单选题For the following items ,which one can be used to authenticate the IPsec peers during IKE Phase 1?()Apre-shared keyBintegrity check valueCXAUTHDDiffie-Hellman Nonce

单选题
For the following items ,which one can be used to authenticate the IPsec peers during IKE Phase 1?()
A

pre-shared key

B

integrity check value

C

XAUTH

D

Diffie-Hellman Nonce


参考解析

解析: 暂无解析

相关考题:

Which of the following terms is used to describe the receipt issued by a carrier for items to be delivered to a third party:A free on boardB receipt for merchandiseC packaging listD loading listE bill of lading

Of the following items, which one does not belong to the same syntactic category? A the studentB likedC anideaD the linguistic lecture

Which of the following items is not one of the grammatical categories of English pronouns?A.gender B.numberC.caseD.voice

Which of the following items is not one of the grammatical categories of English pronouns?A.genderB.numberC.caseD.voice

Which of the following statements about a Sales Catalog is TRUE?()A、A store can only have one sales catalog.B、A sales catalog is used to bundle similar products.C、A sales catalog may be used to place a product in more than one category.D、Every store must have a sales catalog.

which one of the following best where layer can be used?()A、form B、page C、subform D、all of the above

A recently ordered server came standard with one 3.0GHz processor. It is capable of handling fourtotal processors. Which of the following processor combinations can be used in this server?()A、 One, two, three or four processorsB、 One, two, or three processorsC、 One, three, or four processorsD、 One, two or four processors

Which one of the following items may be added to a password stored in MD5 to make it more secure?()A、CiphertextB、SaltC、CryptotextD、Rainbow table

For the following items ,which one can be used to authenticate the IPsec peers during IKE Phase 1?()A、pre-shared keyB、integrity check valueC、XAUTHD、Diffie-Hellman Nonce

Which of the following items can be used as a discharge lamp?()A、Halogen lampB、Light Emitting Diodes (LED)C、Fuser lampD、Cleaning roller

Which of the following switches in Windows can be used to ping a host until stopped?()A、-lB、-aC、-tD、-f

Which of the following is used to create multiple networks from one large network?()A、PATB、NATC、MulticastD、Subnetting

Which of the following utilities can be used to list the routing table?()A、ipconficjB、nslookupC、netstatD、dig

Which of the following tools can be used to identify the location of a network outage?()A、tracerouteB、netstatC、nslookupD、ping

which one of the following types of actions can be used on unopened doc?()A、 form action B、 view action C、 hotspot action D、 db action

In the context of Advanced Power Virtualization, the shared pool refers to which of the following?()A、A pool of physical memory that can be used by any partitionB、A pool of physical processors that can be used by any virtual or dedicated partitionC、A pool of physical memory that can be used by multiple Micro-PartitionsD、A pool of physical processors that can be used by multiple Micro-Partitions

which one of the following accurately describes field names?()A、they must be unique in a database  B、they can only be used once in a view  C、they can only used once on each form  D、they can be used mulriple times on a form

Which three are true?()A、A MERGE statement is used to merge the data of one table with data from another.B、A MERGE statement replaces the data of one table with that of another.C、A MERGE statement can be used to insert new rows into a table.D、A MERGE statement can be used to update existing rows in a table.

单选题which one of the following types of actions can be used on unopened doc?()A form action B view action C hotspot action D db action

单选题Which of the following items is not one of the grammatical categories of English pronouns? _____AgenderBnumberCcaseDvoice

单选题which one of the following accurately describes field names?()Athey must be unique in a database  Bthey can only be used once in a view  Cthey can only used once on each form  Dthey can be used mulriple times on a form

单选题Which one of the following is the most commonly used layer 2 network device?()AHubBBridgeCSwitchDRouterERepeatersFNone of the above

单选题Which of the following statements about a Sales Catalog is TRUE?()AA store can only have one sales catalog.BA sales catalog is used to bundle similar products.CA sales catalog may be used to place a product in more than one category.DEvery store must have a sales catalog.

单选题A recently ordered server came standard with one 3.0GHz processor. It is capable of handling fourtotal processors. Which of the following processor combinations can be used in this server?()A One, two, three or four processorsB One, two, or three processorsC One, three, or four processorsD One, two or four processors

单选题Which of the following commands can be used to verify the gateway IP address on a localcomputer?()Anet useBtelnetCpingDipconfig

单选题Which one of the following commands can be used to enable AAA authentication to determine if a user canaccess the privilege command level?()Aaaa authentication enable method defaultBaaa authentication enable defaultCaaa authentication enable levelDaaa authentication enable default local

单选题For the following items, which one acts as a VPN termination device and is located at a primary networklocation?()ABroadband serviceBHeadend VPN deviceCVPN access deviceDTunnel