网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
Ensuring that data is transmitted securely over an IP network is the main purpose of:()
- A、Telnet
- B、FTP
- C、SIP
- D、TLS
参考答案
更多 “Ensuring that data is transmitted securely over an IP network is the main purpose of:()A、TelnetB、FTPC、SIPD、TLS” 相关考题
考题
●Flow control is a function that prevents network congestion by ensuring that (71) do not overwhelm (72) with datA.There are three commonly used methods for handling network congestion . (73) is used by network devices to temporarily store bursts of excess data in memory until they can be processed. (74) are used by receiving devices to help prevent their buffers from overflowing . (75) is a flow-control scheme in which the source device requires an acknowledgment from the destination after a certain number of packets have been transmitted.(71)~(72)A.transmitting devicesB.transmitted devicesC.receiving devicesD.received devices(73)~(75) A.BufferB.Source-quench messagesC.BufferingD.Windowing
考题
Flow control is a function that prevents network congestion by ensuring that _( )_ do not overwhelm_( )_ with data.There are three commonly used methods for handling network congestion._( )_is used by network devices to temporarily store bursts of excess data in memory until they can be processed._( )_ are used by receiving devices to help prevent their buffers from overflowing._( )_ is a flow-control scheme in which the source device requires an acknowledgment from the destination after a certain number of packets have been transmitted.A.transmitting devicesB.transmitted devicesC.receiving devicesD.received devices@@@SXB@@@A.transmitting devicesB.transmitted devicesC.receiving devicesD.received devices@@@SXB@@@A.BufferB.Source-quench messagesC.windowD.WindowingE.Buffering@@@SXB@@@A.BufferB.Source-quench messagesC.windowD.WindowingE.Buffering@@@SXB@@@A.BufferB.Source-quench messagesC.windowD.WindowingE.Buffering
考题
Which of the following protocols is commonly used for VoIP technology?()
A.TelnetB.SMTPC.SIPD.SNMP
考题
Flow control is a function that prevents network congestion by ensuring that(71)do not overwhelm(72)with data. There are three commonly used methods for handling network congestion.(73)is used by network devices to temporarily store bursts of excess data in memory until they can be processed. (74)are used by receiving devices to help prevent their buffers from overflowing.(75)is a flow -control scheme in which the source device requires an acknowledgment from the destination after a certain number of packets have been transmitted.A.transmitting devicesB.transmitted devicesC.receiving devicesD.received devices
考题
EnsuringthatdataistransmittedsecurelyoveranIPnetworkisthemainpurposeof:()
A.TelnetB.FTPC.SIPD.TLS
考题
Which of the following should be implemented to allow a user to securely connect to a network driveremotely?()
A. Enable file and print shareB. FTPC. VPND. Map a drive
考题
Flow control is a function that prevents network congestion by ensuring that(66)do not over-whelm(67)with data. There are three commonly used methods for handling network congestion.(68)is used by network devices to temporarily store bursts of excess data in memory until they can be processed.(69)are used by receiving devices to help prevent their buffers from overflowing.(70)is a flow-control scheme in which the source device requires an acknowledgment from the destination after a certain number of packets have been transmitted.A.transmitting devicesB.transmitted devicesC.receiving devicesD.received devices
考题
Network managers have long awaited practical voice-over-IP(VOIP)solutions. VOIP promises(71)network management and decreases costs by(72)a company's telephony and data infrastructures into one network. And a VOIP solution implemented at a company' s head -quarters with far -reaching branch offices can(73)tremendous amounts of(74)in long distance phone bills, provided that solution delivers POTS -like voice(75)over the Internet.A.complicatedB.usefulC.easeD.orderly
考题
An IP ( ) is a unique number the computer uses to identify itself, and to be identified over a network.A.addressB.deviceC.pointD.data
考题
IPsec, also known as the internet Protocol ( ) , defines the architecture for security services for IP network traffic IPsec describes the framework for providing security a the IP layer, as well as the suite of protocols designed to provide that security: through_ ( )_ and encryption of IP network packets. IPec can be used 10 protect network data, for example, by setting up circuits using IPsec ( ), in which all data being sent between two endpoints is encrypted, as with a Virtual (请作答此空) Network connection ;for encrypting application layer data ;and for providing security for routers sending routing data across the public internet. Internet traffic can also be secured from host to host without the use of IPsec, for example by encryption at the ( ) layer with HTTP Secure (TTPS)or an the transport layer wit the Transport Layer Security (TLS)protocol.A.pubic]
B.private]
C.personal
D.proper
考题
A virtual (71) network, or VPN, is an encrypted connection over the Internet from a device to a network. The encrypted connection helps ensure that sensitive data is safely (72). It prevents (73) people fromeavesdropping on the traffic and allows the user to conduct work remotely. Traffic on the virtual network is sent securely by establishing an encrypted connection across the Internet known as a (74).A remote access VPN securely connects a device outside the corporate office. A site-to-site VPN connects the corporate office to branch offices over the Internet. Site-to-site VPNs are used when distance makes it impractical to have direct network connections between these offices. Think of site-to-site access as (75) to network.
