A.Only symmetric algorithms have a key exchange technology built in
B.Asymmetric algorithms are used quite often as key exchange protocols for symmetricalgorithms
C.Only asymmetric algorithms have a key exchange technology built in
D.Asymmetric algorithms are based on more complex mathematical computations
您可能感興趣的試卷
你可能感興趣的試題
A.Pass
B.Flow
C.Allow
D.Inspect
A.Starting a Smurf attack
B.Conducting social engineering
C.Creating a back door
D.Launching a DoS attack
A.Authorization
B.Confidentiality
C.Authentication
D.Integrity
A.signature-based
B.profile-based
C.rule-based
D.protocol analysis-based
A.2048 bits
B.1024 bits
C.256 bits
D.512 bits
最新試題
Which type of intrusion prevention technology will be primarily used by the Cisco IPS security appliances?()
For the following items, which one acts as a VPN termination device and is located at a primary networklocation?()
Which name is of the e-mail traffic monitoring service that underlies that architecture of IronPort?()
Which one of the aaa accounting commands can be used to enable logging of both the start and stoprecords for user terminal sessions on the router?()
What will be disabled as a result of the no service password-recovery command?()
Which statement is correct regarding the aaa configurations based on the exhibit provided?()
When using the Cisco SDM Quick Setup Siteto-Site VPN wizard, which three parameters do you configure?()
Which statement is true about a Smurf attack?()
In an IEEE 802.1x deployment,between which two devices EAPOL messages typically are sent?()
Which option ensures that data is not modified in transit?()