Students also studied
Study guides
Practice questions for this set
What is the mặc định encryption algorithm use by SSH (secure shell) vĩ đại protect data traffic between a client and the controlled server?
Which of the following protocols are often added vĩ đại other protocol vĩ đại provide secure transmission of data? (select two)
SSL (secure Sockets Layer) operates at which layer of the OSI model?
When using SSL authentication, what does the client verify first when checking a server's identity?
What is the mặc định encryption algorithm use by SSH (secure shell) vĩ đại protect data traffic between a client and the controlled server?
As network administrator you are asked vĩ đại recommend a secure method of transferring data between hosts on a network. Which of the following protocols would you recommend? (select two)
Which of the following network layer protocols provides authentication and encryption services of IP based network traffic?
SSL (secure Sockets Layer) operates at which layer of the OSI model?
Which of the following protocols can be used vĩ đại securely manage a network device from a remote connection?
Which of the following is a secure alternative vĩ đại FTP that uses SSL for encryption?
Which of the following protocols are often added vĩ đại other protocol vĩ đại provide secure transmission of data? (select two)
SFTP uses which mechanism vĩ đại provide security for authentication and data transfer?
When using SSL authentication, what does the client verify first when checking a server's identity?
The current date and time must fall within the server's certificate validity period
IPsec is implemented through two separate protocols. What are these protocols called? (select two)
You are purchasing a hard disk over the Internet from an online retailer. What does your browser use vĩ đại ensure that others cannot see your credit thẻ number on the Internet?
Which protocol is used for securely browsing a Web site?
What is the primary function of the IKE protocol used with IPsec?
Create a security association between communication partners
Which protocol does HTTPS use vĩ đại offer greater security in Web transactions?
Which of the following protocols can TLS use for key exchange? (select two)