A.encodedB.encryptedC.storedD.transmitted
考题
A virtual (71) network, or VPN, is an encrypted connection over the Internet from a device to a network. The encrypted connection helps ensure that sensitive data is safely (72). It prevents (73) people fromeavesdropping on the traffic and allows the user to conduct work remotely. Traffic on the virtual network is sent securely by establishing an encrypted connection across the Internet known as a (74).A remote access VPN securely connects a device outside the corporate office. A site-to-site VPN connects the corporate office to branch offices over the Internet. Site-to-site VPNs are used when distance makes it impractical to have direct network connections between these offices. Think of site-to-site access as (75) to network.
A.channelB.pathC.tunnelD.route
考题
You are the network consultant from passguide.com. You have been asked for which two features of optical networks allow data to be transmitted over extremely long distances? ()A、EncryptionB、Bandwidth limitsC、Minimal signal lossD、No EMI
考题
Which is the main difference between host-based and network-based intrusion prevention?()A、Host-based IPS can work in promiscuous mode or inline mode.B、Network-based IPS can provide protection to desktops and servers without the need of installing specialized software on the end hosts and servers.C、Network-based IPS is better suited for inspection of SSL and TLS encrypted data flows.D、Host-based IPS deployment requires less planning than network-based IPS.
考题
Which of the following should be implemented to allow a user to securely connect to a network driveremotely?()A、Enable file and print shareB、FTPC、VPND、Map a drive
考题
Which of the following protocols is commonly used for VoIP technology?()A、TelnetB、SMTPC、SIPD、SNMP
考题
What are three purposes of the RMAN “FROM” clause?()A、to support PUSH-based active database duplicationB、to support synchronization of a standby database with the primary database in a Data environmentC、To support PULL-based active database duplicationD、To support file restores over the network in a Data Guard environmentE、To support file recovery over the network in a Data Guard environment
考题
You are a network administrator for your company. The company has a main office and one branch office. The network consists of a single Active Directory domain. All servers run Windows Server 2003. The company needs to connect the main office network and the branch office network by using Routing and Remote Access servers at each office. The networks will be connected by a VPN connection over the Internet. The company’s written security policy includes the following requirements for VPN connections over the Internet: All data must be encrypted with end-to-end encryption. VPN connection authentication must be at the computer level. Credential information must not be transmitted over the Internet as part of the authentication process. You need to configure security for VPN connection between the main office and the branch office. You need to comply with the written security policy. What should you do? ()A、 Use a PPTP connection with EAP-TLS authentication.B、 Use a PPTP connection with MS-CHAP v2 authentication.C、 Use an L2TP connection with EAP-TLS authentication.D、 Use an L2TP connection with MS-CHAP v2 authentication.
考题
You need to evaluate whether the currently available network bandwidth is adequate to run NewApp. Which three actions should you perform?()A、Use a debug version of NewApp to collect information about NewApp.B、Use Performance Monitor to collect data about the saturation of each WAN link.C、Use Network Monitor to analyze the data that is transmitted over the network for App1.D、Install SNMP on all computers that are connected to App1 to obtain information about App1.E、Build a test environment for NewApp to analyze how much bandwidth is required for NewApp.
考题
多选题You are the network consultant from passguide.com. You have been asked for which two features of optical networks allow data to be transmitted over extremely long distances? ()AEncryptionBBandwidth limitsCMinimal signal lossDNo EMI
考题
多选题Your company has a single Active Directory domain. All servers run Windows Server 2008. The company network has servers that perform as Web Servers. All confidential files are located on a server named FSS1. The company security policy states that all confidential data must be transmitted in the most secure manner. When you monitor the network you notice that the confidential files stored on FSS1 server are being transmitted over the network without encryption. You need to ensure that encryption is always usedwhen the confidential files on the FSS1 server are transmitted over the network. What are two possible ways to achieve this goal? ()ADeactivate all LM and NTLM authentication methods on FSS1 serverBUse IIS to publish the confidential files, activate SSL on the IIS server, and then open the files as a web folderCUse IPsec encryption between the FSS1 server and the computers of the users who need to access the confidential files.DUse the Server Message Block (SMB) signing between the FSS1 server and the computers of the users who want to access the confidential files.EActivate offline files for the confidential files that are stored on the FSS1 server. In the Folder avanced Properties box, select the Encrypt contents to secure data optiion
考题
单选题Ensuring that data is transmitted securely over an IP network is the main purpose of:()A
TelnetB
FTPC
SIPD
TLS
热门标签
最新试卷