S/MIME
SSH
3DES
IPSec
第1题:
A. symmetric key encryption
B. asymmetric key encryption
C. RSA
D. digital certificates
第2题:
A.Port scan
B.Ping sweep
C.IDS
D.NIPS
第3题:
●Which of the following methods is used to increase the number of processes sharing the CPU? (72) .
(72) A.Interrupt
B.Scheduler
C.Working Set
D.Swapping
第4题:
Which of the following is used to identify active hosts along with their network addresses?()
第5题:
Which of the following is used by BitLocker to lock an encryption key and protect data?()
第6题:
A. dial-up VPN
B. IKE authentication
C. XAuth authentication
D. shared IKE authentication
第7题:
A.S/MIME
B.SSH
C.3DES
D.IPSec
第8题:
Which of the following methods is used to increase the number of processes sharing the CPU?
A.Interrupt
B.Scheduler
C.Swapping
D.Working Set
第9题:
Which of the following protocols would MOST likely be used in the establishment of an IPSec VPN tunnel?()
第10题:
Which of the following encryption methods is often used along with L2TP?()