A.Only symmetric algorithms have a key exchange technology built in
B.Asymmetric algorithms are used quite often as key exchange protocols for symmetricalgorithms
C.Only asymmetric algorithms have a key exchange technology built in
D.Asymmetric algorithms are based on more complex mathematical computations
您可能感興趣的試卷
你可能感興趣的試題
A.Pass
B.Flow
C.Allow
D.Inspect
A.Starting a Smurf attack
B.Conducting social engineering
C.Creating a back door
D.Launching a DoS attack
A.Authorization
B.Confidentiality
C.Authentication
D.Integrity
A.signature-based
B.profile-based
C.rule-based
D.protocol analysis-based
A.2048 bits
B.1024 bits
C.256 bits
D.512 bits
最新試題
What will be disabled as a result of the no service password-recovery command?()
Which name is of the e-mail traffic monitoring service that underlies that architecture of IronPort?()
Which method is of gaining access to a system that bypasses normal security measures?()
Refer to the exhibit. You are the network security administrator responsible for router security.Your networkuses internal IP addressing according to RFC 1918 specifications.From the default rules shown,whichaccess control list would prevent IP address spoofing of these internal networks?()
Which information is stored in the stateful session flow table while using a stateful firewall?()
Which one of the aaa accounting commands can be used to enable logging of both the start and stoprecords for user terminal sessions on the router?()
Refer to the exhibit. Based on the VPN connection shown, which statement is true?()
Please choose the correct description about Cisco Self-Defending Network characteristics.()
A standard access control list has been configured on a router and applied to interface Serial 0 in anoutbound direction. No ACL is applied to Interface Serial 1 on the same router. What will happen whentraffic being filtered by the access list does not match the configured ACL statements for Serial 0?()
Which statement is true about a Smurf attack?()