单选题Which of the following is the encryption algorithm used for priv option when using SNMPv3?()AHMAC-SHABHMAC-MD5CCBC-DESDAESE3DES

单选题
Which of the following is the encryption algorithm used for priv option when using SNMPv3?()
A

HMAC-SHA

B

HMAC-MD5

C

CBC-DES

D

AES

E

3DES


参考解析

解析: 暂无解析

相关考题:

Which of the following standards or encryption types is the MOST secure for wireless networking?() A.WEPB.AESC.TKIPD.DES

Which two wireless encryption methods are based on the RC4 encryption algorithm?() A.WEPB.CCKMC.AESD.TKIPE.CCMP

Which one of the following is NOT a supported IKE attribute?()A、 PFS group.B、 Encryption algorithm.C、 Hashing Algorithm.D、 Authenticationmethod.E、 Lifetime duration.

Which of the following is the encryption algorithm used for priv option when using SNMPv3?()A、HMAC-SHAB、HMAC-MD5C、CBC-DESD、AESE、3DES

Which of the following best describes a hash function?()A、An irreversible fast encryption methodB、A reversible fast encryption methodC、A reversible value computed from a piece of data and used to detect modificationsD、An irreversible value computed froma piece of data and used to detect modificationsE、A table inwhich values are stored for efficient retrieval.

Which of the following standards or encryption types is the MOST secure for wireless networking?()A、WEPB、AESC、TKIPD、DES

在配置IPSec的安全提议proposal时,以下命令属于缺省配置的是()。A、encapsulation-mode tunnelB、transform espC、esp encryption-algorithm desD、esp encryption-algorithm 3desE、esp authentication-algorithm md5

Which algorithm was the first to be found suitable for both digital signing and encryption?()A、HMACB、RSAC、MD5D、SHA-1

Which one of the following answer choices below is true regarding the OSPF topology database?()A、All entries in the topology database will be included on each router.B、All routers in the same OSPF area will have one topology database.C、The Dijkstra algorithm is used in the creation of the topology database.D、LSA packets are used to update and maintain the topology database.

What are three security problems with Wi-Fi Protected Access (WPA)?()A、WPA is based on the outdated IEEE 802.11i standard.B、WPA uses RSN,which uses the same base encryption algorithm as RC4.C、WPA requires a hardware upgrade that may not be supported by all vendors.D、WPA uses TKIP,which uses the same base encryption algorithm as WEP.E、WPA is susceptible to a DoS attack when it receives two packets in quick succession with bad MICs,forcing the AP to shut down the entire Basic Service Set (BSS) for one minute.F、WPA is susceptible to a security weakness when preshared keys are used.

Which two wireless encryption methods are based on the RC4 encryption algorithm? ()A、WEPB、CCKMC、AESD、TKIPE、CCMP

Which of the following technologies is the MOST secure form of wireless encryption?()A、SSLB、WPAC、WEPD、TLS

Which of the following encryption methods is often used along with L2TP?()A、S/MIMEB、SSHC、3DESD、IPSec

A storage specialist is talking to a company about ProtecTIER. The customer wants to know howthe TS7650 Appliance can help reduce storage costs. Which of the following provides patentedpattern recognition designed to reduce storage needs by up to a factor of 25, and radicallyreducing costs?()A、Encryption Key Management B、Hashing Deduplication Algorithm C、Random Access Compression (RACE) D、HyperFactor Deduplication Technology

The ERX Edge Router in your Bridged 1483 network has multiple external DHCP servers configured.During discovery, which algorithm does the router use to decide which DHCP server to send packets to?()A、direct modeB、round robinC、weighted round robinD、No algorithm is used.

Which two statements regarding asymmetric key encryption are true?()A、The same key is used for encryption and decryption.B、It is commonly used to create digital certificate signatures.C、It uses two keys: one for encryption and a different key for decryption.D、An attacker can decrypt data if the attacker captures the key used for encryption

单选题Which of the following best describes a hash function?()AAn irreversible fast encryption methodBA reversible fast encryption methodCA reversible value computed from a piece of data and used to detect modificationsDAn irreversible value computed froma piece of data and used to detect modificationsEA table inwhich values are stored for efficient retrieval.

多选题Which two wireless encryption methods are based on the RC4 encryption algorithm?()AWEPBCCKMCAESDTKIPECCMP

多选题Which two statements regarding asymmetric key encryption are true?()AThe same key is used for encryption and decryption.BIt is commonly used to create digital certificate signatures.CIt uses two keys: one for encryption and a different key for decryption.DAn attacker can decrypt data if the attacker captures the key used for encryption

单选题Which one of the following is NOT a supported IKE attribute?()A PFS group.B Encryption algorithm.C Hashing Algorithm.D Authenticationmethod.E Lifetime duration.

单选题For the following statements, which one is the strongest symmetrical encryption algorithm?()AAESB3DESCDESDDiffie-Hellman

单选题Which algorithm was the first to be found suitable for both digital signing and encryption?()AHMACBRSACMD5DSHA-1

单选题Which of the following is used by BitLocker to lock an encryption key and protect data?()AECPBIRQCAGPDTPM

多选题Which two statements regarding symmetric key encryption are true?() (Choose two.)AThe same key is used for encryption and decryption.BIt is commonly used to create digital certificate signatures.CIt uses two keys: one for encryption and a different key for decryption.DAn attacker can decrypt data if the attacker captures the key used for encryption.

单选题Which one of the following answer choices below is true regarding the OSPF topology database?()AAll entries in the topology database will be included on each router.BAll routers in the same OSPF area will have one topology database.CThe Dijkstra algorithm is used in the creation of the topology database.DLSA packets are used to update and maintain the topology database.

单选题The ERX Edge Router in your Bridged 1483 network has multiple external DHCP servers configured.During discovery, which algorithm does the router use to decide which DHCP server to send packets to?()Adirect modeBround robinCweighted round robinDNo algorithm is used.

多选题What are three security problems with Wi-Fi Protected Access (WPA)?()AWPA is based on the outdated IEEE 802.11i standard.BWPA uses RSN,which uses the same base encryption algorithm as RC4.CWPA requires a hardware upgrade that may not be supported by all vendors.DWPA uses TKIP,which uses the same base encryption algorithm as WEP.EWPA is susceptible to a DoS attack when it receives two packets in quick succession with bad MICs,forcing the AP to shut down the entire Basic Service Set (BSS) for one minute.FWPA is susceptible to a security weakness when preshared keys are used.