单选题Which of the following describes a secure connection over the Internet between two sites?()A FTPB VLANC VPND HTTP

题目
单选题
Which of the following describes a secure connection over the Internet between two sites?()
A

FTP

B

VLAN

C

VPN

D

HTTP


相似考题
更多“单选题Which of the following describes a secure connection over the Internet between two sites?()A FTPB VLANC VPND HTTP”相关问题
  • 第1题:

    While considering security, which of the following is the BEST place for a public web server accessible via the Internet? ()

    • A、 Internal network
    • B、 VLAN
    • C、 VPN
    • D、 DMZ

    正确答案:D

  • 第2题:

    Which of the following logical network topologies is used to provide a secure connection acrossthe Internet?()

    • A、VLAN
    • B、Peer to Peer
    • C、VTP
    • D、VPN

    正确答案:D

  • 第3题:

    Which of the following describes a secure connection over the Internet between two sites?()

    • A、FTP
    • B、VLAN
    • C、VPN
    • D、HTTP

    正确答案:C

  • 第4题:

    What is the primary use of a remote access VPN?()

    • A、to secure communication between two remote PCs
    • B、to secure communication between two remote offices
    • C、to secure communication betweenan remote PC and the corporate intranet
    • D、to secure communication between a corporate intranet and the public internet

    正确答案:C

  • 第5题:

    A technician needs to troubleshoot connectivity between two devices located on the same network. Which of the following BEST describes the type of protocol being used?()

    • A、IGP
    • B、EIGRP
    • C、EGP
    • D、BGP

    正确答案:A

  • 第6题:

    A customer is planning on establishing a Global Mirror between two Storwize V7000 storagearrays. The customer is planning to lease an IP WAN connection between sites for the tasks andis running a SAP (database) application on Oracle. Which of the following planning considerationsis most important?()

    • A、the distance between sites needs to be less than 100 kilometers
    • B、consistency groups should be created to maintain write order on the remote mirror
    • C、ensure sufficient bandwidth exists on the link based on average application workloads
    • D、ensuring a low round trip latency of less than 30ms on the WAN connection is required

    正确答案:B

  • 第7题:

    单选题
    A customer has two locations that host their pSeries servers.  Traffic is being routed through the public Internet.  The customer needs to exchange confidential financial data between the servers.  Which of the following solutions should the pSeries technical specialist propose to the customer to secure the data?()
    A

    A DCE domain

    B

    A Kerberos domain

    C

    A PPP tunnel between the servers

    D

    An IPSEC tunnel between the servers


    正确答案: A
    解析: 暂无解析

  • 第8题:

    单选题
    Which of the following logical network topologies is used to provide a secure connection acrossthe Internet?()
    A

    VLAN

    B

    Peer to Peer

    C

    VTP

    D

    VPN


    正确答案: D
    解析: 暂无解析

  • 第9题:

    单选题
    Which of the following best describes the relation between night and knight?
    A

    metonymy

    B

    homonymy

    C

    antonymy

    D

    hyponymy


    正确答案: B
    解析:

  • 第10题:

    单选题
    Which of the following is a secure method of copying information over a public network?()
    A

    SCP

    B

    SMTP

    C

    SNMP

    D

    TFTP


    正确答案: A
    解析: 暂无解析

  • 第11题:

    单选题
    While considering security, which of the following is the BEST place for a public web server accessible via the Internet? ()
    A

     Internal network

    B

     VLAN

    C

     VPN

    D

     DMZ


    正确答案: A
    解析: 暂无解析

  • 第12题:

    单选题
    Router R1, a branch router, connects to the Internet using DSL. Some traffic flows through a GRE and IPsec tunnel, over the DSL connection, and into the core of an Enterprise network. The branch also allows local hosts to communicate directly with public sites in th e Internet over this same DSL connection. Which of the following answers defines how the branch NAT config avoids performing NAT for the Enterprise directed traffic but does perform NAT for the Internet - directed traffic?()
    A

    By not enabling NAT on the I Psec tunnel interface

    B

    By not enabling NAT on the GRE tunnel interface

    C

    By configuring the NAT - referenced ACL to not permit the Enterprise traffic

    D

    By asking the ISP to perform NAT in the cloud


    正确答案: B
    解析: 暂无解析

  • 第13题:

    Router R1, a branch router, connects to the Internet using DSL. Some traffic flows through a GRE and IPsec tunnel, over the DSL connection, and into the core of an Enterprise network. The branch also allows local hosts to communicate directly with public sites in th e Internet over this same DSL connection. Which of the following answers defines how the branch NAT config avoids performing NAT for the Enterprise directed traffic but does perform NAT for the Internet - directed traffic?()

