单项选择题
For the following statements, which one is the strongest symmetrical encryption algorithm?()
A.AES
B.3DES
C.DES
D.Diffie-Hellman
点击查看答案
相关考题
-
单项选择题
Which item is the correct matching relationships associated with IKE Phase?()
A.IKE Phase 1 - P4S1 and P4S4,IKE Phase 2 - P4S2, P4S3 and P4S5
B.IKE Phase 1 - P4S2 and P4S4,IKE Phase 2 - P4S1, P4S3 and P4S5
C.IKE Phase 1 - P4S2 and P4S3,IKE Phase 2 - P4S1, P4S4 and P4S5
D.IKE Phase 1 - P4S1 and P4S2,IKE Phase 2 - P4S3, P4S4 and P4S5 -
单项选择题
Forthefollowingattempts,whichoneistoensurethatnooneemployeebecomesapervasivesecuritythreat,thatdatacanberecoveredfrombackups,andthatinformationsystemchangesdonotcompromiseasystem’ssecurity?()
A.Strategic security planning
B.Disaster recovery
C.Implementation security
D.Operations security -
单项选择题
WhichoneofthefollowingcommandscanbeusedtoenableAAAauthenticationtodetermineifausercanaccesstheprivilegecommandlevel?()
A.aaa authentication enable method default
B.aaa authentication enable default
C.aaa authentication enable level
D.aaa authentication enable default local
