网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which of the following describes a secure connection over the Internet between two sites?()
A

FTP

B

VLAN

C

VPN

D

HTTP


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which of the following describes a secure connection over the Internet between two sites?()A FTPB VLANC VPND HTTP” 相关考题
考题 Which of the following logical network topologies is used to provide a secure connection acrossthe Internet?() A.VLANB.Peer to PeerC.VTPD.VPN

考题 Which of the following describes a secure connection over the Internet between two sites?() A. FTPB. VLANC. VPND. HTTP

考题 VPN connections allow users working at home or on the road to connect in a secure fashion to a ( ) corporate server using the routing infrastructure provided by a public internetwork (such as the Internet). From the users perspective, the VPN connection is a point-to-point connection between the users computer and a corporate ( ). The nature of the ( ) internetwork is irrelevant to the user because it appears as if the data is being sent over a dedicated ( ) link. VPN technology also allows a corporation to connect to branch offices or to other companies over a public internetwork, while maintaining secure ( ). The VPN connection across the Internet logically operates as a wide area network link between the sites.A.customer B.network C.remote D.local A.router B.client C.host D.server A.medium B.intermediate C.remote D.local A.network B.private C.public D.local A.technology B.server C.host D.communications

考题 IPsec, also known as the internet Protocol ( ) , defines the architecture for security services for IP network traffic IPsec describes the framework for providing security a the IP layer, as well as the suite of protocols designed to provide that security: through_ ( )_ and encryption of IP network packets. IPec can be used 10 protect network data, for example, by setting up circuits using IPsec ( ), in which all data being sent between two endpoints is encrypted, as with a Virtual (请作答此空) Network connection ;for encrypting application layer data ;and for providing security for routers sending routing data across the public internet. Internet traffic can also be secured from host to host without the use of IPsec, for example by encryption at the ( ) layer with HTTP Secure (TTPS)or an the transport layer wit the Transport Layer Security (TLS)protocol.A.pubic] B.private] C.personal D.proper

考题 While considering security, which of the following is the BEST place for a public web server accessible via the Internet? ()A、 Internal networkB、 VLANC、 VPND、 DMZ

考题 Router R1, a branch router, connects to the Internet using DSL. Some traffic flows through a GRE and IPsec tunnel, over the DSL connection, and into the core of an Enterprise network. The branch also allows local hosts to communicate directly with public sites in th e Internet over this same DSL connection. Which of the following answers defines how the branch NAT config avoids performing NAT for the Enterprise directed traffic but does perform NAT for the Internet - directed traffic?()A、By not enabling NAT on the I Psec tunnel interfaceB、By not enabling NAT on the GRE tunnel interfaceC、By configuring the NAT - referenced ACL to not permit the Enterprise trafficD、By asking the ISP to perform NAT in the cloud

考题 Which of the following logical network topologies is used to provide a secure connection acrossthe Internet?()A、VLANB、Peer to PeerC、VTPD、VPN

考题 A banking customer has a firewall between their AMM and the remote console which is used to configure the chassis and blades. Due to security concerns, port 80 (http) is being blocked, denying any http access to the AMM. Which of the following would facilitate remote communication with the AMM using a GUI interface?()A、port 443 - SSL connection B、port 8080 ?http C、port 22 - SSH CLI D、port 427 - SLP connection

考题 Which of the following describes a secure connection over the Internet between two sites?()A、FTPB、VLANC、VPND、HTTP

考题 The SCTP layer in the C7 signalling protocol stack is responsible for which of the following:()A、Establishing a signaling channel between two signaling entities in an ATM networkB、Provide reliable connection for signaling between two IP signaling nodesC、Provide routing for IP signaling messages in an IP signaling network

考题 What is the primary use of a remote access VPN?()A、to secure communication between two remote PCsB、to secure communication between two remote officesC、to secure communication betweenan remote PC and the corporate intranetD、to secure communication between a corporate intranet and the public internet

考题 An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?()A、SSHB、WEPC、VPND、WPA

考题 A technician needs to troubleshoot connectivity between two devices located on the same network. Which of the following BEST describes the type of protocol being used?()A、IGPB、EIGRPC、EGPD、BGP