    • A、By not enabling NAT on the I Psec tunnel interface
    • B、By not enabling NAT on the GRE tunnel interface
    • C、By configuring the NAT - referenced ACL to not permit the Enterprise traffic
    • D、By asking the ISP to perform NAT in the cloud

    正确答案:C

  • 第14题:

    A banking customer has a firewall between their AMM and the remote console which is used to configure the chassis and blades. Due to security concerns, port 80 (http) is being blocked, denying any http access to the AMM. Which of the following would facilitate remote communication with the AMM using a GUI interface?()

    • A、port 443 - SSL connection 
    • B、port 8080 ?http 
    • C、port 22 - SSH CLI 
    • D、port 427 - SLP connection

    正确答案:A

  • 第15题:

    The SCTP layer in the C7 signalling protocol stack is responsible for which of the following:()

    • A、Establishing a signaling channel between two signaling entities in an ATM network
    • B、Provide reliable connection for signaling between two IP signaling nodes
    • C、Provide routing for IP signaling messages in an IP signaling network

    正确答案:B

  • 第16题:

    An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?()

    • A、SSH
    • B、WEP
    • C、VPN
    • D、WPA

    正确答案:D

  • 第17题:

    A customer has two locations that host their pSeries servers.  Traffic is being routed through the public Internet.  The customer needs to exchange confidential financial data between the servers.  Which of the following solutions should the pSeries technical specialist propose to the customer to secure the data?()

    • A、A DCE domain
    • B、A Kerberos domain
    • C、A PPP tunnel between the servers
    • D、An IPSEC tunnel between the servers

    正确答案:D

  • 第18题:

    单选题
    A technician needs to troubleshoot connectivity between two devices located on the same network. Which of the following BEST describes the type of protocol being used?()
    A

    IGP

    B

    EIGRP

    C

    EGP

    D

    BGP


    正确答案: B
    解析: 暂无解析

  • 第19题:

    多选题
    Which two features prevent routing loops between the OSPF sites of a customer when the sites aremultihomed or a backdoor link is used between the sites? ()
    A

    sham link

    B

    down bit

    C

    virtual link

    D

    Site of Origin

    E

    domain tag


    正确答案: D,C
    解析: 暂无解析

  • 第20题:

    单选题
    What is the primary use of a remote access VPN?()
    A

    to secure communication between two remote PCs

    B

    to secure communication between two remote offices

    C

    to secure communication betweenan remote PC and the corporate intranet

    D

    to secure communication between a corporate intranet and the public internet


    正确答案: C
    解析: 暂无解析

  • 第21题:

    单选题
    Which of the following describes a secure connection over the Internet between two sites?()
    A

    FTP

    B

    VLAN

    C

    VPN

    D

    HTTP


    正确答案: D
    解析: 暂无解析

  • 第22题:

    单选题
    Which of the following best describes the passage as a whole?
    A

    An outline for future research

    B

    An expanded definition of commonly misunderstood terms

    C

    An analysis of a dispute between two theories

    D

    A discussion of research findings in an ongoing inquiry


    正确答案: C
    解析:
    文章列举Piaget,Keasey,Nesdale,Rule,Darley等人的研究结果,对儿童的是非判别能力这一议题进行讨论。

  • 第23题:

    单选题
    A banking customer has a firewall between their AMM and the remote console which is used to configure the chassis and blades. Due to security concerns, port 80 (http) is being blocked, denying any http access to the AMM. Which of the following would facilitate remote communication with the AMM using a GUI interface?()
    A

    port 443 - SSL connection 

    B

    port 8080 ?http 

    C

    port 22 - SSH CLI 

    D

    port 427 - SLP connection


    正确答案: D
    解析: 暂无解析

  • 第24题:

    单选题
    A customer is planning on establishing a Global Mirror between two Storwize V7000 storagearrays. The customer is planning to lease an IP WAN connection between sites for the tasks andis running a SAP (database) application on Oracle. Which of the following planning considerationsis most important?()
    A

    the distance between sites needs to be less than 100 kilometers

    B

    consistency groups should be created to maintain write order on the remote mirror

    C

    ensure sufficient bandwidth exists on the link based on average application workloads

    D

    ensuring a low round trip latency of less than 30ms on the WAN connection is required


    正确答案: D
    解析: 暂无解析