更多“Data encryption and decryption occurs at which layer of the”相关问题
  • 第1题:

    Which layer of the OSI reference model uses flow control, sequencing, and acknowledgements to ensure that reliable networking occurs?()

    A. data link

    B. network

    C. transport

    D. presentation

    E. physical


    参考答案:C

  • 第2题:

    IPsec, also known as the internet Protocol ( ) , defines the architecture for security services for IP network traffic IPsec describes the framework for providing security a the IP layer, as well as the suite of protocols designed to provide that security: through_ ( )_ and encryption of IP network packets. IPec can be used 10 protect network data, for example, by setting up circuits using IPsec ( ), in which all data being sent between two endpoints is encrypted, as with a Virtual (请作答此空) Network connection ;for encrypting application layer data ;and for providing security for routers sending routing data across the public internet. Internet traffic can also be secured from host to host without the use of IPsec, for example by encryption at the ( ) layer with HTTP Secure (TTPS)or an the transport layer wit the Transport Layer Security (TLS)protocol.

    A.pubic]
    B.private]
    C.personal
    D.proper

    答案:B
    解析:

  • 第3题:

    At which of the following OSI model layers is HTTPS encryption performed?()

    • A、Layer 3
    • B、Layer 5
    • C、Layer 6
    • D、Layer 7

    正确答案:C

  • 第4题:

    Which description about asymmetric encryption algorithms is correct?()

    • A、They use the same key for encryption and decryption of data.
    • B、They use different keys for decryption but the same key for encryption of data.
    • C、They use different keys for encryption and decryption of data.
    • D、They use the same key for decryption but different keys for encryption of data.

    正确答案:C

  • 第5题:

    Which statement about data center access layer design modes is correct?()

    • A、The access layer is the first oversubscription point in a data center design.
    • B、When using a Layer 2 loop-free design, VLANs are extended into the aggregation layer.
    • C、When using a Layer 2 looped design, VLANs are not extended into the aggregation layer.
    • D、When using a Layer 3 design,stateful services requiring Layer 2 connectivity are provisioned from the aggregation layer.
    • E、The data center access layer provides the physical-level connections to the server resources and only operates at Layer 3.

    正确答案:A

  • 第6题:

    Which layer of the OSI reference model uses flow control, sequencing, and acknowledgements to ensure that reliable networking occurs?()

    • A、data link
    • B、network
    • C、transport
    • D、presentation
    • E、physical

    正确答案:C

  • 第7题:

    Which layer in the OSI model is responsible for translating frames into bits?()

    • A、Application Layer
    • B、Presentation Layer
    • C、Data Link Layer
    • D、Physical Layer

    正确答案:C

  • 第8题:

    单选题
    Which of the following best describes a hash function?()
    A

    An irreversible fast encryption method

    B

    A reversible fast encryption method

    C

    A reversible value computed from a piece of data and used to detect modifications

    D

    An irreversible value computed froma piece of data and used to detect modifications

    E

    A table inwhich values are stored for efficient retrieval.


    正确答案: E
    解析: 暂无解析

  • 第9题:

    单选题
    Which encryption type is used to secure user data in an IPsec tunnel?()
    A

    symmetric key encryption

    B

    asymmetric key encryption

    C

    RSA

    D

    digital certificates


    正确答案: B
    解析: 暂无解析

  • 第10题:

    单选题
    Which of these user ICAP?()
    A

     anti-malware scanning

    B

     data loss prevention polices

    C

     decryption policies

    D

     CiscoIronPort Data Security policies


    正确答案: B
    解析: 暂无解析

  • 第11题:

    多选题
    Which two statements regarding symmetric key encryption are true?() (Choose two.)
    A

    The same key is used for encryption and decryption.

    B

    It is commonly used to create digital certificate signatures.

    C

    It uses two keys: one for encryption and a different key for decryption.

    D

    An attacker can decrypt data if the attacker captures the key used for encryption.


