网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which Application Layer security protocol requires two pair of asymmetric keys and two digital certificates?以下那个应用层协议需要两对非对称秘钥和两个数字证书()
A
SSL
B
PEM
C
S/HTTP
D
SET
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which Application Layer security protocol requires two pair of asymmetric keys and two digital certificates?以下那个应用层协议需要两对非对称秘钥和两个数字证书()A SSLB PEMC S/HTTPD SET” 相关考题
考题
TCP/IP(71)layer protocols provide services to the application(72)running on a computer. The application layer does not define the application itself, but rather it defines(73)that applications need--like the ability to transfer a file in the case of HTTP. In short, the application layer provides an(74)between software running on a computer and the network itself. The TCP/IP application layer includes a relatively large number of protocols, with HTTP being only one of those. The TCP/IP(75)layer consists of two main protocol options--the Transmission Control Protocol(TCP) and the User Datagram Protocol(UDP).A.applicationB.transportC.linkD.network
考题
Regarding DHCP (dynamic host configuration protocol), which two of the following choices below are true? (Select two answer choices)A. The DHCP Discover message uses FF-FF-FF-FF-FF as the Layer 2 destination address.B. The DHCP Discover message uses UDP as the transport layer protocol.C. The DHCP Discover message uses a special Layer 2 multicast address as the destination address.D. The DHCP Discover message uses TCP as the transport layer protocol.E. The DHCP Discover message does not use a Layer 2 destination address.F. The DHCP Discover message does not require a transport layer protocol.
考题
Networks can be interconnected by different devices in the physical layer networks can be connected by (71) or hubs.which just move the bits from one network to an identical network.One layer up we find bridges and switches which operate at data link layer.They can accept (72) ,examine the MAC address and forward the frames to a different network while doing minor protocol translation in the process in me network layer,we have routers that can connect two networks,If two networks have (73) network layer,the router may be able to translate betweenthe packer formats.In the transport layer we find transport gateway,which can interface between two transport connections Finally,in the application layer,application gateways translate message (74) .As an example,gateways between Internet e-mail and X,400 e-mail must (75) thee-mail message and change various header fields.(68)A.reapersB.relaysC.packagesD.modems
考题
TCP/IP is a communication protocol, which provides many different networking services. The TCP/IP Internet protocol suite is formed from two standards: the TCP (Transmission Control Protocol) and the IP(Internet Protocol).(72) means it is on the transport layer.A.ISOB.IPC.OSID.TCP
考题
● TCP/IP (71) layer protocols provide services to the application (72) running on a computer. The application layer does not define the application itself, but rather it defines (73) that applications need—like the ability to transfer a file in the case of HTTP. In short, the application layer provides an (74) between software running on a computer and the network itself. The TCP/IP application layer includes a relatively large number of protocols, with HTTP being only one of those. The TCP/IP (75) layer consists of two main protocol options—the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP).
考题
A customer is trying to decide which 802.1X inner protocol to use on their network. The customer requires that nopasswords be sent across the network in plain text, that the protocol be supported by the Windows native supplicant,and that the protocol supports password changes at Layer 2.Which protocol would meet the customers needs?()A. EAP-TLSB. EAP-MD5C. PAPD. EAP-MSCHAPv2
考题
Which three statements describe the User Datagram Protocol (UDP)?()
A.UDP provides delivery notification and error checking mechanisms.B.UDP is faster than the Transmission Control Protocol (TCP).C.UDP application examples include DNS and VoIP.D.UDP is an application layer protocol.E.UDP uses a best effort delivery approach.
