A.Stateful firewall B.Proxy firewall C.Packet filtering firewall D.Stateless firewall
单项选择题Forthefollowingstatements,whichoneisperceivedasadrawbackofimplementingFibreChannelAuthenticationProtocol(FCAP)?()
A.It is restricted in size to only three segments B.It requires the use of netBT as the network protocol C.It requires the implementation of IKE D.It relies on an underlying Public Key Infrastructure
单项选择题Whichfirewallbestpracticescanhelpmitigatewormandotherautomatedattacks?()
A.Segment security zones B.Restrict access to firewalls C.Use logs and alerts D.Set connection limits
单项选择题Whichoneisthemostimportantbasedonthefollowingcommonelementsofanetworkdesign?()
A.Business needs B.Risk analysis C.Security policy D.Best practices
单项选择题WhichPublicKeyCryptographicStandards(PKCS)definesthesyntaxforencryptedmessagesandmessageswithdigitalsignatures?()
A.PKCS #7 B.PKCS #8 C.PKCS #10 D.PKCS #12
单项选择题Examinethefollowingoptions,whichSpanningTreeProtocol(STP)protectionmechanismdisablesaswitchportiftheportreceivesaBridgeProtocolDataUnit(BPDU)?()
A.Uplink Fast B.Port Fast C.BPDU Guard D.Root Guard