网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which of the following protocols would MOST likely be used in the establishment of an IPSec VPN tunnel?()
A

 AES 

B

 TKIP

C

 802.1q

D

 ISAKMP


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which of the following protocols would MOST likely be used in the establishment of an IPSec VPN tunnel?()A  AES B  TKIPC  802.1qD  ISAKMP” 相关考题
考题 Which of the following expansion slots would be MOST likely used to install an additional NIC into a desktop PC?() A. PCIB. AGP 8xC. Mini PCID. PCI Express x16

考题 Which of the following protocols would be used in order to log into a router to configure a VLAN?() A.RDPB.SMTPC.TELNETD.FTP

考题 Which of the following protocols would MOST likely be used in the establishment of an IPSec VPN tunnel?() A. AESB. TKIPC. 802.1qD. ISAKMP

考题 Which of the following devices would MOST likely integrate a DHCP server?() A.RouterB.HubC.SwitchD.Bridge

考题 Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?() A.IDSB.VPNC.NIPSD.HIDS

考题 Which of the following would MOST likely be used to punch down LAN cables before connecting them to the main switch?()A、IDFB、66 blockC、MDFD、110 block

考题 Which of the following commands would a technician MOST likely use to map a printer from aremote computer?()A、NET USEB、IPCONFIGC、NSLOOKUPD、TRACERT

考题 Which of the following bottlenecks would MOST likely cause excessive hard drive activity?()A、Inadequate RAMB、Slow processorC、PCI busD、Excessive network traffic

考题 Which of the following protocols would MOST likely be used in the establishment of an IPSec VPN tunnel?()A、 AES B、 TKIPC、 802.1qD、 ISAKMP

考题 An administrator has removed a SATA hard drive from a failed server. Which of the following adapters would MOST likely be used by the administrator to transfer files from the drive to a laptop?()A、SATA to SCSIB、SATA to HBAC、SATA to USBD、SATA to SAS

考题 Which of the following would MOST likely be used with multimode fiber?()A、10GBase-LRB、10GBase-TC、10GBase-ERD、10GBase-SR

考题 Which of the following types of media would MOST likely cause above normal amounts of machine jamming?()A、EnvelopesB、Colored mediaC、LetterheadD、Pre punched

考题 Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?()A、IDSB、VPNC、NIPSD、HIDS

考题 Which of the following ports is MOST likely used for high-end graphics cards?()A、PCIB、PCIeC、ISAD、AGP

考题 Which of the following expansion slots would be MOST likely used to install an additional NIC into a desktop PC?()A、PCIB、AGP 8xC、Mini PCID、PCI Express x16

考题 Which of the following protocols would be used in order to log into a router to configure a VLAN?()A、RDPB、SMTPC、TELNETD、FTP

考题 Which of the following protocols would MOST likely be used in the establishment of an IPSec VPN tunnel?()A、AESB、TKIPC、802.1qD、ISAKMP

考题 Which of the following connector interfaces is MOST likely used to connect several peripheraldevices such as printers, digital cameras, and scanners?()A、ParallelB、USBC、FibreD、SATA3

考题 Which of the following commands would MOST likely be used to see where a loss of connectivity between two devices on a network is located?()A、tracertB、netstatC、nslookupD、ping

考题 Which of the following is the MOST likely authentication scheme used in 802.1x?()A、CHAPB、RADIUSC、TACACS+D、Kerberos

考题 Which of the following devices would MOST likely integrate a DHCP server?()A、RouterB、HubC、SwitchD、Bridge

考题 单选题For the IP address 192.168.2.1 which of the following subnet masks would be MOST likely used?()A 255.255.0.0B 255.255.248.0C 255.255.255.0D 255.255.255.255

考题 单选题A user is reporting that their computer is making strange noises and randomly powers off. Which of the following tools would MOST likely be used to troubleshoot this problem?()A POST diagnostic cardB Power supply testerC Loop back plugD Cable tester

考题 单选题Which of the following wiring standards would MOST likely be used to interconnect two devices without the use of a hub or switch?()A 568AB 568BC CrossoverD Loopback

考题 单选题Which of the following protocols would be used to test if one host is reachable by another host, by sending echo requests and waiting for echo replies?()A SNMPB ICMPC TCPD UDP