单选题Which of the following is the encryption algorithm used for priv option when using SNMPv3?()AHMAC-SHABHMAC-MD5CCBC-DESDAESE3DES

单选题
Which of the following is the encryption algorithm used for priv option when using SNMPv3?()
A

HMAC-SHA

B

HMAC-MD5

C

CBC-DES

D

AES

E

3DES


参考解析

解析: 暂无解析

相关考题:

Select the two correctstatements from the list below that describe DES and 3DES: ()A、 3DES is muchmore secure than DES.B、 Both DES and 3DES are stream ciphers.C、 DES uses 64 bitkeys, although the effective key lengthis only 56bits.D、 The decryption operation for both DES and 3DES is the same as the encryption operation.E、 DES can only be used for encryption, whereas 3DES can also be used for authentication.

Which one of the following is NOT a supported IKE attribute?()A、 PFS group.B、 Encryption algorithm.C、 Hashing Algorithm.D、 Authenticationmethod.E、 Lifetime duration.

Which of the following is used by BitLocker to lock an encryption key and protect data?()A、ECPB、IRQC、AGPD、TPM

Which of the following is the encryption algorithm used for priv option when using SNMPv3?()A、HMAC-SHAB、HMAC-MD5C、CBC-DESD、AESE、3DES

For the following statements, which one is the strongest symmetrical encryption algorithm?()A、AESB、3DESC、DESD、Diffie-Hellman

In the wireless Advanced Feature Set using lightweight access points, a virtual interface is used when supporting which of the following features?()A、PSK authenticationB、EAP authenticationC、WPA authenticationD、Web authentication

Refer to the exhibit. What does the option secret 5 in the username global configuration mode commandindicate about the enable secret password?()A、It is hashed using SHAB、It is encrypted using DH group 5C、It is hashed using MD5D、It is encrypted via the service password-encryption commandE、It is hashed using a proprietary Cisco hashing algorithmF、It is encrypted using a proprietary Cisco encryption algorithm

PEAP provides authentication for theEAP exchange using: ()A、 RC4B、 TLSC、 SSHD、 AESE、 3DES

What are three security problems with Wi-Fi Protected Access (WPA)?()A、WPA is based on the outdated IEEE 802.11i standard.B、WPA uses RSN,which uses the same base encryption algorithm as RC4.C、WPA requires a hardware upgrade that may not be supported by all vendors.D、WPA uses TKIP,which uses the same base encryption algorithm as WEP.E、WPA is susceptible to a DoS attack when it receives two packets in quick succession with bad MICs,forcing the AP to shut down the entire Basic Service Set (BSS) for one minute.F、WPA is susceptible to a security weakness when preshared keys are used.

Which of the following statements are true? ()A、 RC4 is a stream cipherB、 Stream ciphers require paddingC、 AES is a block cipherD、 DES and 3DES are stream ciphersE、 AES is a stream cipherF、 AES, DES, and 3DES can be used as HMAC algorithms

Which two wireless encryption methods are based on the RC4 encryption algorithm? ()A、WEPB、CCKMC、AESD、TKIPE、CCMP

Which of the following encryption methods is often used along with L2TP?()A、S/MIMEB、SSHC、3DESD、IPSec

You opened the encryption wallet and then issued the following command:   SQLCREATE TABLESPACE securespace DATAFILE ’/home/user/oradata/secure01.dbf’ SIZE 150M  ENCRYPTION USING ’3DES168’ DEFAULT STORAGE(ENCRYPT);   Then you closed the wallet. Later, you issued the following command to create theEMPLOYEES table in the SECURESPACE tablespace and you use the NO SALT option for the EMPID column.  What is the outcome?()  A、 It creates the table and encrypts the data in it.B、 It generates an error because the wallet is closed.C、 It creates the table but does not encrypt the data in it.D、 It generates an error because the NO SALT option cannot be used with the ENCRYPT option.

单选题For the following statements, which one is the strongest symmetrical encryption algorithm?()AAESB3DESCDESDDiffie-Hellman

多选题Which two wireless encryption methods are based on the RC4 encryption algorithm?()AWEPBCCKMCAESDTKIPECCMP

单选题In the wireless advanced feature set using lightweight access points, a virtual interface is used when supporting which of the following features?()Apsk authenticationBeap authenticationCwpa authenticationDweb authentication

多选题Which of the following features does SNMPv3 have over previous versions when remotely monitoring networking devices? ()(Select TWO).ATrap receiversBHTTPSCAuthenticationDPrivacyEAvailability

单选题PEAP provides authentication for theEAP exchange using: ()A RC4B TLSC SSHD AESE 3DES

单选题Refer to the exhibit. What does the option secret 5 in the username global configuration mode commandindicate about the enable secret password?()AIt is hashed using SHABIt is encrypted using DH group 5CIt is hashed using MD5DIt is encrypted via the service password-encryption commandEIt is hashed using a proprietary Cisco hashing algorithmFIt is encrypted using a proprietary Cisco encryption algorithm

单选题Which of the following is used by BitLocker to lock an encryption key and protect data?()AECPBIRQCAGPDTPM

单选题Which of the following encryption methods is often used along with L2TP?()AS/MIMEBSSHC3DESDIPSec

多选题Which of the following statements are true? ()ARC4 is a stream cipherBStream ciphers require paddingCAES is a block cipherDDES and 3DES are stream ciphersEAES is a stream cipherFAES, DES, and 3DES can be used as HMAC algorithms

多选题Which two are advantages of static routing when compared to dynamic routing?()ASecurity increases because only the network administrator may change the routing tablesBConfiguration complexity decreases as network size increasesCRouting updates are automatically sent to neighborsDRoute summarization is compued automatically by the routerERouting traffic load is reduced when used in stub network linksFAn efficient algorithm is used to build routing tables,using automatic updatesGRouting tables adapt automatically to topology changes.

多选题Select the two correctstatements from the list below that describe DES and 3DES: ()A3DES is muchmore secure than DES.BBoth DES and 3DES are stream ciphers.CDES uses 64 bitkeys, although the effective key lengthis only 56bits.DThe decryption operation for both DES and 3DES is the same as the encryption operation.EDES can only be used for encryption, whereas 3DES can also be used for authentication.

单选题You opened the encryption wallet and then issued the following command:   SQLCREATE TABLESPACE securespace DATAFILE ’/home/user/oradata/secure01.dbf’ SIZE 150M  ENCRYPTION USING ’3DES168’ DEFAULT STORAGE(ENCRYPT);   Then you closed the wallet. Later, you issued the following command to create theEMPLOYEES table in the SECURESPACE tablespace and you use the NO SALT option for the EMPID column.  What is the outcome?()A It creates the table and encrypts the data in it.B It generates an error because the wallet is closed.C It creates the table but does not encrypt the data in it.D It generates an error because the NO SALT option cannot be used with the ENCRYPT option.

多选题What are three security problems with Wi-Fi Protected Access (WPA)?()AWPA is based on the outdated IEEE 802.11i standard.BWPA uses RSN,which uses the same base encryption algorithm as RC4.CWPA requires a hardware upgrade that may not be supported by all vendors.DWPA uses TKIP,which uses the same base encryption algorithm as WEP.EWPA is susceptible to a DoS attack when it receives two packets in quick succession with bad MICs,forcing the AP to shut down the entire Basic Service Set (BSS) for one minute.FWPA is susceptible to a security weakness when preshared keys are used.

单选题Which one of the following is NOT a supported IKE attribute?()A PFS group.B Encryption algorithm.C Hashing Algorithm.D Authenticationmethod.E Lifetime duration.