更多"Data encryption and decryption occu"的相关试题:
[单项选择]Which data dictionary table should you query to view the object privileges granted to the user on specific columns?()
A. USER_TAB_PRIVS_MADE
B. USER_TAB_PRIVS
C. USER_COL_PRIVS_MADE
D. USER_COL_PRIVS
[单项选择]A zone transfer occurs over which of the following ports?()
A. TCP 53
B. UDP 67
C. UDP 123
D. TCP 25
[单项选择]At which lay er of the OSI model does the Spanning Tree Protocol (STP) operate at()
A. Lay er 5
B. Lay er 4
C. Lay er 3
D. Lay er 2
E. Lay er 1
[单项选择]One of the assumptions on which Frito-Lay bases its development strategy is that ______.
[单项选择]Which process occurs first during the Ethernet Discovery Stage process for a PPPoE service offering?()
A. The ERX router sends an Active Discovery Off ermessage.
B. The ERX router sendsan Active Discovery Initiation message.
C. The customer device sends an Active Discovery Offer message.
D. The customer device sends an Active Discovery Initiation message.
[单项选择]Of the following steps, which occurs before the others in making a decision worksheet
A. Listing the consequences of each solution.
B. Calculating a numerical summary of each solution.
C. Deciding which consequences are most important.
D. Writing down all possible solutions.
[多项选择]Which two data intergrity algorithms are commonly used in VPN solutions?()
A. HMAC-MD5
B. RSA
C. HMAC-SHA-1
D. DH1
E. DH2
[单项选择]Which element occurs first during the first-packet-path processing?()
A. destination NAT
B. forwarding lookup
C. route lookup
D. SCREEN options
[单项选择]Which of the following attacks occurs when a hijacker intercepts traffic, modifies it, then sends thetraffic?()
A. DoS
B. Smurf
C. Man-in-the-middle
D. Phishing
[单项选择]Which tech nology manages multicast traffic at Layer 2 by configuring Layer 2 LAN interfaces dynamically to forward multicast traffic only to those interfaces that want to receive it?()
A. IGMP
B. IGMP snooping
C. PIM - DM
D. DVMRP
E. MOS PF
[单项选择]Which function enforces logical data throughput rates that are below the actual physical line rate of a port?()
A. rate limiting
B. data policing
C. classification
D. bandwidth limiting
[多项选择]Which two data link layers are supported by cisco ios software for IPv6?()
A. PPP
B. FDDI
C. Frame Relay PVC
D. NBMA
E. Frame Relay SVC
[单项选择] The following output occurs on Router R1. Which of the following cannot be determine d from this output?() R1# show ip route 180.1.1.0 255.255.255.240 Routing entry for 180.1.1.0/28 Known via "bgp 2", distance 20, metric 0 Tag 3, type external Last update from 192.168.1.2 00:10:27 ago Routing Descriptor Blocks: * 192.168.1.2, from 19 2.168.1.2, 00:10:27 ago Route metric is 0, traffic share count is 1 AS Hops 2 Route tag 3
A. The type of BGP peer (iBGP or eBGP) that advertised this route to R1
B. R1's ASN
C. The next - hop router's ASN
D. The AS_Path length