题目详情
当前位置:首页 > 计算机考试 > 中级网络工程师
题目详情:
发布时间:2024-07-05 20:11:21

[单项选择] (66) is used to ensure the confidentiality, integrity and authenticity of the two end points in the private network. (67) , an application-layer protocol, authenticates each peer in an IPsec transaction. IKE negotiates security policy, determining which algorithm may be used to set up the tunnel. It also handles the exchange of session keys used for that one transaction.
Networks that use (68) to secure data traffic can automatically authenticate devices by using (69) , which verify the identities of the two users who are sending information back and forth. IPsec can be ideal way to secure data in large networks that require secure connections among many devices.
Users deploying IPsec can (70) their network infrastructure without affecting the applications on individual computer. The protocol suite is available as a software-only upgrade to the network infrastructure. This alows security to be implemented without costly changes to each com
A. IPSec
B. SSL
C. L2TP
D. The Internet Key Exchange

更多"(66) is used to ensure the confiden"的相关试题:

[单项选择] (71) is used to ensure the confidentiality, integrity and authenticity of the two end points in the private network. (72) , an application-layer protocol, authenticates each peer in an IPSec transaction.IKE negotiates security policy, determining which algorithm may be used to set up the tunnel. It alsohandles the exchange of session keys used for that one transaction.
Networks that use (73) to secure data traffic can automatically authenticate devices by using (74) , which verify the identities of the two users who are sending information back and forth. IPSeccan be ideal way to secure data in large networks that require secure connections among many devices.
Users deploying IPSec can (75) their network infrastructure without affecting the applications on individual computer. The protocol suite is available as a software-only upgrade to the networkinfrastructure. This alows security to be implemented without costly changes to each co
A. Certificate
B. Encryption
C. Tunnel
D. Presentation
[单项选择] (66) is used to ensure the confidentiality, integrity and authenticity of the two end points in the private network. (67) , an application-layer protocol, authenticates each peer in an IPsec transaction. IKE negotiates security policy, determining which algorithm may be used to set up the tunnel. It also handles the exchange of session keys used for that one transaction.
Networks that use (68) to secure data traffic can automatically authenticate devices by using (69) , which verify the identities of the two users who are sending information back and forth. IPsec can be ideal way to secure data in large networks that require secure connections among many devices.
Users deploying IPsec can (70) their network infrastructure without affecting the applications on individual computer. The protocol suite is available as a software-only upgrade to the network infrastructure. This alows security to be implemented without costly changes to each com
A. Certificate
B. Encryption
C. Tunnel
D. Presentation
[单项选择]

(1) is used to ensure the confidentiality,integrity and authenticity of the two end points in the private network. (2) ,an application—layer protocol,authenticates each peer in an IPSec transaction.IKE negotiates security policy,determining which algorithm may be used to set up the tunnel.it alsohandles the exchange of session keys used for that one transaction.
Networks that use (3) to secure data traffic can automatically authenticate devices by using (4) ,which verify the identities of the two users who are sending information back and forth.IPSeccan be ideal way to secure data in large networks that require secure connections among many devices.
Users deploying IPSec can (5) their network infrastructure without affecting the applications on individual computer.The protocol suite is available as a software-only upgrade to the networkinfrastructure.This alows security to be implemented without costly changes to each
A. authenticity
B. IPSec
C. confidentiality
D. integrity

[单项选择]

___39___ is used to ensure the confidentiality, integrity and authenticity of the two end points in the private network. ___40___, an application-layer protocol, authenticates each peer in an IPSec transaction. IKE negotiates security policy, determining which algorithm may be used to set up the tunnel. It also handles the exchange of session keys used for that one transaction.
Networks that use ___41___ to secure data traffic can automatically authenticate devices by using by using ___42___, which verify the identities of the two users who are sending information back and forth. IPSec can be ideal way to secure data in large networks that require secure connections among many devices.
Users deploying IPSec can ___43___ their network infrastructure without affecting the applications on individual computer. The protocol suite is available as a software-only upgrade to the network infrastructure. This alows security to be implemented without costly changes to each c
A. characteristics
B. associated links
C. digital certificates
D. attributes

我来回答:

购买搜题卡查看答案
[会员特权] 开通VIP, 查看 全部题目答案
[会员特权] 享免全部广告特权
推荐91天
¥36.8
¥80元
31天
¥20.8
¥40元
365天
¥88.8
¥188元
请选择支付方式
  • 微信支付
  • 支付宝支付
点击支付即表示同意并接受了《购买须知》
立即支付 系统将自动为您注册账号
请使用微信扫码支付

订单号:

请不要关闭本页面,支付完成后请点击【支付完成】按钮
恭喜您,购买搜题卡成功
重要提示:请拍照或截图保存账号密码!
我要搜题网官网:https://www.woyaosouti.com
我已记住账号密码