问题:
[多选题]3. Which of the following are valid encryption protocols? (Choose all that apply.)下面哪些是有效的加密协议?(选出所有满足条件的答案)
A.3DES
B.DES
C.MD5
D.Diffie-Hellman
答案解析:
您可能感兴趣的问题
- 41、 When deploying an advanced authentication scheme that requires each user at the remote site to e
- 44、 When preparing to allow a Cisco IP phone unauthenticated access to a VPN head-end site without h
- 9、 Which of the following are required on all members for a basic cluster? (Choose all that apply.)下
- 13、 Which of the following HA methods are not supported by clientless VPN connections?无客户端的VPN连接不支持下
- 24、 When troubleshooting an error with your AnyConnect client installation with the assistance of a
- 36. When configuring an authentication scheme, which three options are available?当配置验证方案时,可以使用哪3种选项?
- 41. Which of the following sections are not available panels for portal customization?对于门户定制来说,下面那些部
- 8. Catalyst 3560交换机上的接口fa0/1配置了SRR调度机制,fa0/2配置了带有优先级队列的SRR调度 机制,那么下面有关接口fa0/2的描述,哪一项是正确的?
- 9. MDRR中的QV的功能是什么?
- 14. 假设在路由器的配置模式下输入了以下命令:access-list 1permit 10.44.38.0 0.0.3.255。如果要 在该访问列表中使用其他掩码,其余内容保持不变,那么下面哪个掩码