    正确答案: D,B
    解析: 暂无解析

  • 第12题:

    单选题
    Which statement about data center access layer design modes is correct?()
    A

     The access layer is the first oversubscription point in a data center design.

    B

     When using a Layer 2 loop-free design, VLANs are extended into the aggregation layer.

    C

     When using a Layer 2 looped design, VLANs are not extended into the aggregation layer.

    D

     When using a Layer 3 design, stateful services requiring Layer 2 connectivity are provisionedfrom the aggregation layer.

    E

     The data center access layer provides the physical-level connections to the server resourcesand only operates at Layer 3.


    正确答案: A
    解析: 暂无解析

  • 第13题:

    At which layer of the OSI model is RSTP used to prevent loops?()

    A.data link

    B.network

    C.physical

    D.transport


    参考答案:A

  • 第14题:

    Which of the following best describes a hash function?()

    • A、An irreversible fast encryption method
    • B、A reversible fast encryption method
    • C、A reversible value computed from a piece of data and used to detect modifications
    • D、An irreversible value computed froma piece of data and used to detect modifications
    • E、A table inwhich values are stored for efficient retrieval.

    正确答案:D

  • 第15题:

    Which of these user ICAP?()

    • A、 anti-malware scanning
    • B、 data loss prevention polices
    • C、 decryption policies
    • D、 CiscoIronPort Data Security policies

    正确答案:B

  • 第16题:

    At which layer of the OSI model is RSTP used to prevent loops?()

    • A、data link
    • B、network
    • C、physical
    • D、transport

    正确答案:A

  • 第17题:

    Which layer of the OSI reference model is responsible for ensuring reliable end-to-end delivery of data?()

    • A、Application
    • B、Presentation
    • C、Session
    • D、Transport
    • E、Network
    • F、Data-Link

    正确答案:D

  • 第18题:

    Data encryption and decryption occurs at which layer of the OSI model?()

    • A、Transport
    • B、Presentation
    • C、Session
    • D、Application

    正确答案:B

  • 第19题:

    Which two statements regarding asymmetric key encryption are true?()

    • A、The same key is used for encryption and decryption.
    • B、It is commonly used to create digital certificate signatures.
    • C、It uses two keys: one for encryption and a different key for decryption.
    • D、An attacker can decrypt data if the attacker captures the key used for encryption

    正确答案:A,B

  • 第20题:

    多选题
    Which two statements regarding asymmetric key encryption are true?()
    A

    The same key is used for encryption and decryption.

    B

    It is commonly used to create digital certificate signatures.

    C

    It uses two keys: one for encryption and a different key for decryption.

    D

    An attacker can decrypt data if the attacker captures the key used for encryption


    正确答案: C,B
    解析: 暂无解析

  • 第21题:

    单选题
    Which design topology incurs a performance penalty since there are two encryption-decryption cycles between any two remote sites?()
    A

    peer-to-peer

    B

    partial mesh

    C

    hub and spoke

    D

    full mesh


    正确答案: C
    解析: 暂无解析

  • 第22题:

    单选题
    Which of the following is used by BitLocker to lock an encryption key and protect data?()
    A

    ECP

    B

    IRQ

    C

    AGP

    D

    TPM


    正确答案: D
    解析: 暂无解析

  • 第23题:

    单选题
    Which description about asymmetric encryption algorithms is correct?()
    A

    They use the same key for encryption and decryption of data.

    B

    They use different keys for decryption but the same key for encryption of data.

    C

    They use different keys for encryption and decryption of data.

    D

    They use the same key for decryption but different keys for encryption of data.


    正确答案: B
    解析: 暂无解析

  • 第24题:

    单选题
    Which layer of the OSI reference model uses flow control, sequencing, and acknowledgements to ensure that reliable networking occurs?()
    A

    data link

    B

    network

    C

    transport

    D

    presentation

    E

    physical


    正确答案: A
    解析: 暂无解析