Which of the following are suitable protocols for securing VPN connections at the lower layers of the OSI model?在OSI的低层模型中,以下哪项协议适合用于VPN的安全连接()A、PKCS#10 and X.509B、TLS and SSLC、IPsec and L2TPD、S/MIME and SSH
Which of the following are suitable protocols for securing VPN connections at the lower layers of the OSI model?在OSI的低层模型中,以下哪项协议适合用于VPN的安全连接()
- A、PKCS#10 and X.509
- B、TLS and SSL
- C、IPsec and L2TP
- D、S/MIME and SSH
相关考题:
Which of the following is a performance optimization technology?()A、QoSB、TrunkingC、SpanningD、VoIP
Which of the following utilities are used to choose which programs run at startup? ()A、SFCB、SETDEBUGC、MSCONFIGD、REGEDIT
Which of the following commands will be run at a command prompt to determine which WindowsOS is running on the computer?()A、VERB、Device ManagerC、VERIFYD、SET
单选题Which of the following technologies can improve convergence time following a link failure in a serviceprovider network?()AMPLS TE FRBMPLS VPNCBFDDRSVPEVPLSFSNMP
单选题Which of the following is a hybrid network topology used for fault tolerance, in which all computersMUST connect to each other?()AStarBRingCBusDMesh