A.SPAP B.CHAP C.DHCHAP D.ESP
多项选择题Whichthreearedistinctionsbetweenasymmetricandsymmetricalgorithms?()
A.Only symmetric algorithms have a key exchange technology built in B.Asymmetric algorithms are used quite often as key exchange protocols for symmetricalgorithms C.Only asymmetric algorithms have a key exchange technology built in D.Asymmetric algorithms are based on more complex mathematical computations
多项选择题Whichtwoactionscanbeconfiguredtoallowtraffictotraverseaninterfacewhenzone-basedsecurityisbeingemployed?()
A.Pass B.Flow C.Allow D.Inspect
单项选择题Whichmethodisofgainingaccesstoasystemthatbypassesnormalsecuritymeasures?()
A.Starting a Smurf attack B.Conducting social engineering C.Creating a back door D.Launching a DoS attack
单项选择题Whichoptionensuresthatdataisnotmodifiedintransit?()
A.Authorization B.Confidentiality C.Authentication D.Integrity
单项选择题WhichtypeofintrusionpreventiontechnologywillbeprimarilyusedbytheCiscoIPSsecurityappliances?()
A.signature-based B.profile-based C.rule-based D.protocol analysis-based