更多"Which two methods use IPsec to prov"的相关试题:
[单项选择]Which IPsec security protocol should be used when confidentiality is required?()
A. PSK
B. AH
C. MD5
D. ESP
[多项选择]Which two parameters are configured in IPsec policy? ()(Choose two.)
A. mode
B. IKE gateway
C. security proposal
D. Perfect Forward Secrecy
[单项选择]
Passage Five Which of your two hands do you use more Very few of us can use both hands equally well. Most of us are right-handed. Only about five people out of a hundred are left-handed. New-born babies can take hold of things with either of their hands, but. in about two years they usually use their right hands. Scientists have found that monkeys like to use one of their hands more than the other, but it can be either hand. There are as many right-handed monkeys as there are left-handed ones. Next time when you visit a zoo, you’ll see that some of them will use their right hands and others will use their left hands. But most of the people use their right hands better and this makes life difficult for those left-handed people. We live in a right-handed world.
Most people ()
A. are left-handed
B. are right-handed
C. can use both hands equally well
D. never use left hands
[多项选择]Which two protocols use UDP as a transport protocol by default?()
A. Telnet
B. ICMP
C. DHCP
D. RIP
[多项选择]Which two secure remote access methods are available on the WX platforms?() (Choose two.)
A. SSL
B. SSH
C. Telnet
D. HTTP
[多项选择]For which two situations would you use functionality provided by the Resource Manager?()
A. setting idle timeout limits on resource plans
B. saving storage space by using compressed backup sets
C. creating jobs that will run automatically at a scheduled time
D. assigning priorities to jobs to manage access to system resources
E. creating alerts to perform notification when tablespaces are low on available space resources
[单项选择]Which of the following methods is used to provide a standard to measure performance
A. Benchmarkin
B. Samplin
C. Estimatin
D. Levelin