题目内容

(66) is used to ensure the confidentiality, integrity and authenticity of the two end points in the private network. (67) , an application-layer protocol, authenticates each peer in an IPsec transaction. IKE negotiates security policy, determining which algorithm may be used to set up the tunnel. It also handles the exchange of session keys used for that one transaction. Networks that use (68) to secure data traffic can automatically authenticate devices by using (69) , which verify the identities of the two users who are sending information back and forth. IPsec can be ideal way to secure data in large networks that require secure connections among many devices. Users deploying IPsec can (70) their network infrastructure without affecting the applications on individual computer. The protocol suite is available as a software-only upgrade to the network infrastructure. This alows security to be implemented without costly changes to each computer. Most important, IPsec allows interoperability among different network devices, PCs and other computing systems.

A. Certificate
B. Encryption
C. Tunnel
D. Presentation

查看答案
更多问题

设有下面4条路由:192.168.129.0/24、192.168.130.0/24、192.168.132.0/24和192.168.133/24,如果进行路由汇聚,能覆盖这4条路由的地址是 (37) 。

A. 192.168.128.0/21
B. 192.168.128.0/22
C. 192.168.130.0/22
D. 192.168.132.0/23

《金匮要略》全书前22篇共有条文是

A. 398节
B. 397节
C. 40节
D. 43节
E. 390节

(66) is used to ensure the confidentiality, integrity and authenticity of the two end points in the private network. (67) , an application-layer protocol, authenticates each peer in an IPsec transaction. IKE negotiates security policy, determining which algorithm may be used to set up the tunnel. It also handles the exchange of session keys used for that one transaction. Networks that use (68) to secure data traffic can automatically authenticate devices by using (69) , which verify the identities of the two users who are sending information back and forth. IPsec can be ideal way to secure data in large networks that require secure connections among many devices. Users deploying IPsec can (70) their network infrastructure without affecting the applications on individual computer. The protocol suite is available as a software-only upgrade to the network infrastructure. This alows security to be implemented without costly changes to each computer. Most important, IPsec allows interoperability among different network devices, PCs and other computing systems.

A. authenticity
B. IPSec
C. confidentiality
D. integrity

In fact, the effects of fires might not be felt for months.

答案查题题库