Which two data intergrity algorithms are commonly used in VPN solutions?() A.HMAC-MD5B.RSAC.HMAC-SHA-1D.DH1E.DH2

Which two data intergrity algorithms are commonly used in VPN solutions?()

A.HMAC-MD5

B.RSA

C.HMAC-SHA-1

D.DH1

E.DH2


相关考题:

Which two statements regarding symmetric key encryption are true?() (Choose two.) A. The same key is used for encryption and decryption.B. It is commonly used to create digital certificate signatures.C. It uses two keys: one for encryption and a different key for decryption.D. An attacker can decrypt data if the attacker captures the key used for encryption.

Which of the following protocols is commonly used for VoIP technology?() A.TelnetB.SMTPC.SIPD.SNMP

On a Cisco network, which of the following modes of flow control are commonly used to mitigate the effects of busy data networks?() A. Source Quench.B. Learning.C. Buffering.D. Windowing.E. Cut-Through.

If the OSPF protocol is used to connect customer edge (CE) routers to service provider edge(PE) routers in the VPN backbone, which two options best describe the use of SHAM links?()A、A sham-link is created between any twoo VPN sites that belong to the same OSPF area and share an OSPF backdoor linkB、A sham-link is seen as an intra-area link between PE routers,an OSPF adjacency is created and data base is exchangedC、A SHAM link is created between two directly connected PE routers so that it is preferred over the low speed backdoor doorD、A SHAM link is part of OSPF network of MPLS-VPN provider

Which two statements are true regarding the USING clause in table joins?()A、It can be used to join a maximum of three tables B、It can be used to restrict the number of columns used in a NATURAL join C、It can be used to access data from tables through equijoins as well as nonequijoins D、It can be used to join tables that have columns with the same name and compatible data types

On a Cisco network, which of the following modes of flow control are commonly used to mitigate the effects of busy data networks?()A、Source Quench.B、Learning.C、Buffering.D、Windowing.E、Cut-Through.

Which of the following is the correct configuration for a RAID 5 array?()A、A two disk set with one data stripB、A three disk set with two data strips and a parity stripC、A two disk set with two data stripsD、A four disk set with two sets of data strips

Which two HTTP methods are used to process from data in a servlet? ()A、 do GETB、 do PutC、 do PostD、 do TraceE、 do SubmitF、 do Process

What is a key characteristic of the Cisco Business Ready Teleworker solution which is different from traditional software-client based Teleworker solutions?()A、all traffic is encrypted using IPSec and the Triple-DES algorithmB、full support for all Enterprise applications, including data, voice, and videoC、thousands of Teleworker VPN tunnels can be aggregated to a headquarters locationD、the VPN tunnel is an always on site-to-site VPN connectionE、portability for use while travelingF、used with broadband Cable/DSL subscriptions

Which two data intergrity algorithms are commonly used in VPN solutions?()A、HMAC-MD5B、RSAC、HMAC-SHA-1D、DH1E、DH2

Routers can be used to integrate a variety of services. Which two common services are often specified by businesses?()A、 Mitigation and ResponseB、 Fibre Channel over EthernetC、 IP communicationsD、 Data Center VirtualizationE、 VPN security

Which of the following protocols is commonly used by ping?()A、SIPB、ICMPC、TFTPD、ARP

Which of the following protocols is commonly used for VoIP technology?()A、TelnetB、SMTPC、SIPD、SNMP

A customer has two locations that host their pSeries servers.  Traffic is being routed through the public Internet.  The customer needs to exchange confidential financial data between the servers.  Which of the following solutions should the pSeries technical specialist propose to the customer to secure the data?()A、A DCE domainB、A Kerberos domainC、A PPP tunnel between the serversD、An IPSEC tunnel between the servers

Which two statements regarding asymmetric key encryption are true?()A、The same key is used for encryption and decryption.B、It is commonly used to create digital certificate signatures.C、It uses two keys: one for encryption and a different key for decryption.D、An attacker can decrypt data if the attacker captures the key used for encryption

Which three tasks can be performed using regular expression support in Oracle Database 10g?()A、 it can be used to concatenate two strings.B、 it can be used to find out the total length of the string.C、 it can be used for string manipulation and searching operations.D、 it can be used to format the output for a column or expression having string data.E、 it can be used to find and replace operations for a column or expression having string data.

多选题Which two statements are true regarding the USING and ON clauses in table joins?()ABoth USING and ON clauses can be used for equijoins and nonequijoinsBAmaximum of one pair of columns can be joined between two tables using the ON clauseCThe ON clause can be used to join tables on columns that have different names but compatible data typesDThe WHERE clause can be used to apply additional conditions in SELECT statements containing the ON or the USING clause

多选题Which three are distinctions between asymmetric and symmetric algorithms? ()AOnly symmetric algorithms have a key exchange technology built inBAsymmetric algorithms are used quite often as key exchange protocols for symmetricalgorithmsCOnly asymmetric algorithms have a key exchange technology built inDAsymmetric algorithms are based on more complex mathematical computations

多选题Which two statements are true regarding the USING clause in table joins?()AIt can be used to join a maximum of three tablesBIt can be used to restrict the number of columns used in a NATURAL joinCIt can be used to access data from tables through equijoins as well as nonequijoinsDIt can be used to join tables that have columns with the same name and compatible data types

多选题On a Cisco network, which of the following modes of flow control are commonly used to mitigate the effects of busy data networks?()ASource Quench.BLearning.CBuffering.DWindowing.ECut-Through.

多选题Which two data intergrity algorithms are commonly used in VPN solutions?()AHMAC-MD5BRSACHMAC-SHA-1DDH1EDH2

单选题Which one of the following is the most commonly used layer 2 network device?()AHubBBridgeCSwitchDRouterERepeatersFNone of the above

多选题Which two HTTP methods are used to process from data in a servlet? ()Ado GETBdo PutCdo PostDdo TraceEdo SubmitFdo Process

多选题Which two statements regarding asymmetric key encryption are true?()AThe same key is used for encryption and decryption.BIt is commonly used to create digital certificate signatures.CIt uses two keys: one for encryption and a different key for decryption.DAn attacker can decrypt data if the attacker captures the key used for encryption

多选题If the OSPF protocol is used to connect customer edge (CE) routers to service provider edge(PE) routers in the VPN backbone, which two options best describe the use of SHAM links?()AA sham-link is created between any twoo VPN sites that belong to the same OSPF area and share an OSPF backdoor linkBA sham-link is seen as an intra-area link between PE routers,an OSPF adjacency is created and data base is exchangedCA SHAM link is created between two directly connected PE routers so that it is preferred over the low speed backdoor doorDA SHAM link is part of OSPF network of MPLS-VPN provider

多选题What is a key characteristic of the Cisco Business Ready Teleworker solution which is different from traditional software-client based Teleworker solutions?()Aall traffic is encrypted using IPSec and the Triple-DES algorithmBfull support for all Enterprise applications, including data, voice, and videoCthousands of Teleworker VPN tunnels can be aggregated to a headquarters locationDthe VPN tunnel is an always on site-to-site VPN connectionEportability for use while travelingFused with broadband Cable/DSL subscriptions

多选题Which two statements regarding symmetric key encryption are true?() (Choose two.)AThe same key is used for encryption and decryption.BIt is commonly used to create digital certificate signatures.CIt uses two keys: one for encryption and a different key for decryption.DAn attacker can decrypt data if the attacker captures the key used for encryption.