单项选择题X 纠错
A. Blocking cipher andnon-blocking cipher
B. CBC cipher and EBC cipher
C. Block cipher and Stream cipher
D. Blocker cipher and Streamer cipher
E. 3DES cipher and AES cipher
你可能喜欢
单项选择题
A. SSL Handshake Protocol
B. SSLAlert Protocol
C. SSL Record Protocol
D. SSL Change CipherSpec Protocol
单项选择题
A. the router generates a certificate request and forwards it tothe CA
B. the router generates an RSA key pair
C. the router sends its public key to the CA
D. the CA sends its public key to the router
E. the CA verifies the identity of the router
F. the CA generates a certificate request and forwards it to the router
多项选择题
A. this login authenticationmethod list is automaticallyapplied to all lines except those that have a named method list explicitly defined
B. If the user fails the TACACS+ authentication then the local database on the router will be used to authenticatethe user
C. if the tacacs+ server fails to respond then the local database on the router will be used to authenticate the user
D. "login" is the name of the method list being configured
E. if the tacacs+ server is unavailable, authentication will succeed automaticallyby default
单项选择题
A. Cisco Secure Desktop (CSD)
B. NAC Appliance Agent (NAA)
C. Cisco SecurityAgent (CSA)
D. SSLVPN Client (SVC)
E. Cisco TrustAgent (CTA)
多项选择题
A. ACCESS REQUEST
B. ACCESS ACCEPT
C. CONTINUE
D. CHALLENGE
E. REPLY
F. START
单项选择题
A. the business knowledge of the IT staff
B. the technical knowledge of the IT staff
C. the company’s business objectives
D. the company’s network topology
E. the IT future directions
单项选择题
A. Class-Based Policing
B. Control Plane Policing
C. Dual-Rate Policier
D. Single-Rate Policier
E. Class-BasedTraffic Shaper
单项选择题
A. The client and the NAS.
B. The NAS andthe LNS.
C. The NAS and the LAC.
D. The client and the LNS.
单项选择题
A. PFS group.
B. Encryption algorithm.
C. Hashing Algorithm.
D. Authenticationmethod.
E. Lifetime duration.
单项选择题
A. The sender of the message.
B. The receipient of the message.
C. The sender’s administrator who provides the sender with the PGP program.
D. A third party that belongs to what’s often known as "web of trust", that can verify the relationship between the user and the key.
E. The vendor of the PGP program.