Which encryption type is used to secure user data in an IPsec tunnel?() A. symmetric key encryptionB. asymmetric key encryptionC. RSAD. digital certificates

Which encryption type is used to secure user data in an IPsec tunnel?()

A. symmetric key encryption

B. asymmetric key encryption

C. RSA

D. digital certificates


相关考题:

这个sql语句怎么写? 有三个表如下users(id,name);type(id,name);note(id,title,contents,user_id,author_id,type_id);其中,user_id是作者、author_id是原创作者都是与users中的id进行关联的,type_id是分类编号,与type的id关联。现在需要创建一个视图显示note中的id、title、contents、user_id、author_id、type_id、以及user_id、author_id、type_id对应的name。怎样写sql语句呢?

Which configuration shows the correct application of a security policy scheduler?() A. [edit security policies from-zone Private to-zone External] user@host# show policy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn myTunnel; } scheduler-name now; } } }B. [edit security policies from-zone Private to-zone External] user@host# show policy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn myTunnel; } } } scheduler-name now; }C. [edit security policies from-zone Private to-zone External] user@host# show policy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn scheduler-name now; } } } }D. [edit security policies from-zone Private to-zone External] user@host# show policy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; scheduler-name now; } then { permit { tunnel { ipsec-vpn myTunnel; } } } scheduler-name now; }myTunnel;

Intheconfigurationshownintheexhibit,youdecidedtoeliminatethejunos-ftpapplicationfromthematchconditionofthepolicyMyTraffic.[editsecuritypolicies]user@hostlshowfrom-zonePrivateto-zoneExternal{policyMyTraffic{match{source-addressmyHosts;destination-addressExtServers;application[junos-ftpjunos-bgp];}then{permit{tunnel{ipsec-vpnvpnTunnel;}}}}}policy-rematch;WhatwillhappentotheexistingFTPandBGPsessions?()A.TheexistingFTPandBGPsessionswillcontinue.B.TheexistingFTPandBGPsessionswillbere-evaluatedandonlyFTPsessionswillbedropped.C.TheexistingFTPandBGPsessionswillbere-evaluatedandallsessionswillbedropped.D.TheexistingFTPsessionswillcontinueandonlytheexistingBGPsessionswillbedropped.

Intheexhibit,youdecidedtochangemyHostsaddresses.[editsecuritypolicies]user@hostshowfrom-zonePrivateto-zoneExternal{policyMyTraffic{match{source-addressmyHosts;destination-addressExtServers;application[junos-ftpjunos-bgp];}then{permit{tunnel{ipsec-vpnvpnTunnel;}}}}}policy-rematch;Whatwillhappentothenewsessionsmatchingthepolicyandin-progresssessionsthathadalreadymatchedthepolicy?()A.Newsessionswillbeevaluated.In-progresssessionswillbere-evaluated.B.Newsessionswillbeevaluated.Allin-progresssessionswillcontinue.C.Newsessionswillbeevaluated.Allin-progresssessionswillbedropped.D.Newsessionswillhaltuntilallin-progresssessionsarere-evaluated.In-progresssessionswillbere-evaluatedandpossiblydropped.

Your task is to provision the Junos security platform to permit transit packets from the Private zone to the External zone by using an IPsec VPN and log information at the time of session close.Which configuration meets this requirement?()A. [edit security policies from-zone Private to-zone External] user@host# show policy allowTransit { match { source-address PrivateHosts;destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn VPN; } } log { session-init; } } }B. [edit security policies from-zone Private to-zone External] user@host# show policy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn VPN; } } count { session-close; } } }C. [edit security policies from-zone Private to-zone External] user@host# showpolicy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn VPN;} } log { session-close; } } }D. [edit security policies from-zone Private to-zone External] user@host# show policy allowTransit { match { source-address PrivateHosts; destination-address ExtServers; application ExtApps; } then { permit { tunnel { ipsec-vpn VPN; log; count session-close; } } } }

