Which two methods use IPsec to provide secure connectivity from the branch office to the headquarters office?()
Which two wireless encryption methods are based on the RC4 encryption algorithm? ()A、WEPB、CCKMC、AESD、TKIPE、CCMP
点击查看答案
Which of the following encryption methods is often used along with L2TP?()A、S/MIMEB、SSHC、3DESD、IPSec
When the Infranet Enforcer is set up in transparent mode, which additional resource policy must be configured to use OAC for IPsec enforcement? ()A、IPsec RoutingB、Access ControlC、IP Address PoolD、Source Interface
Which two methods are used to assign an IP address to a WX device? ()(Choose two.)A、SSHB、TelnetC、WebViewD、device front panelE、serial console (command-line interface)
You work as a database administrator for Certkiller .com. You have set the retention period for Automatic Repository (AWR) statistics to four days and collection interval to 15 minutes. You want to view the statistics collected and stored in AWR snapshot. Which two methods would you use to view the AWR statistics?()A、use enterprise managerB、use DBMS_SQL packageC、use DBMS_AWR packageD、use PRVT_WORKLOAD packageE、query the AWR snapshot repository objectsF、use DBMS_WORKLOAD_REPOSITORY package
You are required to remove the default EXTPROC entry from the default listener configuration to create a listener that will listen specifically for EXTPROC calls. Which two methods can you use to remove the default EXTPROC entry from the default listener configuration? ()A、 the RMAN utilityB、 the import/export utilityC、 the Oracle Enterprise ManagerD、 the change tracking featureE、 the Net Manager utility
You need to design a method of communication between the IT and HR departments. Your solution must meet business requirements. What should you do?()A、Design a custom IPSec policy to implement Encapsulating Security Payload (ESP) for all IP traffic Design the IPSec policy to use certificate-based authentication between the two departments’ computersB、Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computersC、Design a customer IPSec policy to implement Encapsulating Payload (ESP) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computersD、Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use certificate-based authentication between the two departments’ computers