单选题Data encryption and decryption occurs at which layer of the OSI model?()ATransportBPresentationCSessionDApplication

单选题
Data encryption and decryption occurs at which layer of the OSI model?()
A

Transport

B

Presentation

C

Session

D

Application


参考解析

解析: 暂无解析

相关考题:

Which OSI layer does a Router operate at?A.the Physical LayerB.the Data Link LayerC.the Transfer LayerD.the Network Layer

Which layer in the OSI model is responsible for translating frames into bits?() A. Application LayerB. Presentation LayerC. Data Link LayerD. Physical Layer

Data encryption and decryption occurs at which layer of the OSI model?() A.TransportB.PresentationC.SessionD.Application

Which design topology incurs a performance penalty since there are two encryption-decryption cycles between any two remote sites?() A. peer-to-peerB. partial meshC. hub and spokeD. full mesh

Which layer of the OSI reference model uses flow control, sequencing, and acknowledgements to ensure that reliable networking occurs?() A. data linkB. networkC. transportD. presentationE. physical

At which layer of the OSI model is RSTP used to prevent loops?() A.data linkB.networkC.physicalD.transport

IPsec, also known as the internet Protocol ( ) , defines the architecture for security services for IP network traffic IPsec describes the framework for providing security a the IP layer, as well as the suite of protocols designed to provide that security: through_ ( )_ and encryption of IP network packets. IPec can be used 10 protect network data, for example, by setting up circuits using IPsec ( ), in which all data being sent between two endpoints is encrypted, as with a Virtual (请作答此空) Network connection ;for encrypting application layer data ;and for providing security for routers sending routing data across the public internet. Internet traffic can also be secured from host to host without the use of IPsec, for example by encryption at the ( ) layer with HTTP Secure (TTPS)or an the transport layer wit the Transport Layer Security (TLS)protocol.A.pubic]B.private]C.personalD.proper

Which of the following best describes a hash function?()A、An irreversible fast encryption methodB、A reversible fast encryption methodC、A reversible value computed from a piece of data and used to detect modificationsD、An irreversible value computed froma piece of data and used to detect modificationsE、A table inwhich values are stored for efficient retrieval.

At which of the following OSI model layers is HTTPS encryption performed?()A、Layer 3B、Layer 5C、Layer 6D、Layer 7

Which of these user ICAP?()A、 anti-malware scanningB、 data loss prevention policesC、 decryption policiesD、 CiscoIronPort Data Security policies

Which description about asymmetric encryption algorithms is correct?()A、They use the same key for encryption and decryption of data.B、They use different keys for decryption but the same key for encryption of data.C、They use different keys for encryption and decryption of data.D、They use the same key for decryption but different keys for encryption of data.

At which layer of the OSI model is RSTP used to prevent loops?()A、data linkB、networkC、physicalD、transport

Which statement about data center access layer design modes is correct?()A、The access layer is the first oversubscription point in a data center design.B、When using a Layer 2 loop-free design, VLANs are extended into the aggregation layer.C、When using a Layer 2 looped design, VLANs are not extended into the aggregation layer.D、When using a Layer 3 design,stateful services requiring Layer 2 connectivity are provisioned from the aggregation layer.E、The data center access layer provides the physical-level connections to the server resources and only operates at Layer 3.

Which layer of the OSI reference model is responsible for ensuring reliable end-to-end delivery of data?()A、ApplicationB、PresentationC、SessionD、TransportE、NetworkF、Data-Link

Which layer of the OSI reference model uses flow control, sequencing, and acknowledgements to ensure that reliable networking occurs?()A、data linkB、networkC、transportD、presentationE、physical

Data encryption and decryption occurs at which layer of the OSI model?()A、TransportB、PresentationC、SessionD、Application

Which layer in the OSI model is responsible for translating frames into bits?()A、Application LayerB、Presentation LayerC、Data Link LayerD、Physical Layer

Which two statements regarding asymmetric key encryption are true?()A、The same key is used for encryption and decryption.B、It is commonly used to create digital certificate signatures.C、It uses two keys: one for encryption and a different key for decryption.D、An attacker can decrypt data if the attacker captures the key used for encryption

单选题Which of the following best describes a hash function?()AAn irreversible fast encryption methodBA reversible fast encryption methodCA reversible value computed from a piece of data and used to detect modificationsDAn irreversible value computed froma piece of data and used to detect modificationsEA table inwhich values are stored for efficient retrieval.

多选题Which two statements regarding asymmetric key encryption are true?()AThe same key is used for encryption and decryption.BIt is commonly used to create digital certificate signatures.CIt uses two keys: one for encryption and a different key for decryption.DAn attacker can decrypt data if the attacker captures the key used for encryption

单选题Which encryption type is used to secure user data in an IPsec tunnel?()Asymmetric key encryptionBasymmetric key encryptionCRSADdigital certificates

单选题Which design topology incurs a performance penalty since there are two encryption-decryption cycles between any two remote sites?()Apeer-to-peerBpartial meshChub and spokeDfull mesh

单选题Which of these user ICAP?()A anti-malware scanningB data loss prevention policesC decryption policiesD CiscoIronPort Data Security policies

单选题Which of the following is used by BitLocker to lock an encryption key and protect data?()AECPBIRQCAGPDTPM

多选题Which two statements regarding symmetric key encryption are true?() (Choose two.)AThe same key is used for encryption and decryption.BIt is commonly used to create digital certificate signatures.CIt uses two keys: one for encryption and a different key for decryption.DAn attacker can decrypt data if the attacker captures the key used for encryption.

单选题Which description about asymmetric encryption algorithms is correct?()AThey use the same key for encryption and decryption of data.BThey use different keys for decryption but the same key for encryption of data.CThey use different keys for encryption and decryption of data.DThey use the same key for decryption but different keys for encryption of data.

单选题Which statement about data center access layer design modes is correct?()A The access layer is the first oversubscription point in a data center design.B When using a Layer 2 loop-free design, VLANs are extended into the aggregation layer.C When using a Layer 2 looped design, VLANs are not extended into the aggregation layer.D When using a Layer 3 design, stateful services requiring Layer 2 connectivity are provisionedfrom the aggregation layer.E The data center access layer provides the physical-level connections to the server resourcesand only operates at Layer 3.

单选题Which layer of the OSI reference model uses flow control, sequencing, and acknowledgements to ensure that reliable networking occurs?()Adata linkBnetworkCtransportDpresentationEphysical