單項(xiàng)選擇題Which component of VPN technology ensures that data can be read only by its intended recipient?()

A. data integrity
B. encryption
C. key exchange
D. authentication


您可能感興趣的試卷

你可能感興趣的試題

2.單項(xiàng)選擇題When a host transmits data across a network to another host, which process does the data go through?()

A. standardization
B. conversion
C. encapsulation
D. synchronization

3.單項(xiàng)選擇題A network admin wants to know every hop the packets take when he accesses cisco.com. Which command is the most appropriate to use?()

A. path cisco.com
B. debug cisco.com
C. trace cisco.com
D. traceroute cisco.com

4.單項(xiàng)選擇題Which line from the output of the show ip interface command indicates a layer 1 problem?()

A. Serial0/1 is up, line protocol is down
B. Serial0/1 is down, line protocol is down
C. Serial0/1 is up, line protocol is up
D. Serial0/1 is administratively down, line protocol is down

5.單項(xiàng)選擇題Which statement about IPv6 is true?()

A. Addresses are not hierarchical and are assigned at random.
B. Only one IPv6 address can exist on a given interface.
C. There are 2.7 billion addresses available.
D. Broadcasts have been eliminated and replaced with multicasts.

最新試題

Which address is the IPV6 all-RIP-routers muticast group address that is used by RIPng as the destaion address?()

題型:?jiǎn)雾?xiàng)選擇題

Which name describes an IPV6 host-enable tunneling technique that uses IPV4 UDP,does not require dedicated gateway tunnels,and can pass through existing IPV4 NAT gateways?()

題型:?jiǎn)雾?xiàng)選擇題

A network administrator needs to configure a serial link between the main office and a remote location.The router at the remote office is a non-cisco router. How should the network administrator configure the serial interface of the main office router to make the connection?()

題型:?jiǎn)雾?xiàng)選擇題

Which command encrypts all plaintext passwords?()

題型:?jiǎn)雾?xiàng)選擇題

What is the result of issuing the frame-relay map ip 192.168.1.2 202 broadcast command?()

題型:?jiǎn)雾?xiàng)選擇題

Which IPsec security protocol should be used when confidentiality is required?()

題型:?jiǎn)雾?xiàng)選擇題

Which pairing reflects a correct protocol-and-metric relationship?()

題型:?jiǎn)雾?xiàng)選擇題

If all OSPF routers in a single area are configured with the same priority value,what value dose a router use for the ODPF router ID in the absence of a loopback interface?()

題型:?jiǎn)雾?xiàng)選擇題

A network administrator is planning a network installation for a large organization.The design requires 100 separate subnetworks,so the company has acquired a Class B network address.What subnet mask will provide the 100 subnetworks required, if 500 usable host addresses are required per subnet?()

題型:?jiǎn)雾?xiàng)選擇題

The network administrator cannot to switch 1 over a telnet session,although the hosts attached to switch 1 can ping the interface Fa0/0 of the router.Given the information in the graphic and assuming that the router and switch2 are configured properly,which of the following commands should be issued on switch 1 to correct this problem?()

題型:?jiǎn)雾?xiàng)選擇題