题目详情
当前位置:首页 > 职业培训考试
题目详情:
发布时间:2023-09-30 16:28:59

[单项选择]Data encryption and decryption occurs at which layer of the OSI model?()
A. Transport
B. Presentation
C. Session
D. Application

更多"Data encryption and decryption occu"的相关试题:

[单项选择]Which data dictionary table should you query to view the object privileges granted to the user on specific columns?()
A. USER_TAB_PRIVS_MADE
B. USER_TAB_PRIVS
C. USER_COL_PRIVS_MADE
D. USER_COL_PRIVS
[单项选择]A zone transfer occurs over which of the following ports?()
A. TCP 53
B. UDP 67
C. UDP 123
D. TCP 25
[单项选择]At which lay er of the OSI model does the Spanning Tree Protocol (STP) operate at()
A. Lay er 5
B. Lay er 4
C. Lay er 3
D. Lay er 2
E. Lay er 1
[单项选择]One of the assumptions on which Frito-Lay bases its development strategy is that ______.
[单项选择]Which process occurs first during the Ethernet Discovery Stage process for a PPPoE service offering?()
A. The ERX router sends an Active Discovery Off ermessage.
B. The ERX router sendsan Active Discovery Initiation message.
C. The customer device sends an Active Discovery Offer message.
D. The customer device sends an Active Discovery Initiation message.
[单项选择]Of the following steps, which occurs before the others in making a decision worksheet
A. Listing the consequences of each solution.
B. Calculating a numerical summary of each solution.
C. Deciding which consequences are most important.
D. Writing down all possible solutions.
[多项选择]Which two data intergrity algorithms are commonly used in VPN solutions?()
A. HMAC-MD5
B. RSA
C. HMAC-SHA-1
D. DH1
E. DH2
[单项选择]Which element occurs first during the first-packet-path processing?()
A. destination NAT
B. forwarding lookup
C. route lookup
D. SCREEN options
[单项选择]Which of the following attacks occurs when a hijacker intercepts traffic, modifies it, then sends thetraffic?()
A. DoS
B. Smurf
C. Man-in-the-middle
D. Phishing
[单项选择]Which tech nology manages multicast traffic at Layer 2 by configuring Layer 2 LAN interfaces dynamically to forward multicast traffic only to those interfaces that want to receive it?()
A. IGMP
B. IGMP snooping
C. PIM - DM
D. DVMRP
E. MOS PF
[单项选择]Which function enforces logical data throughput rates that are below the actual physical line rate of a port?()
A. rate limiting
B. data policing
C. classification
D. bandwidth limiting
[多项选择]Which two data link layers are supported by cisco ios software for IPv6?()
A. PPP
B. FDDI
C. Frame Relay PVC
D. NBMA
E. Frame Relay SVC
[单项选择] The following output occurs on Router R1. Which of the following cannot be determine d from this output?() R1# show ip route 180.1.1.0 255.255.255.240 Routing entry for 180.1.1.0/28 Known via "bgp 2", distance 20, metric 0 Tag 3, type external Last update from 192.168.1.2 00:10:27 ago Routing Descriptor Blocks: * 192.168.1.2, from 19 2.168.1.2, 00:10:27 ago Route metric is 0, traffic share count is 1 AS Hops 2 Route tag 3
A. The type of BGP peer (iBGP or eBGP) that advertised this route to R1
B. R1's ASN
C. The next - hop router's ASN
D. The AS_Path length

我来回答:

购买搜题卡查看答案
[会员特权] 开通VIP, 查看 全部题目答案
[会员特权] 享免全部广告特权
推荐91天
¥36.8
¥80元
31天
¥20.8
¥40元
365天
¥88.8
¥188元
请选择支付方式
  • 微信支付
  • 支付宝支付
点击支付即表示同意并接受了《购买须知》
立即支付 系统将自动为您注册账号
请使用微信扫码支付

订单号:

请不要关闭本页面,支付完成后请点击【支付完成】按钮
恭喜您,购买搜题卡成功
重要提示:请拍照或截图保存账号密码!
我要搜题网官网:https://www.woyaosouti.com
我已记住账号密码