A.AES
B.3DES
C.DES
D.Diffie-Hellman
您可能感興趣的試卷
你可能感興趣的試題
Which item is the correct matching relationships associated with IKE Phase?()
A.IKE Phase 1 - P4S1 and P4S4,IKE Phase 2 - P4S2, P4S3 and P4S5
B.IKE Phase 1 - P4S2 and P4S4,IKE Phase 2 - P4S1, P4S3 and P4S5
C.IKE Phase 1 - P4S2 and P4S3,IKE Phase 2 - P4S1, P4S4 and P4S5
D.IKE Phase 1 - P4S1 and P4S2,IKE Phase 2 - P4S3, P4S4 and P4S5
A.Strategic security planning
B.Disaster recovery
C.Implementation security
D.Operations security
A.aaa authentication enable method default
B.aaa authentication enable default
C.aaa authentication enable level
D.aaa authentication enable default local
A.Stateful firewall
B.Proxy firewall
C.Packet filtering firewall
D.Stateless firewall
A.It is restricted in size to only three segments
B.It requires the use of netBT as the network protocol
C.It requires the implementation of IKE
D.It relies on an underlying Public Key Infrastructure
最新試題
Which type of intrusion prevention technology will be primarily used by the Cisco IPS security appliances?()
If you click the Configure button along the top of Cisco SDM is graphical interface,which Tasks buttonpermits you to configure such features as SSH, NTP, SNMP, and syslog?()
Refer to the exhibit. Which statement is correct based on the show login command output shown?()
Which two actions can be configured to allow traffic to traverse an interface when zone-based security isbeing employed?()
What will be disabled as a result of the no service password-recovery command?()
Regarding constructing a good encryption algorithm, what does creating an avalanche effect indicate?()
In an IEEE 802.1x deployment,between which two devices EAPOL messages typically are sent?()
Which key method is used to detect and prevent attacks by use of IDS and/or IPS technologies?()
For the following options, which feature is the foundation of Cisco Self-Defending Network technology?()
Which information is stored in the stateful session flow table while using a stateful firewall?()