单项选择题
A.RADIUS B.Password cracker C.Port scanner D.Man-in-the-middle attack
Whichofthefollowingtechnologiescanbeusedasameanstoisola...
单项选择题Which of the following technologies can be used as a means to isolate a host OS from some types of security threats?()
A.Intrusion detection B.Virtualization C.Kiting D.Cloning
WhichofthefollowingdescribesastaticNAT?()A.A static NAT...
单项选择题Which of the following describes a static NAT?()
A.A static NAT uses a one to many mapping. B.A static NAT uses a many to one mapping. C.A static NAT uses a many to many mapping. D.A static NAT uses a one to one mapping.
Whichofthefollowingencryptionmethodsisoftenusedalongwit...
单项选择题Which of the following encryption methods is often used along with L2TP?()
A.S/MIME B.SSH C.3DES D.IPSec