Which of the following are not steps in setting up aTLS session? ()A、 Client sends Hello to Server listing all of its supported cipher suitesB、 Server sends Hello to Client listing all of its supported cipher suitesC、 Client calculates and sends encrypted

题目

Which of the following are not steps in setting up aTLS session? ()

  • A、 Client sends Hello to Server listing all of its supported cipher suites
  • B、 Server sends Hello to Client listing all of its supported cipher suites
  • C、 Client calculates and sends encryptedpre_master_secret
  • D、 Client and Server calculate keys from pre_master_secret
  • E、 Server sends Change Cipher Spec to indicate a shift to encrypted mode
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

What does a router do if it has no EIGRP feasible successor route to a destination network and the successor route to that destination network is inactive status?()

A. It routes all traffic that is addresses to the destination network to the interface indicates in the routing table.

B. It sends a copy of its neighbor table to all adjacent routers.

C. It sends a multicast query packet to all adjacent neighbors requesting available routing paths to the destination network.

D. It broadcasts Hello packets to all routers in the network to re-establish neighbor adjacencies.


参考答案:C

第2题:

Using FTP passive mode, after the client opens thecommand channel (port 21) to the FTP server and requests passive mode, what will be the next step? ()

  • A、 The FTP server sends back an acknowledgment (ACK) to the client
  • B、 The FTP server allocates a port touse for the data channel and transmit that port number to the client
  • C、 The FTP server opens the data channel to the client using the port number indicated by the client
  • D、 The FTP client opens the data channel to the FTP server on Port 20
  • E、 The FTP client opens the datachannel to the FTP server on Port 21

正确答案:B

第3题:

Which IDP policy action closes the connection and sends an RST packet to both the client and the server?()

A. close-connection

B. terminate-connection

C. close-client-and-server

D. terminate-session


参考答案:C

第4题:

Your network consists of a single Active Directory domain. The domain contains a server named Server1 that runs Windows Server 2008.All client computers run Windows Vista. All computers are members of the Active Directory domain. You assign the Secure Server (Require Security) IPsec policy to Server1 by using a Group Policy object(GPO). Users report that they fail to connect to Server1.You need to ensure that users can connect to Server1. All connections to Server1 must be encrypted. What should you do? ()

  • A、Restart the IPsec Policy Agent service on Server1.
  • B、Assign the Client (Respond Only) IPsec policy to Server1.
  • C、Assign the Server (Request Security) IPsec policy to Server1.
  • D、Assign the Client (Respond Only) IPsec policy to all client computers.

正确答案:D

第5题:

How does the PFE handle unicast transit traffic destined for an existing forwarding table entry?()

  • A、It sends the traffic through one egress port toward its destination
  • B、It sends the traffic through multiple egress ports to all available receivers
  • C、It sends the traffic through an internal link to the RE
  • D、It sends the traffic to the local system for further processing

正确答案:A

第6题:

Which of the following types of attacks does DHCP snooping prevent?(Choose all that apply.)()

  • A、Attacker sends multiple DHCP requests flooding DHCP server
  • B、Attacker connects rogue server initiating DHCP requests
  • C、Attacker connects rogue server replying to DHCP requests
  • D、Attacker sends DHCP jam signal causing DHCP server to crash
  • E、Attacker sends gratuitous ARP replies, thereby jamming the DHCP server
  • F、Attacker sends unsolicited DHCP replies, thereby jamming the DHCP server

正确答案:A,C

第7题:

Which set of statements describes the correct order and process of a Company wireless user  client associating with a wireless access point in the Company network? ()

  • A、 1. Access point sends probe request .2. Client sends probe response.3. Client initiates  association.4. Access point accepts association.5. Client adds access point MAC address to  association table.
  • B、 1. Client sends probe request.2. Access point sends probe response.3. Client initiates  association.4. Access point accepts association.5. Access point adds client MAC address to  association table.
  • C、 1. Client sends probe request.2. Access point sends probe response.3. Access point initiates  association.4. Client accepts association.5. Access point adds client MAC address to association  table.
  • D、 1. Access point sends probe request .2. Client sends probe response.3. Client initiates  association.4. Access point accepts association.5. Access point adds client MAC address to  association table.
  • E、 1. Client sends probe request.2. Access point sends probe response.3. Client initiates  association.4. Access point accepts association.5. Client adds access point MAC address to  association table.
  • F、 None of the other alternatives apply.

正确答案:B

第8题:

Which three statements are true regarding the Network Time Protocol (NTP) in JUNOS platforms?()

A.MD5 authentication is supported.

B.A client always synchronizes to a server even when the difference between the server clock and the local clock differs by a large amount.

C.JUNOS software can provide a primary time reference.

D.The boot-server configuration allows a router to synchronize its clock when it boots up, regardless of the offset between the NTP clock source and its internal clock.

E.It is useful to correlate timestamps on log files and other events for troubleshooting and forensics.


参考答案:A, D, E

第9题:

Which IDP policy action closes the connection and sends an RST packet to both the client and the server?()

  • A、close-connection
  • B、terminate-connection
  • C、close-client-and-server
  • D、terminate-session

正确答案:C

第10题:

Your network consists of single active domain. The domain contains a serve named server1 that runs windows server 2008 all client computers run windows vista. All computers are members of the active directory domain. You assign the secure server (Require Security) IPsec policy to server1 by using a GPO. Users report that they fail to connect to server1. You need to ensure that users can connect to server1. All connections to server1 must be encrypted. What should you do?()

  • A、Restart the IPsec policy agent service on server1.
  • B、Assign the client (Respond only ) IPsec policy to Server1.
  • C、Assign the server (Request Security) ipsec policy to server1.
  • D、Assign the client (Respond Only) IPsec policy to all client computes.

正确答案:D

更多相关问题