考题
TCP/IP communication protocol contains four layers. From bottom to top, the four layers are __(71)__.A.network interface layer, internet layer, transport layer and application layerB.internet layer, network interface layer, transport layer and application layerC.network interface layer, transport layer, network interface layer and application layerD.application layer, transport layer, internet layer and network interface layer
考题
Which of the following are associated with the application layer of the OSI model (Choose two.)()。
A.pingB.TelnetC.FTPD.TCPE.IP
考题
根据下面的文字资料回答 71~75 题 connected by( 1 )or Hubs,which just move the bits from one network to an identical network. One layer up we find bridgas and swiehes,which operate at data link layer. They can accept ( 2 ) , examine the MAC address, and forward the frames to a different network while doing minor protocol translation in the process. In the network layer,we have touters that can connect two netwoks. If two networks have( 3 )network layer,the router may be able to translate between the packet formats. In the transport layer we find transport gateway, which cart interface between the two transport connections. Finally, in the application layer, application gateways translate message( 4 ). As an example,gateways between Internet e-mail and X.400 e-mail must ( 5 )the e-mail message and change various header fields.第6题:文中( 1 )处正确的答案是( )。A.reapersB.relaysC.connectsD.modems
考题
TCP/IP ( )layer protocols provide services to the application(请作答此空)running on a computer. The application layer does not define the application itself, but rather it defines( )that applications need--like the ability to transfer a file in the case of HTTP. In short, the application layer provides an( )between software running on a computer and the network itself. The TCP/IP application layer includes a relatively large number of protocols, with HTTP being only one of those. The TCP/IP( )layer consists of two main protocol options--the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP).A.hardware]
B.software]
C.packet
D.equipment
考题
IPsec, also known as the internet Protocol ( ) , defines the architecture for security services for IP network traffic IPsec describes the framework for providing security a the IP layer, as well as the suite of protocols designed to provide that security: through_ ( )_ and encryption of IP network packets. IPec can be used 10 protect network data, for example, by setting up circuits using IPsec ( ), in which all data being sent between two endpoints is encrypted, as with a Virtual (请作答此空) Network connection ;for encrypting application layer data ;and for providing security for routers sending routing data across the public internet. Internet traffic can also be secured from host to host without the use of IPsec, for example by encryption at the ( ) layer with HTTP Secure (TTPS)or an the transport layer wit the Transport Layer Security (TLS)protocol.A.pubic]
B.private]
C.personal
D.proper
考题
A customer is trying to decide which 802.1X inner protocol to use on their network. The customer requires that nopasswords be sent across the network in plain text, that the protocol be supported by the Windows native supplicant,and that the protocol supports password changes at Layer 2. Which protocol would meet the customers needs?()A、EAP-TLSB、EAP-MD5C、PAPD、EAP-MSCHAPv2
考题
Which of the following are associated with the application layer of the OSI model (Choose two.)()。A、pingB、TelnetC、FTPD、TCPE、IP
考题
Which three statements describe the User Datagram Protocol (UDP)?()A、UDP provides delivery notification and error checking mechanisms.B、UDP is faster than the Transmission Control Protocol (TCP).C、UDP application examples include DNS and VoIP.D、UDP is an application layer protocol.E、UDP uses a best effort delivery approach.
考题
Which of the following are associated with the application layer of the OSI model?(two.)()A、pingB、TelnetC、FTPD、TCPE、IP
考题
Which two types of activities does the Lightweight Access Point Protocol (LWAPP) define? (Choose two.)()A、 access point certification and software controlB、 compression and Layer 3 address mappingC、 Layer 3 addressing and distributionD、 packet encapsulation, fragmentation, and formattingE、 SNMP monitoring services
考题
Which layer 2 protocol encapsulation type supports synchronous and asynchronous circuis and has built-in security mechanisms?()A、Frame RelayB、HDLCC、x.25D、PPP
考题
Which two of these are characteristics of the 802.1Q protocol?()A、it is a layer 2 messaging protocol which maintains vlan configurations across network.B、it includes an 8-bit field which specifies the priority of a frame.C、it is used exclusively for tagging vlan frames and dose not address network reconvergence following switched network topology changes.D、it modifies the 802.3 frame header,and thus requires that the FCS be recomputed.E、it is a trunking protocol capable of carring untagged frames.
考题
多选题Which two components should be part of a security implementation plan?()Adetailed list of personnel assigned to each task within the planBa Layer 2 spanning tree design topologyCrollback guidelinesDplacing all unused access ports in VLAN 1 to proactively manage port securityEenabling SNMP access to Cisco Discovery Protocol data for logging and forensic analysis
考题
多选题Which two are components of the enhanced services software architecture?() (Choose two.)ALinux kernelBrouting protocol daemonCsession-based forwarding moduleDseparate routing and security planes
考题
多选题Which two statements are true regarding IDP?()AIDP can be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.BIDP cannot be used in conjunction with other JUNOS Software security features such as SCREEN options, zones, and security policy.CIDP inspects traffic up to the Presentation layer.DIDP inspects traffic up to the Application layer.
考题
单选题A customer is trying to decide which 802.1X inner protocol to use on their network. The customer requires that nopasswords be sent across the network in plain text, that the protocol be supported by the Windows native supplicant,and that the protocol supports password changes at Layer 2. Which protocol would meet the customers needs?()A
EAP-TLSB
EAP-MD5C
PAPD
EAP-MSCHAPv2
考题
多选题Which two of these are characteristics of the 802.1Q protocol?()Ait is a layer 2 messaging protocol which maintains vlan configurations across network.Bit includes an 8-bit field which specifies the priority of a frame.Cit is used exclusively for tagging vlan frames and dose not address network reconvergence following switched network topology changes.Dit modifies the 802.3 frame header,and thus requires that the FCS be recomputed.Eit is a trunking protocol capable of carring untagged frames.
考题
多选题Which three statements describe the User Datagram Protocol (UDP)?()AUDP provides delivery notification and error checking mechanisms.BUDP is faster than the Transmission Control Protocol (TCP).CUDP application examples include DNS and VoIP.DUDP is an application layer protocol.EUDP uses a best effort delivery approach.
考题
多选题Which of the following are associated with the application layer of the OSI model?(two.)()ApingBTelnetCFTPDTCPEIP
热门标签
最新试卷