题目内容

(66) is used to ensure the confidentiality, integrity and authenticity of the two end points in the private network. (67) , an application-layer protocol, authenticates each peer in an IPsec transaction. IKE negotiates security policy, determining which algorithm may be used to set up the tunnel. It also handles the exchange of session keys used for that one transaction. Networks that use (68) to secure data traffic can automatically authenticate devices by using (69) , which verify the identities of the two users who are sending information back and forth. IPsec can be ideal way to secure data in large networks that require secure connections among many devices. Users deploying IPsec can (70) their network infrastructure without affecting the applications on individual computer. The protocol suite is available as a software-only upgrade to the network infrastructure. This alows security to be implemented without costly changes to each computer. Most important, IPsec allows interoperability among different network devices, PCs and other computing systems.

A. secure
B. relation
C. script
D. strict

查看答案
更多问题

关羽是佛教中最著名的汉化伽蓝神。( )P89

A. 对
B. 错

KDC分发密钥时,进行通信的两台主机都需要向KDC申请会话密钥。主机与KDC通信时使用的是 (34) 。

A. 临时密钥
B. 二者共享的永久密钥
C. 公开密钥
D. 会话密钮

普通家庭中的计算机可以通过 (15) 接入到HFC网络,实现宽带上网。

ADSL MODEM
B. NT1
Cable MODEM
D. TA

Windows组网是指把Windows终端和服务器连接起米。采用 (30) 工具可实现域的创建和管理。

A. LDAP
BDC
C. RPC
D. PDC

答案查题题库