A.SCSI B.HBA C.ATA D.iSCSI
单项选择题Forthefollowingstatements,whichoneisthestrongestsymmetricalencryptionalgorithm?()
A.AES B.3DES C.DES D.Diffie-Hellman
单项选择题Which item is the correct matching relationships associated with IKE Phase?()
A.IKE Phase 1 - P4S1 and P4S4,IKE Phase 2 - P4S2, P4S3 and P4S5 B.IKE Phase 1 - P4S2 and P4S4,IKE Phase 2 - P4S1, P4S3 and P4S5 C.IKE Phase 1 - P4S2 and P4S3,IKE Phase 2 - P4S1, P4S4 and P4S5 D.IKE Phase 1 - P4S1 and P4S2,IKE Phase 2 - P4S3, P4S4 and P4S5
单项选择题Forthefollowingattempts,whichoneistoensurethatnooneemployeebecomesapervasivesecuritythreat,thatdatacanberecoveredfrombackups,andthatinformationsystemchangesdonotcompromiseasystem’ssecurity?()
A.Strategic security planning B.Disaster recovery C.Implementation security D.Operations security
单项选择题WhichoneofthefollowingcommandscanbeusedtoenableAAAauthenticationtodetermineifausercanaccesstheprivilegecommandlevel?()
A.aaa authentication enable method default B.aaa authentication enable default C.aaa authentication enable level D.aaa authentication enable default local
单项选择题WhichtypeoffirewallisneededtoopenappropriateUDPportsrequiredforRTPstreams?()
A.Stateful firewall B.Proxy firewall C.Packet filtering firewall D.Stateless firewall