题目内容

(66) is used to ensure the confidentiality, integrity and authenticity of the two end points in the private network. (67) , an application-layer protocol, authenticates each peer in an IPsec transaction. IKE negotiates security policy, determining which algorithm may be used to set up the tunnel. It also handles the exchange of session keys used for that one transaction. Networks that use (68) to secure data traffic can automatically authenticate devices by using (69) , which verify the identities of the two users who are sending information back and forth. IPsec can be ideal way to secure data in large networks that require secure connections among many devices. Users deploying IPsec can (70) their network infrastructure without affecting the applications on individual computer. The protocol suite is available as a software-only upgrade to the network infrastructure. This alows security to be implemented without costly changes to each computer. Most important, IPsec allows interoperability among different network devices, PCs and other computing systems.

A. characteristics
B. associated links
C. digital certificates
D. attributes

查看答案
更多问题

在某台路由器上定义了一条访问控制列表access-list 109 deny icmp 10.1.10.10 0.0.255.255 any host-unreachable,其含义是 (51) 。

A. 规则序列号是109,禁止到10.1.10.10主机的所有主机不可达报文
B. 规则序列号是109,禁止到10.1.0.0/16网段的所有主机不可达报文
C. 规则序列号是109,禁止从10.1.0.0/16网段来的所有主机不可达报文
D. 规则序列号是109,禁止从10.1.10.10主机来的所有主机不可达报文

对注册资本在500万元以上.人员在50人以上的新办大中型商贸企业,在进行税务登记时提出一般纳税人资格申请的,可直接认定为正式一般纳税人并进行管理。( )

A. 对
B. 错

东汉顺帝时,张陵在四川鹤鸣山,奉______为教主,以______为主要经典。P89

对于流媒体应用,通常在传输层采用的拥塞控制策略是 (27) 。

A. Wine策略
B. Milk策略
C. RED策略
D. Hop by Hop策略

答案查题题库