多项选择题
A. data integrity
B. data confidentiality
C. data authentication
D. outer IP header confidentiality
E. outer IP header authentication
多项选择题 Users can define policy to control traffic flow between which two components? ()(Choose two.)
单项选择题 You are not able to telnet to the interface IP of your JUNOS software with enhanced services devicefrom a PC on the same subnet. What is causing the problem? ()
多项选择题 Which two statements regarding asymmetric key encryption are true?() (Choose two.)