单选题Which of the following protocols would MOST likely be used in the establishment of an IPSec VPN tunnel?()AAESBTKIPC802.1qDISAKMP

单选题
Which of the following protocols would MOST likely be used in the establishment of an IPSec VPN tunnel?()
A

AES

B

TKIP

C

802.1q

D

ISAKMP


参考解析

解析: 暂无解析

相关考题:

Which of the following expansion slots would be MOST likely used to install an additional NIC into a desktop PC?() A. PCIB. AGP 8xC. Mini PCID. PCI Express x16

Which of the following protocols would be used in order to log into a router to configure a VLAN?() A.RDPB.SMTPC.TELNETD.FTP

Which of the following protocols would MOST likely be used in the establishment of an IPSec VPN tunnel?() A. AESB. TKIPC. 802.1qD. ISAKMP

Which of the following devices would MOST likely integrate a DHCP server?() A.RouterB.HubC.SwitchD.Bridge

Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?() A.IDSB.VPNC.NIPSD.HIDS

Which of the following would MOST likely be used to punch down LAN cables before connecting them to the main switch?()A、IDFB、66 blockC、MDFD、110 block

Which of the following commands would a technician MOST likely use to map a printer from aremote computer?()A、NET USEB、IPCONFIGC、NSLOOKUPD、TRACERT

Which of the following bottlenecks would MOST likely cause excessive hard drive activity?()A、Inadequate RAMB、Slow processorC、PCI busD、Excessive network traffic

Which of the following protocols would MOST likely be used in the establishment of an IPSec VPN tunnel?()A、 AES B、 TKIPC、 802.1qD、 ISAKMP

An administrator has removed a SATA hard drive from a failed server. Which of the following adapters would MOST likely be used by the administrator to transfer files from the drive to a laptop?()A、SATA to SCSIB、SATA to HBAC、SATA to USBD、SATA to SAS

Which of the following would MOST likely be used with multimode fiber?()A、10GBase-LRB、10GBase-TC、10GBase-ERD、10GBase-SR

Which of the following types of media would MOST likely cause above normal amounts of machine jamming?()A、EnvelopesB、Colored mediaC、LetterheadD、Pre punched

Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?()A、IDSB、VPNC、NIPSD、HIDS

Which of the following ports is MOST likely used for high-end graphics cards?()A、PCIB、PCIeC、ISAD、AGP

Which of the following expansion slots would be MOST likely used to install an additional NIC into a desktop PC?()A、PCIB、AGP 8xC、Mini PCID、PCI Express x16

Which of the following protocols would be used in order to log into a router to configure a VLAN?()A、RDPB、SMTPC、TELNETD、FTP

Which of the following protocols would MOST likely be used in the establishment of an IPSec VPN tunnel?()A、AESB、TKIPC、802.1qD、ISAKMP

Which of the following connector interfaces is MOST likely used to connect several peripheraldevices such as printers, digital cameras, and scanners?()A、ParallelB、USBC、FibreD、SATA3

Which of the following commands would MOST likely be used to see where a loss of connectivity between two devices on a network is located?()A、tracertB、netstatC、nslookupD、ping

Which of the following is the MOST likely authentication scheme used in 802.1x?()A、CHAPB、RADIUSC、TACACS+D、Kerberos

Which of the following devices would MOST likely integrate a DHCP server?()A、RouterB、HubC、SwitchD、Bridge

单选题For the IP address 192.168.2.1 which of the following subnet masks would be MOST likely used?()A255.255.0.0B255.255.248.0C255.255.255.0D255.255.255.255

单选题A user is reporting that their computer is making strange noises and randomly powers off. Which of the following tools would MOST likely be used to troubleshoot this problem?()APOST diagnostic cardBPower supply testerCLoop back plugDCable tester

单选题Which of the following wiring standards would MOST likely be used to interconnect two devices without the use of a hub or switch?()A568AB568BCCrossoverDLoopback

单选题Which of the following protocols would MOST likely be used in the establishment of an IPSec VPN tunnel?()A AES B TKIPC 802.1qD ISAKMP

单选题Which of the following protocols would be used to test if one host is reachable by another host, by sending echo requests and waiting for echo replies?()ASNMPBICMPCTCPDUDP