authorization
data integrity
confidentiality
authentication
第1题:
Cisco provides two enhancements to 802.11 security which protect a WEP key from exploits. Which two technologies provide these security enhancements? ()
第2题:
For a given Servlet Response response, which retrieves an object for writing binary data? ()
第3题:
A. LDP uses Down Stream On Demand.
B. RSVP uses Down Stream On Demand.
C. LDP uses Down Stream Unsolicited.
D. RSVP uses Down Stream Unsolicited.
第4题:
Which two authentication mechanisms provide weaker protection than other mechanisms?()
第5题:
Which two statements are correct regarding MPLS LSP establishment methods?() (Choose two.)
第6题:
A datacenter director implements a new security measure in response to multiple equipment thefts from the datacenter. The new security measure requires people entering or leaving the data center to go through an extra secure area. Once entering the area people must present two forms of authentication to leave. Which of the following security measures does this describe?()
第7题:
Which two security mechanisms protect the response stream?()
第8题:
What are two ways in which the Cisco Security Monitoring, Analysis, and Response System provides superior network protection? ()
第9题:
Which two are needed components when designing and implementing a security solution?()
第10题:
Which two security mechanisms can be directed through a sub-element of the