题目内容

(66) is used to ensure the confidentiality, integrity and authenticity of the two end points in the private network. (67) , an application-layer protocol, authenticates each peer in an IPsec transaction. IKE negotiates security policy, determining which algorithm may be used to set up the tunnel. It also handles the exchange of session keys used for that one transaction. Networks that use (68) to secure data traffic can automatically authenticate devices by using (69) , which verify the identities of the two users who are sending information back and forth. IPsec can be ideal way to secure data in large networks that require secure connections among many devices. Users deploying IPsec can (70) their network infrastructure without affecting the applications on individual computer. The protocol suite is available as a software-only upgrade to the network infrastructure. This alows security to be implemented without costly changes to each computer. Most important, IPsec allows interoperability among different network devices, PCs and other computing systems.

A. authenticity
B. IPSec
C. confidentiality
D. integrity

查看答案
更多问题

In fact, the effects of fires might not be felt for months.

用户李四给数据库服务器发命令,要求将文件“张三.dbf”删除。数据库服务器上的认证机制需要确定的主要问题是 (33) 。

A. 李四是否有删除该文件的权利
B. 李四采用的是哪种加密技术
C. 李四发来的数据是否有病毒
D. 该命令是否是李四发出的

所有对象可以分为各种对象类,有一种特殊的类称为抽象类,其主要特征是 (6) 。

A. 没有实例
B. 没有子类
C. 对数据类型的抽象
D. 抽象地包括了大量实例

在《金匮要略》中麻黄配乌头的作用是

A. 发散寒湿,温经止痛
B. 解表除湿,风湿并治
C. 并行表里之湿
D. 宣肺化痰
E. 散饮降逆

答案查题题库