Symmetric encryption algorithm encryption key and decryption key are the same.
A. True
B. False
L2TP user authentication statement is correct:
A. In the LAC can authenticate the user
B. The LNS can authenticate the user
C. After LAC authenticates the user,LNS can authenticate the user again
D. All other options are on the argument
SSL and IPSec security protocols, encryption and authentication. However,SSL protocol only on the application of both data communications transmission is encrypted,but not all of the data from one host to another is encrypted(such as TCP / IP and application layer protocol).
A. True
B. False
In ipsec vpn configuration if you use pre-shared key authentication mode,you can choose whether to configure the key for the end,but if you configure a key,the key must be the same on both sides.
A. True
B. False
Huawei firewall natoutboundwhich supports the following scenario?(Choose three)
A. One address translation
B. -Many address translation
C. -Many address translation
D. Many-to- address translation
Which of the following addresses can be used to manage the SVN web address?(Choose three)
A. Interface address
B. Sub- interface address
C. Sub- IP address of the interface
D. loopback address
Asymmetric encryption algorithm encryption key and decryption key are not the same.
A. True
B. False
In the inter- domain packet filtering firewall,the following is not a direction (Outbound)?
A. Data from the DMZ zone to the Untrust zone flow
B. Data from the Trust zone to the DMZ zone flow
C. Data from the Trust zone to the Untrust zone flow
D. Data from the Trust zone to the Local area streams
In network security,interruption means an attacker to compromise a network system resources,making it become invalid or useless.This is() attack?
A. Availability
B. Confidentiality
C. Integrity
D. Truth
Following the agreement,the work at the network layer have?(Choose two)
A. ICMP
B. IGMP
C. FTP
D. TELNET