Which of the following types of Ethernet switch ports, after the data flow out of the port may also carry VLAN identification? (Choose two)
A. Access Port
B. Trunk port
C. Hybrid port
D. Switch port
About ASPF the following statements is correct? (Choose two)
A. ASPF checking application layer protocol application layer protocol information and monitor the connection status
B. ASPF by dynamically generating ACL to determine whether the packet through the firewall
C. Servermap table is a temporary table entry
D. Servermap table with the five-tuple to represent a conversation
Security Alliance (SA) is composed of tuples which uniquely identify? (Choose three)
A. SPI
B. Source IP address
C. Destination IP address
D. Security Protocol No.
The following are symmetric encryption algorithm is: (Choose two)
A. DES
B. 3DES
C. SHA-1
D. MD5
VPN tunneling technology is to achieve data encryption algorithm (such as DES, 3DES) transmission in the network will not be intercepted.
A. True
B. False
Servermap used in the table which follows?
A. Quintuple
B. Quad
C. Triples
D. Tuple
VPN tunneling technology and DDN line like the link to achieve security by building physical channel.
A. True
B. False
As illustrated connection : PC1 ----- SW1 ------------ SW2 ----- PC2; SW1 two ports defined for VLAN1 access type port, SW2 two ports defined as VLAN 2 access port type, (PC1 and PC2 in the same subnet) then the following description is correct?
A. Because all access port,in fact, do not pass VLAN tag information, so you can access PC1 PC2.
B. Because VLAN SW2 SW1 and the ends are different, so youcannotcommunicate between two PC.
C. If two switches are connected to the port is set to trunk ports, two PC can communicate.
D. Because PVID default port on the switch is VLAN 1, so the PC can be both visits.
If the DNS server addresses SVN configuration has been completed, the URL of the Web proxy function must be configured IP.
A. True
B. False
The main difference between symmetric and asymmetric encryption algorithm encryption algorithm that different algorithms, but they are using the same key to encrypt and decrypt.
A. True
B. False