单选

(71) is used to ensure the confidentiality, integrity and authenticity of the two end points in the private network.(72),  an application-layer protocol, authenticates each peer in an IPsec transaction. IKE negotiates security policy, determining which algorithm may be used to set up the tunnel. It also handles the exchange of session keys used for that one transaction.Networks that use(73) to secure data traffic can automatically authenticate devices by using(74), which verify the identities of the two users who are sending information back and forth. IPsec can be ideal way to secure data in large networks that require(75) connections among many devices.

  • A.Certificate
  • B.Encryption
  • C.Tunnel
  • D.Presentation
参考答案
您可能感兴趣的试题

(84)

  • A.secure
  • B.relation
  • C.script
  • D.strict

(83)

  • A.characteristics
  • B.associated links
  • C.digital certificates
  • D.attributes

(82)

  • A.authenticity
  • B.IPSec
  • C.confidentiality
  • D.integrity

(81)

  • A.IPSec
  • B.SSL
  • C.L2TP
  • D.The Internet Key Exchange

(79)

  • A.显示本机路由标的内容
  • B.显示每个协议的使用状态(包括TCP协议、UDP协议和IP协议)
  • C.以数字表格形式显示地址和端口
  • D.显示所有主要的端口

(78)

  • A.ping-T
  • B.ping-A
  • C.ping-N
  • D.ping-L

(77)

  • A.pingtec.oh.us
  • B.ping-s 202.38.75.14
  • C.ping boozhang@sdb.ac.cm
  • D.ping http://www.zsu.edu.cn

(76)

  • A.ARP
  • B.ICMP
  • C.Netstat
  • D.ping
¥

订单号:

遇到问题请联系在线客服

订单号:

遇到问题请联系在线客服