()

  • A、WEP
  • B、AES
  • C、TKIP
  • D、DES

正确答案:B

第3题:

Which encryption type is used to secure user data in an IPsec tunnel?()

A. symmetric key encryption

B. asymmetric key encryption

C. RSA

D. digital certificates


参考答案:A

第4题:

Which of the following technologies is the MOST secure form of wireless encryption?()

  • A、SSL
  • B、WPA
  • C、WEP
  • D、TLS

正确答案:B

第5题:

For an incomplete recovery, which four backup types can be used by Recovery Manager (RMAN) to restore data files? ()

  • A、RMAN image copies
  • B、RMAN database backups
  • C、RMAN tablespace backups
  • D、user­managed backups placed in the flash recovery area
  • E、user­managed backups that have been cataloged with RMAN
  • F、user­managed data file backups for which the full path name is specified

正确答案:A,B,C,E

第6题:

Which of the following best describes a hash function?()

  • A、An irreversible fast encryption method
  • B、A reversible fast encryption method
  • C、A reversible value computed from a piece of data and used to detect modifications
  • D、An irreversible value computed froma piece of data and used to detect modifications
  • E、A table inwhich values are stored for efficient retrieval.

正确答案:D

第7题:

Which statement is true regarding a session key in the Diffie-Hellman key-exchange process?()

  • A、A session key value is exchanged across the network.
  • B、A session key never passes across the network.
  • C、A session key is used as the key for asymmetric data encryption.
  • D、A session key is used as the key for symmetric data encryption.

正确答案:B

第8题:

The enable secret command is used to secure access to which CLI mode?()

A.user EXEC mode

B.global configuration mode

C.privileged EXEC mode

D.auxiliary setup mode


参考答案:C

第9题:

Which description about asymmetric encryption algorithms is correct?()

  • A、They use the same key for encryption and decryption of data.
  • B、They use different keys for decryption but the same key for encryption of data.
  • C、They use different keys for encryption and decryption of data.
  • D、They use the same key for decryption but different keys for encryption of data.

正确答案:C

第10题:

A customer has security concerns about classified local data being compromised if the laptop isstolen. The customers laptop has Windows 2000 utilizing the FAT16 file system. Which of the following actions should be taken?()

  • A、Upgrade the operating system to Windows XP Home.
  • B、Have the customer convert to NTFS and enable data encryption.
  • C、Tell the customer that a laptop should not be used for classified data.
  • D、Configure the wireless adapter to only connect to secure networks.

正确答案:B

更多相关问题