Transport
Presentation
Session
Application
第1题:
A. data link
B. network
C. transport
D. presentation
E. physical
第2题:
第3题:
At which of the following OSI model layers is HTTPS encryption performed?()
第4题:
Which description about asymmetric encryption algorithms is correct?()
第5题:
Which statement about data center access layer design modes is correct?()
第6题:
Which layer of the OSI reference model uses flow control, sequencing, and acknowledgements to ensure that reliable networking occurs?()
第7题:
Which layer in the OSI model is responsible for translating frames into bits?()
第8题:
An irreversible fast encryption method
A reversible fast encryption method
A reversible value computed from a piece of data and used to detect modifications
An irreversible value computed froma piece of data and used to detect modifications
A table inwhich values are stored for efficient retrieval.
第9题:
symmetric key encryption
asymmetric key encryption
RSA
digital certificates
第10题:
anti-malware scanning
data loss prevention polices
decryption policies
CiscoIronPort Data Security policies
第11题:
The same key is used for encryption and decryption.
It is commonly used to create digital certificate signatures.
It uses two keys: one for encryption and a different key for decryption.
An attacker can decrypt data if the attacker captures the key used for encryption.
第12题:
The access layer is the first oversubscription point in a data center design.
When using a Layer 2 loop-free design, VLANs are extended into the aggregation layer.
When using a Layer 2 looped design, VLANs are not extended into the aggregation layer.
When using a Layer 3 design, stateful services requiring Layer 2 connectivity are provisionedfrom the aggregation layer.
The data center access layer provides the physical-level connections to the server resourcesand only operates at Layer 3.
第13题:
A.data link
B.network
C.physical
D.transport
第14题:
Which of the following best describes a hash function?()
第15题:
Which of these user ICAP?()
第16题:
At which layer of the OSI model is RSTP used to prevent loops?()
第17题:
Which layer of the OSI reference model is responsible for ensuring reliable end-to-end delivery of data?()
第18题:
Data encryption and decryption occurs at which layer of the OSI model?()
第19题:
Which two statements regarding asymmetric key encryption are true?()
第20题:
The same key is used for encryption and decryption.
It is commonly used to create digital certificate signatures.
It uses two keys: one for encryption and a different key for decryption.
An attacker can decrypt data if the attacker captures the key used for encryption
第21题:
peer-to-peer
partial mesh
hub and spoke
full mesh
第22题:
ECP
IRQ
AGP
TPM
第23题:
They use the same key for encryption and decryption of data.
They use different keys for decryption but the same key for encryption of data.
They use different keys for encryption and decryption of data.
They use the same key for decryption but different keys for encryption of data.
第24题:
data link
network
transport
presentation
physical