Which statement contains the correct parameters for a route-based IPsec VPN?() A. [edit security ipsec] user@host# show proposal ike1-proposal { protocol esp; authentication-algorithm hmac-md5-96; encryption-algorithm 3des-cbc; lifetime-seconds 3200; }policy ipsec1-policy { perfect-forward-secrecy { keys group2; } proposals ike1-proposal; } vpn VpnTunnel { interface ge-0/0/1.0; ike { gateway ike1-gateway; ipsec-policy ipsec1-policy; } establish-tunnels immediately; }B. [edit security ipsec] user@host# show proposal ike1-proposal { protocol esp; authentication-algorithm hmac-md5-96; encryption-algorithm 3des-cbc; lifetime-seconds 3200; } policy ipsec1-policy { perfect-forward-secrecy { keys group2; } proposals ike1-proposal; } vpn VpnTunnel { interface st0.0; ike { gateway ike1-gateway; ipsec-policy ipsec1-policy; } establish-tunnels immediately; }C. [edit security ipsec] user@host# show proposal ike1-proposal { protocol esp; authentication-algorithm hmac-md5-96; encryption-algorithm 3des-cbc; lifetime-seconds 3200;} policy ipsec1-policy { perfect-forward-secrecy { keys group2; } proposals ike1-proposal; } vpn VpnTunnel { bind-interface ge-0/0/1.0; ike { gateway ike1-gateway; ipsec-policy ipsec1-policy; } establish-tunnels immediately; }D. [edit security ipsec] user@host# show proposal ike1-proposal { protocol esp; authentication-algorithm hmac-md5-96; encryption-algorithm 3des-cbc; lifetime-seconds 3200; }policy ipsec1-policy { perfect-forward-secrecy { keys group2; } proposals ike1-proposal; } vpn VpnTunnel { bind-interface st0.0; ike { gateway ike1-gateway; ipsec-policy ipsec1-policy; } establish-tunnels immediately; }

Basedontheconfigurationshownintheexhibit,whataretheactionsofthesecuritypolicy?()[editschedulers]user@hostshowschedulernow{mondayall-day;tuesdayexclude;wednesday{start-time07:00:00stop-time18:00:00;}thursday{start-time07:00:00stop-time18:00:00;}}[editsecuritypoliciesfrom-zonePrivateto-zoneExternal]user@hostshowpolicyallowTransit{match{source-addressPrivateHosts;destination-addressExtServers;applicationExtApps;}then{permit{tunnel{ipsec-vpnmyTunnel;}}}scheduler-namenow;A.ThepolicywillalwayspermittransitpacketsandusetheIPsecVPNmyTunnel.B.ThepolicywillpermittransitpacketsonlyonMonday,andusetheIPsecVPNMytunnel.C.ThepolicywillpermittransitpacketsandusetheIPsecVPNmyTunnelalldayMondayandWednesday 7amto6pm,andThursday7amto6pm.D.Thepolicywillalwayspermittransitpackets,butwillonlyusetheIPsecVPNmyTunnelalldayMonday andWednesday7amto6pm,andThursday7amto6pm.

YouissuethisSQLstatement:ALTERDATABASERENAMEFILE’/ORADATA/u02/user_data01.dbf’TO’/ORADATA/u04/user_data01.dbf’;WhatdoesthisSQLstatementdo?() A.Itupdatesthecontrolfilewiththenewlocationofthedatafile.B.Itupdatesonlythedatadictionarywiththenewlocationofthedatafile.C.Itchangesthelocationoftheuser_data01.dbffileintheoperatingsystem.D.Itchangesthelocationoftheuser_data01.dbffileintheoperatingsystemandupdatesthecontrolfilewiththenewlocationofthedatafile.

ExaminetheRMANcommand:SWITCHDATAFILE’/DISK3/user_data01.dbf’;Whichcommanddoyouneedtoissuebeforeyouissuetheabovecommand,sothatRMANfindsthefileintherestoredlocationof’DISK2/user_data01.dbf’?() A.RESTOREDATAFILE’/DISK2/user_data01.dbf’B.RESTOREDATAFILE’/DISK3/user_data01.dbf’C.SETNEWNAMEFOR’/DISK3/user_data01.dbf’TO’/DISK2/user_data01.dbf’D.SETNEWNAMEFOR’/DISK2/user_data01.dbf’TO’/DISK3/user_data01.dbf’

在Oracle中,()数据字典表可以用来查看抽象数据类型的实际结构。 A.USER_TYPE_ATTRSB.USER_TABLESC.USER_TYPE_TABSD.USER_TAB_COLUMNS