Which of the following characteristics does a denial-of-service attack include?
Answer : A, B, C, D
Which of the following is the numbering range of Layer 2 ACLs?
Answer : A
IKE SA is a one-way logical connection, and only one IKE SA needs to be established between two peers.
Answer : B
What is correct about the following description of device management in the operating system?
Answer : A, B, C, D
The keys used by the IPSec encryption and authentication algorithms can be configured manually or dynamically negotiated via the ____ protocol. (abbreviation, all uppercase).
Answer : A
____- The goal is to provide a rapid, composed and effective response in emergency situations, thereby enhancing the ability of the business to recover immediately from a disruptive event.[fill in the blank]*
Answer : A
DES is a stream encryption algorithm, because the cipher capacity is only 56 bits, so it is not enough to deal with the weakness of insufficient security, and later 3DES was proposed.
Answer : A