Which encryption type is used to secure user data in an IPsec tunnel?()A、symmetric key encryptionB、asymmetric key encryptionC、RSAD、digital certificates

Which encryption type is used to secure user data in an IPsec tunnel?()

  • A、symmetric key encryption
  • B、asymmetric key encryption
  • C、RSA
  • D、digital certificates

相关考题:

Which encryption type is used to secure user data in an IPsec tunnel?() A. symmetric key encryptionB. asymmetric key encryptionC. RSAD. digital certificates

Which two LSA types can be used to aggregate inter-area routes?() A. Type 2B. Type 3C. Type 4D. Type 5E. Type 9

Which RIP message type is used to deliver route information to neighbors?() A.AB.BC.CD.D

When selecting a Network Interface Card (NIC), which of the following factors need to be considered?() A. The type of application used on the networkB. The type of system bus used by the computersC. The type of memory installed in each computerD. The type of media used in the network topologyE. The type of protocols used in the networkF. The physical layout of the network hosts

Which OSPF LSA is used to support MPLS traffic engineering?()A、opaque LSA (Type 8)B、opaque LSA (Type 9)C、link LSA (Type 1)D、network LSA (Type 2)E、opaque LSA (Type 10)

Which of the following best describes a hash function?()A、An irreversible fast encryption methodB、A reversible fast encryption methodC、A reversible value computed from a piece of data and used to detect modificationsD、An irreversible value computed froma piece of data and used to detect modificationsE、A table inwhich values are stored for efficient retrieval.

Which statement is true regarding a session key in the Diffie-Hellman key-exchange process?()A、A session key value is exchanged across the network.B、A session key never passes across the network.C、A session key is used as the key for asymmetric data encryption.D、A session key is used as the key for symmetric data encryption.

Which two LSA types can be used to aggregate inter-area routes?()A、Type 2B、Type 3C、Type 4D、Type 5E、Type 9

When selecting a Network Interface Card (NIC), which of the following factors need to be considered?()A、The type of application used on the networkB、The type of system bus used by the computersC、The type of memory installed in each computerD、The type of media used in the network topologyE、The type of protocols used in the networkF、The physical layout of the network hosts

Which two statements about OSPF IPv6 routing are true?()A、It requires OSPF version 3.B、automatically detects neighbors over NHMA interfacesC、It supports encryption usingD、It uses LSA type 9E、It uses LSA type 8

Which of the following type of lamp is used for heating a fuser?()A、XenonB、HalogenC、IncandescentD、Light Emitting Diode

Which of the following encryption methods is often used along with L2TP?()A、S/MIMEB、SSHC、3DESD、IPSec

Which two statements regarding asymmetric key encryption are true?()A、The same key is used for encryption and decryption.B、It is commonly used to create digital certificate signatures.C、It uses two keys: one for encryption and a different key for decryption.D、An attacker can decrypt data if the attacker captures the key used for encryption

单选题Which of the following best describes a hash function?()AAn irreversible fast encryption methodBA reversible fast encryption methodCA reversible value computed from a piece of data and used to detect modificationsDAn irreversible value computed froma piece of data and used to detect modificationsEA table inwhich values are stored for efficient retrieval.

单选题Which OSPF LSA is used to support MPLS traffic engineering?()Aopaque LSA (Type 8)Bopaque LSA (Type 9)Clink LSA (Type 1)Dnetwork LSA (Type 2)Eopaque LSA (Type 10)

单选题Which of the following is the encryption algorithm used for priv option when using SNMPv3?()AHMAC-SHABHMAC-MD5CCBC-DESDAESE3DES

单选题Which encryption type does WPA2 use?()AAES-CCMPBPPK via IVCPSKDTKIP/MIC

多选题Which two statements regarding asymmetric key encryption are true?()AThe same key is used for encryption and decryption.BIt is commonly used to create digital certificate signatures.CIt uses two keys: one for encryption and a different key for decryption.DAn attacker can decrypt data if the attacker captures the key used for encryption

单选题Which encryption type is used to secure user data in an IPsec tunnel?()Asymmetric key encryptionBasymmetric key encryptionCRSADdigital certificates

单选题Which type of zone is used by traffic transiting the device?()Atransit zoneBdefault zoneCsecurity zoneDfunctional zone

单选题Which routing instance type is used to facilitate filter-based forwarding?()AVRFBFBFCforwardingDno-forwarding

多选题Which two statements about OSPF IPv6 routing are true?()AIt requires OSPF version 3.Bautomatically detects neighbors over NHMA interfacesCIt supports encryption usingDIt uses LSA type 9EIt uses LSA type 8

多选题When selecting a Network Interface Card (NIC), which of the following factors need to be considered?()AThe type of application used on the networkBThe type of system bus used by the computersCThe type of memory installed in each computerDThe type of media used in the network topologyEThe type of protocols used in the networkFThe physical layout of the network hosts

单选题Which of the following is used by BitLocker to lock an encryption key and protect data?()AECPBIRQCAGPDTPM

单选题Which LSA is used in JUNOS software when a OSPF router restarts?()ALSA Type 6BLSA Type 9CLSA Type 10DLSA Type 11

多选题Which two statements regarding symmetric key encryption are true?() (Choose two.)AThe same key is used for encryption and decryption.BIt is commonly used to create digital certificate signatures.CIt uses two keys: one for encryption and a different key for decryption.DAn attacker can decrypt data if the attacker captures the key used for encryption.

单选题Which statement is true regarding a session key in the Diffie-Hellman key-exchange process?()AA session key value is exchanged across the network.BA session key never passes across the network.CA session key is used as the key for asymmetric data encryption.DA session key is used as the key for symmetric data encryption.

单选题You administer a SQL Server 2008 instance. The instance hosts a database that is used by a Web-based application. The application processes 15,000 transactions every minute. A table in the database contains a column that is used only by the application. This column stores sensitive data. You need to store the sensitive data in the most secure manner possible. You also need to ensure that you minimize the usage of memory space and processor time. Which encryption type should you use?()ASymmetric key encryptionBAsymmetric key encryptionCCertificate-based encryptionDTransparent data encryption