- All Exams Instant Download
CORRECT TEXT
CORRECT TEXT The keys used by the IPSec encryption and authentication algorithms can be configured manually or dynamically negotiated via the ____ protocol. (abbreviation, all uppercase).View AnswerAnswer: IKE
What is the protocol number of the GRE protocol?
What is the protocol number of the GRE protocol?A . 47 B. 48 C. 46 D. The 50thView AnswerAnswer: A
CORRECT TEXT
CORRECT TEXT The keys used by the IPSec encryption and authentication algorithms can be configured manually or dynamically negotiated via the ____ protocol. (abbreviation, all uppercase).View AnswerAnswer: IKE
At what layer does packet filtering technology in the firewall filter packets?
At what layer does packet filtering technology in the firewall filter packets?A . Transport layer B. Network layer C. Physical layer D. Data link layerView AnswerAnswer: B
Digital envelope technology means that the sender uses the receiver's public key to encrypt the data, and then sends the ciphertext to the receiver () [Multiple choice] *
Digital envelope technology means that the sender uses the receiver's public key to encrypt the data, and then sends the ciphertext to the receiver () [Multiple choice] *A . TRUE B. FALSEView AnswerAnswer: B
The following description of asymmetric encryption algorithms, which item is wrong?
The following description of asymmetric encryption algorithms, which item is wrong?A . Compared with symmetric encryption algorithms, the security factor is higher. B. Encryption is faster than symmetric encryption algorithms. C. Public keys are generally disclosed to users. D. Asymmetric encryption algorithms are a pair of keys, divided into public...
To meet the above requirements, which of the following servers do enterprises need to deploy?
When the enterprise accesses the internal webpage of the enterprise, the enterprise can directly enter the domain name in the browser to access. To meet the above requirements, which of the following servers do enterprises need to deploy? ()A . Time synchronization server B. FTP server (I) C. DNS server...
CORRECT TEXT
CORRECT TEXT The keys used by the IPSec encryption and authentication algorithms can be configured manually or dynamically negotiated via the ____ protocol. (abbreviation, all uppercase).View AnswerAnswer: IKE
The following description of the AH protocol in IPSec VPN, which one is wrong?
The following description of the AH protocol in IPSec VPN, which one is wrong?A . Supports data source validation B. Supports data integrity checking C. Supports packet encryption D. Support anti-message replayView AnswerAnswer: C
The trigger authentication method for firewall access user authentication does not include which of the following? () [Multiple choice]
The trigger authentication method for firewall access user authentication does not include which of the following? () [Multiple choice]A . MPLS VPN B. SSL VPN C. IPSec VPN D. L2TP VPNView AnswerAnswer: A