CORRECT TEXT

CORRECT TEXT The keys used by the IPSec encryption and authentication algorithms can be configured manually or dynamically negotiated via the ____ protocol. (abbreviation, all uppercase).View AnswerAnswer: IKE

January 4, 2023No CommentsREAD MORE +

What is the protocol number of the GRE protocol?

What is the protocol number of the GRE protocol?A . 47 B. 48 C. 46 D. The 50thView AnswerAnswer: A

January 3, 2023No CommentsREAD MORE +

CORRECT TEXT

CORRECT TEXT The keys used by the IPSec encryption and authentication algorithms can be configured manually or dynamically negotiated via the ____ protocol. (abbreviation, all uppercase).View AnswerAnswer: IKE

January 3, 2023No CommentsREAD MORE +

At what layer does packet filtering technology in the firewall filter packets?

At what layer does packet filtering technology in the firewall filter packets?A . Transport layer B. Network layer C. Physical layer D. Data link layerView AnswerAnswer: B

January 3, 2023No CommentsREAD MORE +

Digital envelope technology means that the sender uses the receiver's public key to encrypt the data, and then sends the ciphertext to the receiver () [Multiple choice] *

Digital envelope technology means that the sender uses the receiver's public key to encrypt the data, and then sends the ciphertext to the receiver () [Multiple choice] *A . TRUE B. FALSEView AnswerAnswer: B

January 3, 2023No CommentsREAD MORE +

The following description of asymmetric encryption algorithms, which item is wrong?

The following description of asymmetric encryption algorithms, which item is wrong?A . Compared with symmetric encryption algorithms, the security factor is higher. B. Encryption is faster than symmetric encryption algorithms. C. Public keys are generally disclosed to users. D. Asymmetric encryption algorithms are a pair of keys, divided into public...

January 3, 2023No CommentsREAD MORE +

To meet the above requirements, which of the following servers do enterprises need to deploy?

When the enterprise accesses the internal webpage of the enterprise, the enterprise can directly enter the domain name in the browser to access. To meet the above requirements, which of the following servers do enterprises need to deploy? ()A . Time synchronization server B. FTP server (I) C. DNS server...

January 2, 2023No CommentsREAD MORE +

CORRECT TEXT

CORRECT TEXT The keys used by the IPSec encryption and authentication algorithms can be configured manually or dynamically negotiated via the ____ protocol. (abbreviation, all uppercase).View AnswerAnswer: IKE

January 1, 2023No CommentsREAD MORE +

The following description of the AH protocol in IPSec VPN, which one is wrong?

The following description of the AH protocol in IPSec VPN, which one is wrong?A . Supports data source validation B. Supports data integrity checking C. Supports packet encryption D. Support anti-message replayView AnswerAnswer: C

January 1, 2023No CommentsREAD MORE +

The trigger authentication method for firewall access user authentication does not include which of the following? () [Multiple choice]

The trigger authentication method for firewall access user authentication does not include which of the following? () [Multiple choice]A . MPLS VPN B. SSL VPN C. IPSec VPN D. L2TP VPNView AnswerAnswer: A

January 1, 2023No CommentsREAD MORE +