单选题Which of the following describes a secure connection over the Internet between two sites?()AFTPBVLANCVPNDHTTP

单选题
Which of the following describes a secure connection over the Internet between two sites?()
A

FTP

B

VLAN

C

VPN

D

HTTP


参考解析

解析: 暂无解析

相关考题:

Which of the following logical network topologies is used to provide a secure connection acrossthe Internet?() A.VLANB.Peer to PeerC.VTPD.VPN

Which of the following describes a secure connection over the Internet between two sites?() A. FTPB. VLANC. VPND. HTTP

VPN connections allow users working at home or on the road to connect in a secure fashion to a ( ) corporate server using the routing infrastructure provided by a public internetwork (such as the Internet). From the users perspective, the VPN connection is a point-to-point connection between the users computer and a corporate ( ). The nature of the ( ) internetwork is irrelevant to the user because it appears as if the data is being sent over a dedicated ( ) link. VPN technology also allows a corporation to connect to branch offices or to other companies over a public internetwork, while maintaining secure ( ). The VPN connection across the Internet logically operates as a wide area network link between the sites.A.customer B.network C.remote D.local A.router B.client C.host D.server A.medium B.intermediate C.remote D.local A.network B.private C.public D.local A.technology B.server C.host D.communications

IPsec, also known as the internet Protocol ( ) , defines the architecture for security services for IP network traffic IPsec describes the framework for providing security a the IP layer, as well as the suite of protocols designed to provide that security: through_ ( )_ and encryption of IP network packets. IPec can be used 10 protect network data, for example, by setting up circuits using IPsec ( ), in which all data being sent between two endpoints is encrypted, as with a Virtual (请作答此空) Network connection ;for encrypting application layer data ;and for providing security for routers sending routing data across the public internet. Internet traffic can also be secured from host to host without the use of IPsec, for example by encryption at the ( ) layer with HTTP Secure (TTPS)or an the transport layer wit the Transport Layer Security (TLS)protocol.A.pubic]B.private]C.personalD.proper

While considering security, which of the following is the BEST place for a public web server accessible via the Internet? ()A、 Internal networkB、 VLANC、 VPND、 DMZ

Router R1, a branch router, connects to the Internet using DSL. Some traffic flows through a GRE and IPsec tunnel, over the DSL connection, and into the core of an Enterprise network. The branch also allows local hosts to communicate directly with public sites in th e Internet over this same DSL connection. Which of the following answers defines how the branch NAT config avoids performing NAT for the Enterprise directed traffic but does perform NAT for the Internet - directed traffic?()A、By not enabling NAT on the I Psec tunnel interfaceB、By not enabling NAT on the GRE tunnel interfaceC、By configuring the NAT - referenced ACL to not permit the Enterprise trafficD、By asking the ISP to perform NAT in the cloud

Which of the following logical network topologies is used to provide a secure connection acrossthe Internet?()A、VLANB、Peer to PeerC、VTPD、VPN

A banking customer has a firewall between their AMM and the remote console which is used to configure the chassis and blades. Due to security concerns, port 80 (http) is being blocked, denying any http access to the AMM. Which of the following would facilitate remote communication with the AMM using a GUI interface?()A、port 443 - SSL connection B、port 8080 ?http C、port 22 - SSH CLI D、port 427 - SLP connection

Which of the following describes a secure connection over the Internet between two sites?()A、FTPB、VLANC、VPND、HTTP

The SCTP layer in the C7 signalling protocol stack is responsible for which of the following:()A、Establishing a signaling channel between two signaling entities in an ATM networkB、Provide reliable connection for signaling between two IP signaling nodesC、Provide routing for IP signaling messages in an IP signaling network

What is the primary use of a remote access VPN?()A、to secure communication between two remote PCsB、to secure communication between two remote officesC、to secure communication betweenan remote PC and the corporate intranetD、to secure communication between a corporate intranet and the public internet

An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?()A、SSHB、WEPC、VPND、WPA

A technician needs to troubleshoot connectivity between two devices located on the same network. Which of the following BEST describes the type of protocol being used?()A、IGPB、EIGRPC、EGPD、BGP

