CCIE系列认证

单选题Which of the following is the encryption algorithm used for priv option when using SNMPv3?()A HMAC-SHAB HMAC-MD5C CBC-DESD AESE 3DES

题目
单选题
Which of the following is the encryption algorithm used for priv option when using SNMPv3?()
A

HMAC-SHA

B

HMAC-MD5

C

CBC-DES

D

AES

E

3DES

如果没有搜索结果,请直接 联系老师 获取答案。
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which one of the following is NOT a supported IKE attribute?()

  • A、 PFS group.
  • B、 Encryption algorithm.
  • C、 Hashing Algorithm.
  • D、 Authenticationmethod.
  • E、 Lifetime duration.

正确答案:A

第2题:

Which of the following best describes a hash function?()

  • A、An irreversible fast encryption method
  • B、A reversible fast encryption method
  • C、A reversible value computed from a piece of data and used to detect modifications
  • D、An irreversible value computed froma piece of data and used to detect modifications
  • E、A table inwhich values are stored for efficient retrieval.

正确答案:D

第3题:

Which of the following standards or encryption types is the MOST secure for wireless networking?()

A.WEP

B.AES

C.TKIP

D.DES


参考答案:B

第4题:

Which one of the following answer choices below is true regarding the OSPF topology database?()

  • A、All entries in the topology database will be included on each router.
  • B、All routers in the same OSPF area will have one topology database.
  • C、The Dijkstra algorithm is used in the creation of the topology database.
  • D、LSA packets are used to update and maintain the topology database.

正确答案:D

第5题:

在配置IPSec的安全提议proposal时,以下命令属于缺省配置的是()。

  • A、encapsulation-mode tunnel
  • B、transform esp
  • C、esp encryption-algorithm des
  • D、esp encryption-algorithm 3des
  • E、esp authentication-algorithm md5

正确答案:A,B,C,E

第6题:

Which of the following is the encryption algorithm used for priv option when using SNMPv3?()

  • A、HMAC-SHA
  • B、HMAC-MD5
  • C、CBC-DES
  • D、AES
  • E、3DES

正确答案:C

第7题:

Which of the following standards or encryption types is the MOST secure for wireless networking?()

  • A、WEP
  • B、AES
  • C、TKIP
  • D、DES

正确答案:B

第8题:

Which two wireless encryption methods are based on the RC4 encryption algorithm?()

A.WEP

B.CCKM

C.AES

D.TKIP

E.CCMP


参考答案:A, D

第9题:

Which algorithm was the first to be found suitable for both digital signing and encryption?()

  • A、HMAC
  • B、RSA
  • C、MD5
  • D、SHA-1

正确答案:B

第10题:

What are three security problems with Wi-Fi Protected Access (WPA)?()

  • A、WPA is based on the outdated IEEE 802.11i standard.
  • B、WPA uses RSN,which uses the same base encryption algorithm as RC4.
  • C、WPA requires a hardware upgrade that may not be supported by all vendors.
  • D、WPA uses TKIP,which uses the same base encryption algorithm as WEP.
  • E、WPA is susceptible to a DoS attack when it receives two packets in quick succession with bad MICs,forcing the AP to shut down the entire Basic Service Set (BSS) for one minute.
  • F、WPA is susceptible to a security weakness when preshared keys are used.

正确答案:D,E,F

更多相关问题