多項選擇題Asymmetric and symmetric ciphers differ in which of the following way(s)? () 

A.Asymmetric ciphers use pre-shared keys
B.Symmetric ciphers are faster to compute
C.Asymmetric ciphers are faster to compute
D.Asymmetric ciphers use public and private


您可能感興趣的試卷

你可能感興趣的試題

1.單項選擇題Which of the following is the most effective technique to prevent source IPAddress spoofing?()

A. policy based routing (PBR)
B. unicast reverse path forwarding (uRPF)
C. lock and keyACL
D. RFC 1918filtering
E. IP source routing

2.單項選擇題Which type of attacks can be monitored and mitigated by CS-MARS using NetFlow data?()

A. Man-in-themiddle attack
B. Spoof attack
C. Land.C attack
D. Buffer Overflow
E. Day zero attack
F. Trojan Horse

3.單項選擇題Which best represents a typical attackthat takes advantage of RFC 792, ICMPType 3 messages?()

A. Blind connection-reset
B. Large packet echo request
C. Packet fragmentation offset
D. Broadcast-based echo request
E. Excessive bandwidth consumption

4.多項選擇題Cisco IOS IPS sends IPS alert messages using which two protocols? ()

A. SDEE
B. LDAP
C. SYSLOG
D. FTP
E. SNMP
F. SMTP

5.多項選擇題When implementing WLAN security, what are three benefits of using the Temporal Key Integrity Protocol (TKIP) instead of WEP? ()

A. TKIP uses an advanced encryption scheme based on AES
B. TKIP provides authentication and integrity checking using Cipher Block Chaining Message Authentication Code (CBC-MAC)
C. TKIP provides per-packet keyingand a rekeying mechanism
D. TKIP provides message integrity check
E. TKIP reduces WEP’s vulnerabilities byusing different hardware encryption chipset
F. TKIP uses a 48 bit InitializationVector

最新試題

Which ones are the two type of ciphers?()

題型:單項選擇題

Since HTTP is one of the most common protocols used in the internet, what should be done at a firewall level to ensure thatthe protocol is being used correctly? ()

題型:單項選擇題

When implementing internet standards you are required to follow RFC’s processes and procedures based onwhat RFC?()

題型:單項選擇題

Cisco Clean Access ensures that computers connecting to your network have which of the following?()

題型:單項選擇題

Select the two correctstatements from the list below that describe DES and 3DES: ()

題型:多項選擇題

Which of the following statements that describe Diffie Hellman Key exchange are correct? ()

題型:多項選擇題

Which access methods can CS-MARS use toget configuration information from an Adaptive SecurityAppliance (ASA)? ()

題型:多項選擇題

Of the threats discussed below, what is the main advantage of using Cisco Secure Desktop which is part of the Cisco ASA VPN solution?()

題型:單項選擇題

Choose the most correct statements about SMTP/ESMTP. ()

題型:多項選擇題

Which of the following is an example of a security technology that could be enabled by Netflow?()

題型:單項選擇題