A customer has two locations that host their pSeries servers.  Traffic is being routed through the public Internet.  The customer needs to exchange confidential financial data between the servers.  Which of the following solutions should the pSeries technical specialist propose to the customer to secure the data?()A、A DCE domainB、A Kerberos domainC、A PPP tunnel between the serversD、An IPSEC tunnel between the servers

A customer is planning on establishing a Global Mirror between two Storwize V7000 storagearrays. The customer is planning to lease an IP WAN connection between sites for the tasks andis running a SAP (database) application on Oracle. Which of the following planning considerationsis most important?()A、the distance between sites needs to be less than 100 kilometersB、consistency groups should be created to maintain write order on the remote mirrorC、ensure sufficient bandwidth exists on the link based on average application workloadsD、ensuring a low round trip latency of less than 30ms on the WAN connection is required

单选题A technician needs to troubleshoot connectivity between two devices located on the same network. Which of the following BEST describes the type of protocol being used?()AIGPBEIGRPCEGPDBGP

单选题A customer has two locations that host their pSeries servers.  Traffic is being routed through the public Internet.  The customer needs to exchange confidential financial data between the servers.  Which of the following solutions should the pSeries technical specialist propose to the customer to secure the data?()AA DCE domainBA Kerberos domainCA PPP tunnel between the serversDAn IPSEC tunnel between the servers

多选题Which two features prevent routing loops between the OSPF sites of a customer when the sites aremultihomed or a backdoor link is used between the sites? ()Asham linkBdown bitCvirtual linkDSite of OriginEdomain tag

单选题Which of the following logical network topologies is used to provide a secure connection acrossthe Internet?()AVLANBPeer to PeerCVTPDVPN

单选题What is the primary use of a remote access VPN?()Ato secure communication between two remote PCsBto secure communication between two remote officesCto secure communication betweenan remote PC and the corporate intranetDto secure communication between a corporate intranet and the public internet

单选题Which of the following best describes the relation between night and knight?AmetonymyBhomonymyCantonymyDhyponymy

单选题Which of the following describes a secure connection over the Internet between two sites?()AFTPBVLANCVPNDHTTP

单选题Which of the following is a secure method of copying information over a public network?()ASCPBSMTPCSNMPDTFTP

单选题Which of the following best describes the passage as a whole?AAn outline for future researchBAn expanded definition of commonly misunderstood termsCAn analysis of a dispute between two theoriesDA discussion of research findings in an ongoing inquiry

单选题While considering security, which of the following is the BEST place for a public web server accessible via the Internet? ()A Internal networkB VLANC VPND DMZ

单选题A banking customer has a firewall between their AMM and the remote console which is used to configure the chassis and blades. Due to security concerns, port 80 (http) is being blocked, denying any http access to the AMM. Which of the following would facilitate remote communication with the AMM using a GUI interface?()Aport 443 - SSL connection Bport 8080 ?http Cport 22 - SSH CLI Dport 427 - SLP connection

单选题Router R1, a branch router, connects to the Internet using DSL. Some traffic flows through a GRE and IPsec tunnel, over the DSL connection, and into the core of an Enterprise network. The branch also allows local hosts to communicate directly with public sites in th e Internet over this same DSL connection. Which of the following answers defines how the branch NAT config avoids performing NAT for the Enterprise directed traffic but does perform NAT for the Internet - directed traffic?()ABy not enabling NAT on the I Psec tunnel interfaceBBy not enabling NAT on the GRE tunnel interfaceCBy configuring the NAT - referenced ACL to not permit the Enterprise trafficDBy asking the ISP to perform NAT in the cloud

单选题A customer is planning on establishing a Global Mirror between two Storwize V7000 storagearrays. The customer is planning to lease an IP WAN connection between sites for the tasks andis running a SAP (database) application on Oracle. Which of the following planning considerationsis most important?()Athe distance between sites needs to be less than 100 kilometersBconsistency groups should be created to maintain write order on the remote mirrorCensure sufficient bandwidth exists on the link based on average application workloadsDensuring a low round trip latency of less than 30ms on the WAN connection is required