考题 A customer has two locations that host their pSeries servers.  Traffic is being routed through the public Internet.  The customer needs to exchange confidential financial data between the servers.  Which of the following solutions should the pSeries technical specialist propose to the customer to secure the data?()A、A DCE domainB、A Kerberos domainC、A PPP tunnel between the serversD、An IPSEC tunnel between the servers

考题 A customer is planning on establishing a Global Mirror between two Storwize V7000 storagearrays. The customer is planning to lease an IP WAN connection between sites for the tasks andis running a SAP (database) application on Oracle. Which of the following planning considerationsis most important?()A、the distance between sites needs to be less than 100 kilometersB、consistency groups should be created to maintain write order on the remote mirrorC、ensure sufficient bandwidth exists on the link based on average application workloadsD、ensuring a low round trip latency of less than 30ms on the WAN connection is required

考题 单选题A technician needs to troubleshoot connectivity between two devices located on the same network. Which of the following BEST describes the type of protocol being used?()A IGPB EIGRPC EGPD BGP

考题 单选题A customer has two locations that host their pSeries servers.  Traffic is being routed through the public Internet.  The customer needs to exchange confidential financial data between the servers.  Which of the following solutions should the pSeries technical specialist propose to the customer to secure the data?()A A DCE domainB A Kerberos domainC A PPP tunnel between the serversD An IPSEC tunnel between the servers

考题 多选题Which two features prevent routing loops between the OSPF sites of a customer when the sites aremultihomed or a backdoor link is used between the sites? ()Asham linkBdown bitCvirtual linkDSite of OriginEdomain tag

考题 单选题Which of the following logical network topologies is used to provide a secure connection acrossthe Internet?()A VLANB Peer to PeerC VTPD VPN

考题 单选题What is the primary use of a remote access VPN?()A to secure communication between two remote PCsB to secure communication between two remote officesC to secure communication betweenan remote PC and the corporate intranetD to secure communication between a corporate intranet and the public internet

考题 单选题Which of the following best describes the relation between night and knight?A metonymyB homonymyC antonymyD hyponymy

考题 单选题Which of the following describes a secure connection over the Internet between two sites?()A FTPB VLANC VPND HTTP

考题 单选题Which of the following is a secure method of copying information over a public network?()A SCPB SMTPC SNMPD TFTP

考题 单选题Which of the following best describes the passage as a whole?A An outline for future researchB An expanded definition of commonly misunderstood termsC An analysis of a dispute between two theoriesD A discussion of research findings in an ongoing inquiry

考题 单选题While considering security, which of the following is the BEST place for a public web server accessible via the Internet? ()A  Internal networkB  VLANC  VPND  DMZ

考题 单选题A banking customer has a firewall between their AMM and the remote console which is used to configure the chassis and blades. Due to security concerns, port 80 (http) is being blocked, denying any http access to the AMM. Which of the following would facilitate remote communication with the AMM using a GUI interface?()A port 443 - SSL connection B port 8080 ?http C port 22 - SSH CLI D port 427 - SLP connection

考题 单选题Router R1, a branch router, connects to the Internet using DSL. Some traffic flows through a GRE and IPsec tunnel, over the DSL connection, and into the core of an Enterprise network. The branch also allows local hosts to communicate directly with public sites in th e Internet over this same DSL connection. Which of the following answers defines how the branch NAT config avoids performing NAT for the Enterprise directed traffic but does perform NAT for the Internet - directed traffic?()A By not enabling NAT on the I Psec tunnel interfaceB By not enabling NAT on the GRE tunnel interfaceC By configuring the NAT - referenced ACL to not permit the Enterprise trafficD By asking the ISP to perform NAT in the cloud

考题 单选题A customer is planning on establishing a Global Mirror between two Storwize V7000 storagearrays. The customer is planning to lease an IP WAN connection between sites for the tasks andis running a SAP (database) application on Oracle. Which of the following planning considerationsis most important?()A the distance between sites needs to be less than 100 kilometersB consistency groups should be created to maintain write order on the remote mirrorC ensure sufficient bandwidth exists on the link based on average application workloadsD ensuring a low round trip latency of less than 30ms on the WAN connection is required