A.AES B.3DES C.DES D.Diffie-Hellman
单项选择题Which item is the correct matching relationships associated with IKE Phase?()
A.IKE Phase 1 - P4S1 and P4S4,IKE Phase 2 - P4S2, P4S3 and P4S5 B.IKE Phase 1 - P4S2 and P4S4,IKE Phase 2 - P4S1, P4S3 and P4S5 C.IKE Phase 1 - P4S2 and P4S3,IKE Phase 2 - P4S1, P4S4 and P4S5 D.IKE Phase 1 - P4S1 and P4S2,IKE Phase 2 - P4S3, P4S4 and P4S5
单项选择题Forthefollowingattempts,whichoneistoensurethatnooneemployeebecomesapervasivesecuritythreat,thatdatacanberecoveredfrombackups,andthatinformationsystemchangesdonotcompromiseasystem’ssecurity?()
A.Strategic security planning B.Disaster recovery C.Implementation security D.Operations security
单项选择题WhichoneofthefollowingcommandscanbeusedtoenableAAAauthenticationtodetermineifausercanaccesstheprivilegecommandlevel?()
A.aaa authentication enable method default B.aaa authentication enable default C.aaa authentication enable level D.aaa authentication enable default local
单项选择题WhichtypeoffirewallisneededtoopenappropriateUDPportsrequiredforRTPstreams?()
A.Stateful firewall B.Proxy firewall C.Packet filtering firewall D.Stateless firewall
单项选择题Forthefollowingstatements,whichoneisperceivedasadrawbackofimplementingFibreChannelAuthenticationProtocol(FCAP)?()
A.It is restricted in size to only three segments B.It requires the use of netBT as the network protocol C.It requires the implementation of IKE D.It relies on an underlying Public Key Infrastructure